Published July 21, 2008 | Version 13149
Journal article Open

A Novel Plausible Deniability Scheme in Secure Steganography

Description

The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the robustness of the applied algorithm. In this paper, we propose a novel plausible deniability scheme in steganography by using a diversionary message and encrypt it with a DES-based algorithm. Then, we compress the secret message and encrypt it by the receiver-s public key along with the stego key and embed both messages in a carrier using an embedding algorithm. It will be demonstrated how this method can support plausible deniability and is robust against steganalysis.

Files

13149.pdf

Files (294.7 kB)

Name Size Download all
md5:ce9973ceb95f0940bcaf378865b41423
294.7 kB Preview Download

Additional details

References

  • Y.H. Yu, C.C. Cheng, Y.C. Hu, "Hiding secret data in image via predictive coding" , Pattern Recognition, Vol. 38, pp 691-705, 2005.
  • Fisk G., Fisk, M., Papadopoulos, C., Joshua, N., "Eliminating Steganography in Internet Traffic with Active Wardens", Available:http://citeseer.nj.nec.com/fisk2eliminating.html, 2002
  • Fabien A.B.P., Anderson R., Kuhn M.," Information Hiding- A Survey", in Proceeding of IEEE, pp. 1062-78, 1999.
  • Potdar V., Chang E., "Visibly Invisible". Available: http://www.fit.cbs.curtin.edu.au/ceela/docs/index.php, 2004.
  • Provos N., "Defending against statistical steganalysis", 10th USENIX Security Symposium, 2001.
  • Sallee P., "Model-based steganography", International Workshop on Digital Watermarking, Seoul, Korea, 2003..
  • Walton D., "Plausible Deniability and Evasion of Burden of Proof". Available: http://io.uwinnipeg.ca/~walton/96deniability.pdf, 1996.
  • Canetti R., Dwork C., Naor M., Ostrovsky R.,"Deniable Encryption", Crypto '97, pp. 90-104, 1997.
  • Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu, " Digital Invisible Ink and its Applications in Steganography", Proceeding of the 8th workshop on Multimedia and security, Geneva, Switzerland, pp. 23 - 28, 2006.