CFP last date
20 May 2024
Reseach Article

Using Disinformation to Promote the Security of SMMWB Image Steganography Method

by Masoud E. Shaheen, Al-Hussien Seddik Saad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 26
Year of Publication: 2020
Authors: Masoud E. Shaheen, Al-Hussien Seddik Saad
10.5120/ijca2020920808

Masoud E. Shaheen, Al-Hussien Seddik Saad . Using Disinformation to Promote the Security of SMMWB Image Steganography Method. International Journal of Computer Applications. 175, 26 ( Oct 2020), 25-30. DOI=10.5120/ijca2020920808

@article{ 10.5120/ijca2020920808,
author = { Masoud E. Shaheen, Al-Hussien Seddik Saad },
title = { Using Disinformation to Promote the Security of SMMWB Image Steganography Method },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2020 },
volume = { 175 },
number = { 26 },
month = { Oct },
year = { 2020 },
issn = { 0975-8887 },
pages = { 25-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number26/31616-2020920808/ },
doi = { 10.5120/ijca2020920808 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:39:30.863523+05:30
%A Masoud E. Shaheen
%A Al-Hussien Seddik Saad
%T Using Disinformation to Promote the Security of SMMWB Image Steganography Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 26
%P 25-30
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information security researchers are interested in maintaining the secrecy, reliability and accessibility of data. The importance of information security comes from the need for protecting information and information system from unauthorized access, revelation, disruption, alteration, annihilation and use. Steganography and Cryptography are the two major techniques for information security. Steganography is the process that primarily concerned with hiding existent data in another transmission medium to achieve secret communication while Cryptography is about hiding the content of the message or scrambling it. However, steganography does not take the place of cryptography but rather boosts the security using its obscurity features. In this paper, the security of a previously proposed image steganography method SMMWB (Secret Message Matching With Braille) will be promoted by using the principle of disinformation instead of encryption as previously proposed methods, which means if the image steganography method has been steganalysed the eavesdropper will be able to read a fake secret message,he has been implicitly directed to read, not the real one.

References
  1. I. J. Cox, m. L. Miller, J. A. Bloom, J. Fridrich and T. Kalker, "Digital Watermarking and Steganography", ISBN 978-0-12 372585-1, 2nd edition, Elsevier inc, 2008.
  2. E. Cole, "Hiding In Plain Sight: Steganography and The Art of Covert Communication", ISBN 0-471-44449-9, Wiley publishing, inc, 2003.
  3. An Introduction to Cryptography, Network Associates, Inc. and its Affiliated Companies, 3965 Freedom Circle, Santa Clara, CA 95054, 1999.
  4. I. V. S. Manoj, "Cryptography and Steganography", International Journal of Computer Applications, volume 1 - no. 12, pp. 61 - 65, 2010.
  5. K. Gopalan and Q. Shi, "Audio Steganography Using Bit Modification – A Tradeoff On Perceptibility and Data Robustness for Large Payload Audio Embedding", 978-1-4244-7115-7/10, IEEE, 2010.
  6. G. Liu, Y. Dai, and Z. Wang, "Breaking Predictive-Coding Based Steganography and Modification For Enhanced Security", IJCSNS International Journal of Computer Science and Network Security, vol. 6 no. 3b, pp. 144 - 149, Mar 2006.
  7. S. Channalli and A. Jadhav, "Steganography an Art of Hiding Data", International Journal on Computer Science and Engineering, vol. 1, no. 3, pp. 137-14, 2009.
  8. N. Cvejic, "Algorithms for Audio Watermarking and Steganography", ISBN 951-42-7383-4 (nid.) ISBN 951-42 7384-2 (PDF), Oulu University press, 2004.
  9. A. T. Al-Taani and A. M. Al-Issa, "A Novel Steganographic Method for Gray- Level Images", International Journal of Computer, Information, Systems Science, and Engineering, pp. 5 - 10, 2009.
  10. S. K. Muttoo and S. Kumar, "Data Hiding in JPEG Images", Bvicam's International Journal of Information Technology, pp. 13 - 16, BIJIT - 2008.
  11. A. E. Ali, "A New Text Steganography Method By Using Non Printing Unicode Characters", Eng. & Tech. Journal, vol. 28, no. 1, pp. 72 - 83, 2010.
  12. H. S. M. Reddy and K. B. Raja, "High Capacity and Security Steganography Using Discrete Wavelet Transform", International Journal of Computer Science and Security (IJCSS), vol. 3, issue 6, pp. 462 - 472.
  13. Y. Srinivasan, "High Capacity Data Hiding System Using BPCS Steganography", Electrical Engineering, Faculty of Texas Tech University, M.Sc. Thesis, December, 2003.
  14. S. Anguraj, D. Balamurugan, "Implementation Of Audio Steganography In Real-Time Protocol (RTP) and Hypothesis of RTP Features", 1st National Conference on Intelligent Electrical Systems (NCIES'09), pp. 181 - 185, 24-25 April 2009.
  15. B. W. Ford, "File Format Extension Through Steganography", Texas State University-San Marcos, Dept. of Computer Science, M.Sc. Thesis, January 5, 2010.
  16. G. Kipper, "Investigator's Guide to Steganography", ISBN 0849324335, Auerbach publications, 2004.
  17. E. J. Farn and C. C. Chen, "Jigsaw Puzzle Images For Steganography", Optical Engineering vol. 48, no. 7, pp. 1 - 12, July 2009.
  18. K. Bennett, "Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information In Text", CERIAS Tech Report 2004-13, Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN 47907-2086.
  19. A. A. Ali and A. H. Seddik, " Enhancing SMM Image Steganography Method by using LSBraille Image Steganography Method (SMMWB; Secret Message Matching With Braille)", International Journal of Computer Applications (0975 – 8887), Volume 70– No.8, May 2013.
  20. A. Agarwal, "Security Enhancement Scheme for Image Steganography using S-DES Technique", International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 2, Issue 4, April 2012.
  21. P. Vitthal, B. Rajkumar and P. Archana, " A Novel Security Scheme for Secret Data using Cryptography and Steganography", I. J. Computer Network and Information Security, 2012, 2, 36-42.
  22. N. Bagchi and "Secure BMP Image Steganography Using Dual Security Model (I.D.E.A, image intensity and Bit Randomization) and Max-Bit Algorithm", International Journal of Computer Applications (0975 - 8887),Volume 1 – No. 21, 2010.
  23. M. gowtham, T. Senthur, M. Sivasankaran, M. Vikram and B. Sreeja, " AES BASED STEGANOGRAPHY", International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 2, Issue 1, January 2013.
  24. R. Ibrahim and T. Suk, "Steganography Imaging System (SIS): Hiding Secret Message inside an Image", Proceedings of the World Congress on Engineering and Computer Science 2010 Vol I, WCECS 2010, October 20-22, 2010, San Francisco, USA.
  25. A. A. Ali and A. H. Seddik, " New Text Steganography Technique by using Mixed-Case Font", International Journal of Computer Applications (0975 – 8887) Volume 62– No.3, January 2013.
  26. A. A. Ali and A. H. Seddik, " New Image Steganography Method By Matching Secret Message With Pixels Of Cover Image (SMM)", International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR)ISSN 2249-6831 Vol. 3, Issue 2, Jun 2013, 1-10 © TJPRC Pvt. Ltd.
  27. A. A. Ali and A. H. Seddik, " Image Steganography Technique By Using Braille Method of Blind People (LSBraille)", International Journal of Image Processing (IJIP), Volume (7) : Issue (1) : 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Image Steganography Hiding Data in Digital Images. Spatial Domain Image Steganography Text Steganography Information Security.