Abstract
Information is one of the most important resources in this world. Therefore, we must protect it from third parties. A typical method for protecting information contents is cryptography. We use cryptography to prevent secret information from leaking to third parties. However, we will use steganography to conceal the existence of information because cryptography cannot achieve this function. Many steganographic techniques have been also proposed as well as cryptography. In this paper, we propose a different type of steganography called misdirection steganography. Our steganography transfers two kinds of secret data, true secret data and decoy secret data, as data embedding into cover data, and the process embedding the true secret data depends on how to embed the decoy secret data, i.e., the information about embedding the decoy secret data is also required to extract the true secret data. Our aim is to transfer true secret data in secret by letting third parties pay attention to decoy secret data. In other words, misdirection in the proposed steganography techniques is caused by the fact that the decoy secret data protect the true secret data against third parties.
Similar content being viewed by others
Availability of data and material
Not applicable.
References
Anderson RJ, Petitcolas F (1998) On the limits of steganography. IEEE J Sel Areas Commun 16(4):474–481
Bennett CH, Brassard G (1984) Quantum cryptography:public key distribution and coin tossing. In: Proceedings of IEEE international conference on computers, systems and signal processing, Bangalore, India, pp 175–179
Bouwmeester D, Ekert A, Zeilinger A (2000) The physics of quantum information. Springer, Berlin
Curty M, Santos DJ (2000) Protocols for quantum steganography. In: 2nd Bielefeld workshop on quantum information and complexity, Bielefeld, Germany, pp 12–14
DiVincenzo DP, Leung DW, Terhal BM (2002) Quantum data hiding. IEEE Trans Inf Theory 48(3):580–598
DiVincenzo DP, Hayden P, Terhal BM (2003) Hiding quantum data. Found Phys 33(11):1629–1647
Eggeling T, Werner RF (2002) Hiding classical data in multipartite quantum states. Phys Rev Lett 89(9):097905
Ekert G (1991) Quantum cryptography based on Bell’s theorem. Phys Rev Lett 67(6):661–663
Gea-Banacloche J (2002) Hiding messages in quantum data. J Math Phys 43(9):4531–4536
Mihara T (2012) Quantum steganography embedded any secret text without changing the content of cover data. J Quantum Inf Sci 2:10–14
Mihara T (2014) A new framework of steganography using the content of cover data. J Inf Hiding Multimed Signal Process 5(2):117–123
Mihara T (2015) Quantum steganography using prior entanglement. Phys Lett A 379:952–955
Mihara T (2017) Multi-party quantum steganography. Int J Theor Phys 56:576
Natori S (2006) Why quantum steganography can be stronger than classical steganography. Quantum Comput Inf 102:235–240
Nielsen MA, Chuang IL (2000) Quantum computation and quantum information. Cambridge University Press, Cambridge
Ogiela MR, Koptyra K (2015) False and multi-secret steganography in digital images. Soft Comput 19:3331–3339
Petitcolas F, Anderson R, Kuhn M (1999) Information hiding—a survey. In: Proceedings of IEEE, special issue on protection of multimedia content, vol 87, no 7, pp 1062–1078
Qu Z-G, Chen X-B, Zhon X-J, Niu X-X, Yang Y-X (2010) Novel quantum steganography with large payload. Opt Commun 283(23):4782–4786
Qu Z-G, Chen X-B, Luo M-X, Niu X-X, Yang Y-X (2011) Quantum steganography with large payload based on entanglement swapping of \(\chi \)-type entangled states. Opt Commun 284(7):2075–2082
Shaw BA, Brun TA (2011) Quantum steganography with noisy quantum channels. Phys Rev A 83(2):022310
Shih FY (2017) Digital watermarking and steganography, fundamentals and techniques, 2nd edn. CRC Press, Boca Raton
Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13–14:95–113
Tang M, Hu J, Song W (2014) A high capacity image steganography using multi-layer embedding. Optik 125(15):3972–3976
Terhal BM, DiVincenzo DP, Leung DW (2001) Hiding bits in bell states. Phys Rev Lett 86(25):5807–5810
Wiesner S (1983) Conjugate coding. SIGACT News 15(1):78–88
Funding
Not applicable.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Not applicable.
Code availability
Not applicable.
Additional information
Communicated by A. Di Nola.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mihara, T. Misdirection steganography. Soft Comput 24, 16005–16010 (2020). https://doi.org/10.1007/s00500-020-05345-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-020-05345-1