Font Attributes based Text Steganographic algorithm (FATS) for communicating images: A nuclear power plant perspective
-
R. B. Krishnan
, P. K. Thandra , S. A. V. Satya Murty and P. Thiyagarajan
Abstract
Today even sensitive organizations like nuclear power plants are connected to the internet. As information security is of utmost priority to such organizations, achieving the same is a challenging task while using the public network like the internet. Though cryptography could be used to enhance the information security, it cannot hide its own presence from the attackers. This drawback lead security professionals to look for an alternate technique like steganography. Steganography hides the secret information, stealthily, inside another innocent looking cover medium like text, image, audio and video. Considering these, this paper proposes a novel text steganographic algorithm that embeds images as codes in the font attributes such as color, character spacing and kerning. The procedure of representing an image as codes makes the proposed method independent from the resolution of the image. Experiments were conducted by embedding diverse categories of images. A comparison with the best existing method depicted that the embedding capacity attained by the proposed method is higher at 1.59-bits/character, which suits best for low bandwidth environments. Various security aspects of the proposed method have also been discussed.
Kurzfassung
Heute sind auch Kernkraftwerke mit dem Internet verbunden. Durch diese Nutzung eines öffentlichen Netzes stellt die in KKW notwendige Sicherstellung der Informationssicherheit eine große Herausforderung dar. Während Kryptographie einerseits diese Aufgabe erfüllen kann, findet sie aber unter den Augen möglicher Angreifer statt. Die Anwendung der alternativen Technik der Steganographie im Bereich von KKW wird in diesem Beitrag vorgestellt. Dabei versteckt Steganographie verbirgt die geheimen Informationen, in einem anderen unschuldig wirkendem Cover-Medium wie Text, Bild, Audio und Video. In dieser Arbeit wird ein neuartiger Text steganographischer Text-Algorithmus vorgestellt, der Bilder als Codes in die Schriftart-Attribute wie Farbe, Zeichenabstand und Kerning einbettet. Der Vorgang der Darstellung eines Bildes als Code macht das vorgeschlagene Verfahren unabhängig von der Auflösung des Bildes. Experimente wurden für die Einbettung verschiedener Bilderkategorien durchgeführt. Dabei zeigte sich, dass dieses Verfahren eine Einbettungskapazität von 1,59 Bits/Zeichen erreichen kann und so auch für Internetanschlüsse mit geringer Bandbreite geeignet ist. Abschließend werden verschiedene Sicherheitsaspekte der vorgeschlagenen Methode diskutiert.
References
1 Thiyagarajan, P.; Thandra, P. K.; Rajan, J.; Satyamurthy, S. A. V.; Aghila, G.: Shamir Secret Sharing Scheme with Dynamic Access Structure (SSSDAS): case study on nuclear power plant. Kerntechnik80 (2015) 150–16010.3139/124.110489Search in Google Scholar
2 Chin-ChenChang; TheDuc Kieu: A reversible data hiding scheme using complementary embedding strategy. Information Sciences (2010) 3045–305810.1016/j.ins.2010.03.027Search in Google Scholar
3 Zhi-HuiWang, Chin-ChenChang, Chia-ChenLin, Ming-ChuLi: A reversible information hiding scheme using left–right and up–down chinese. The Journal of Systems and Software (2009) 1362–136910.1016/j.jss.2009.04.045Search in Google Scholar
4 http://searchsecurity.techtarget.com/video/How-to-use-OpenPuff-steganography-to-send-sensitive-info-securely. [Last accessed on 3.6.2016]Search in Google Scholar
5 https://luxsci.com/blog/are-export-grade-encryption-options-needed-anymore.html. [Last accessed on 3.6.2016]Search in Google Scholar
6 http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.html. [Last accessed on 3.6.2016]Search in Google Scholar
7 Syed, K.; Zavarsky, P.; Lindskog, D.; Ruhl, R.; Aghili, S.: Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process. in 9th International Conference on Trust, Privacy and Security in Digital Business, 2012, pp. 50–6410.1007/978-3-642-32287-7_5Search in Google Scholar
8 Desoky, A.; Younis, M.: Chestega: chess steganography methodology. Security and Communication Networks (2009) 555–56610.1002/sec.99Search in Google Scholar
9 LipYee Por, KosSheikWong, KokOnn Chee: UniSpaCh: A text-based data hiding method using Unicode Space Characters. The Journal of Systems and Software (2012) 1075–1082Search in Google Scholar
10 Thiyagarajan, P.; Aghila, G.: Reversible dynamic secure steganography for medical image using graph coloring. Health Policy and Technology2 (2013) 151–16110.1016/j.hlpt.2013.05.005Search in Google Scholar
11 Chin-ChenChang, Tung-ShouChen, Lou-ZoChung: A steganographic method based upon JPEG and quantization table modification. Information Sciences141 (2002) 123–13810.1016/S0020-0255(01)00194-3Search in Google Scholar
12 DiqunYan, RangdingWang, XianminYu, JieZhu: Steganography for MP3 audio by exploiting the rule of window switching. Computers & Security31 (2012) 704–71610.1016/j.cose.2012.04.006Search in Google Scholar
13 Cetin, O., Ozcerit, A. T.: A new steganography algorithm based on color histograms for data embedding into raw video streams. Computers & Security28 (2009) 670–68210.1016/j.cose.2009.04.002Search in Google Scholar
14 Satir, E., Isik, H.: A Compression-based Text Steganography Method. The Journal of Systems and Software (2012) 2385–239410.1016/j.jss.2012.05.027Search in Google Scholar
15 Hetzl, S., Mutzel, P.: A Graph–Theoretic Approach to Steganography. Communications and Multimedia Security (2005) 119–12810.1007/11552055_12Search in Google Scholar
16 Desokya, A., Younisa, M.: Graphstega: Graph Steganography Methodology. Journal of Digital Forensic Practice2 (2008) 27–3610.1080/15567280701797087Search in Google Scholar
17 Zhan-HeOu, Ling-HweiChen: A Steganographic Method based on Tetris Games. Information Sciences (2014) 343–35310.1016/j.ins.2013.12.024Search in Google Scholar
18 Hui-LungLee, Chia-FengLee, Ling-HweiChen: A Perfect Maze based Steganographic Method. The Journal of Systems and Software (2010) 2528–2535Search in Google Scholar
19 Thampi, S. M.: Information Hiding techniques: A Tutorial Review. ISTE-STTP on Network Security & Cryptography, LBSCE, 2004Search in Google Scholar
20 Singh, H.; Singh, P. K.; Saroha, K.: A Survey on Text Based Steganography. In 3rd National Conference: INDIACom-2009 Computing for National Development, 2009Search in Google Scholar
21 Desoky, A.: Listega: List-based Steganography Methodology. International Journal of Information Security (2009) 247–26110.1007/s10207-009-0079-0Search in Google Scholar
22 Desoky, A.: Nostega: A Novel Noiseless Steganography Paradigm. Journal of Digital Forensic Practice (2008) 132–139Search in Google Scholar
23 Desoky, A.: Notestega: Notes-based Steganography Methodology. Information Security Journal: A Global Perspective (2009) 178–19310.1080/19393550903076841Search in Google Scholar
24 Fabien, A.; Petitcolas, P.; Anderson, R. J.; Kuhn, M. G.: Information Hiding – A Survey. Proceedings of the IEEE, pp. 1062–1078, July 199910.1109/5.771065Search in Google Scholar
25 Kahn, D.: The Code-Breakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet, 2nd ed.: Scribner, 1996Search in Google Scholar
26 Bennett, K.: Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text. Purdue University, CERIAS, Technical 2004-13Search in Google Scholar
27 Topkara, M.; Topkara, U.; Atallah, M. J.: Information hiding through errors: a confusing approach. in Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, 200710.1117/12.706980Search in Google Scholar
28 Agarwal, M.: Text Steganographic Approaches: A Comparison. International Journal of Network Security & its Applications5 (2013) 91–10610.5121/ijnsa.2013.5107Search in Google Scholar
29 Brassil, J. T.; Low, S.; MaxemchukF.N.: Copyright Protection for the Electronic Distribution of Text Documents. Proceedings of the IEEE87 (1999) 1181–119610.1109/5.771071Search in Google Scholar
30 J Brassil, J. T.; Low, S.; MaxemchukF.N.: Electronic Marking and Identification Techniques to Discourage Document Copying. IEEE Journal on Selected Areas in Communications13 (1995) 1495–150410.1109/49.464718Search in Google Scholar
31 Young-WonKim, Il-SeokOh: Watermarking Text Document Images using Edge Direction Histograms. Pattern Recognition Letters (2004) 1243–1251Search in Google Scholar
32 Singh, P.; Chaudhary, R.; Agarwal, A.: A Novel Approcah of Text Steganography based on Null Spaces. IOSR Journal of Computer engineering3 (2014) 11–17Search in Google Scholar
33 Bender, W.; Gruhl, D.; Morimoto, N.; Lu, A.: Techniques for data hiding. IBM Systems Journal35 (1996) 313–33610.1147/sj.353.0313Search in Google Scholar
34 Tsung-YuanLiu, Wen-HsiangTsai: A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique. IEEE Transactions on Information Forensics and Security2 (2007) 24–3010.1109/TIFS. 2006.890310Search in Google Scholar
35 Bolshakov, I. A.: A Method of Linguistic Steganography based on Collocationally-Verified Synonymy. Information Hiding3200 (2004) 180–19110.1007/978-3-540-30114-1_13Search in Google Scholar
36 Majumder, A.; Changder, S.: A Novel Approach for Text Steganography: Generating Text Summary using Reflection Symmetry. in International Conference on Computational Intelligence: Modeling Techniques and Application, 2013, pp. 112–12010.1016/j.protcy.2013.12.343Search in Google Scholar
37 Pierce, J. R.: An Introduction to Information Theory: Symbols, Signals and Noise, 2nd ed.: Dover Publications, 1980Search in Google Scholar
38 Ridder, I. de: Reading from the Screen in a Second Language: Empirical Studies on the Effect of Marked Hyperlinks on Incidental Vocabulary Learning, Text Comprehension and the Reading Process. Garant, 2003Search in Google Scholar
39 Cutts, M.: Oxford Guide to Plain English: Oxford University Press, 2013Search in Google Scholar
40 https://www.google.co.in/maps/@13.0475255,80.2090117,11z. [Last accessed on 3.6.2016]Search in Google Scholar
41 Matthews, J. R.; Bowen, J. M.; Matthews, R. W.: Successful Scientific Writing Full Canadian Binding: A Step-by-Step Guide for the Biological and Medical Sciences, Cambridge University Press, 2000Search in Google Scholar
© 2017, Carl Hanser Verlag, München
Articles in the same Issue
- Contents/Inhalt
- Contents
- Summaries/Kurzfassungen
- Summaries
- Technical Contributions/Fachbeiträge
- CANDU pressure tube leak detection by annulus gas dew point measurement: a critical review
- Multiple regression approach to predict turbine-generator output for Chinshan nuclear power plant
- 10.3139/124.110675
- Development of a parallel processing couple for calculations of control rod worth in terms of burn-up in a WWER-1000 reactor
- Simulation of protected and unprotected loss of flow transients in a WWER-1000 reactor based on the Drift-Flux Model
- Sensitivity analysis for CORSOR models simulating fission product release in LOFT-LP-FP-2 severe accident experiment
- Analysis of the optimal fuel composition for the Indonesian experimental power reactor
- Radiogenic lead from poly-metallic thorium ores as a valuable material for advanced nuclear facilities
- The effects of applying silicon carbide coating on core reactivity of pebble-bed HTR in water ingress accident
- Font Attributes based Text Steganographic algorithm (FATS) for communicating images: A nuclear power plant perspective
- Size control synthesis and characterization of ZnO nanoparticles and its application as ZnO-water based nanofluid in heat transfer enhancement in light water nuclear reactor
- Nuclear characteristics of epoxy resin as a space environment neutron shielding
- Exact solution of the neutron transport equation in spherical geometry
- Technical Notes/Technische Mitteilungen
- Determination of self-attenuation correction factor for lichen samples by using gamma-ray spectrometry
Articles in the same Issue
- Contents/Inhalt
- Contents
- Summaries/Kurzfassungen
- Summaries
- Technical Contributions/Fachbeiträge
- CANDU pressure tube leak detection by annulus gas dew point measurement: a critical review
- Multiple regression approach to predict turbine-generator output for Chinshan nuclear power plant
- 10.3139/124.110675
- Development of a parallel processing couple for calculations of control rod worth in terms of burn-up in a WWER-1000 reactor
- Simulation of protected and unprotected loss of flow transients in a WWER-1000 reactor based on the Drift-Flux Model
- Sensitivity analysis for CORSOR models simulating fission product release in LOFT-LP-FP-2 severe accident experiment
- Analysis of the optimal fuel composition for the Indonesian experimental power reactor
- Radiogenic lead from poly-metallic thorium ores as a valuable material for advanced nuclear facilities
- The effects of applying silicon carbide coating on core reactivity of pebble-bed HTR in water ingress accident
- Font Attributes based Text Steganographic algorithm (FATS) for communicating images: A nuclear power plant perspective
- Size control synthesis and characterization of ZnO nanoparticles and its application as ZnO-water based nanofluid in heat transfer enhancement in light water nuclear reactor
- Nuclear characteristics of epoxy resin as a space environment neutron shielding
- Exact solution of the neutron transport equation in spherical geometry
- Technical Notes/Technische Mitteilungen
- Determination of self-attenuation correction factor for lichen samples by using gamma-ray spectrometry