Skip to main content
Log in

Misdirection steganography

  • Foundations
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Information is one of the most important resources in this world. Therefore, we must protect it from third parties. A typical method for protecting information contents is cryptography. We use cryptography to prevent secret information from leaking to third parties. However, we will use steganography to conceal the existence of information because cryptography cannot achieve this function. Many steganographic techniques have been also proposed as well as cryptography. In this paper, we propose a different type of steganography called misdirection steganography. Our steganography transfers two kinds of secret data, true secret data and decoy secret data, as data embedding into cover data, and the process embedding the true secret data depends on how to embed the decoy secret data, i.e., the information about embedding the decoy secret data is also required to extract the true secret data. Our aim is to transfer true secret data in secret by letting third parties pay attention to decoy secret data. In other words, misdirection in the proposed steganography techniques is caused by the fact that the decoy secret data protect the true secret data against third parties.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Availability of data and material

Not applicable.

References

  • Anderson RJ, Petitcolas F (1998) On the limits of steganography. IEEE J Sel Areas Commun 16(4):474–481

    Article  Google Scholar 

  • Bennett CH, Brassard G (1984) Quantum cryptography:public key distribution and coin tossing. In: Proceedings of IEEE international conference on computers, systems and signal processing, Bangalore, India, pp 175–179

  • Bouwmeester D, Ekert A, Zeilinger A (2000) The physics of quantum information. Springer, Berlin

    Book  Google Scholar 

  • Curty M, Santos DJ (2000) Protocols for quantum steganography. In: 2nd Bielefeld workshop on quantum information and complexity, Bielefeld, Germany, pp 12–14

  • DiVincenzo DP, Leung DW, Terhal BM (2002) Quantum data hiding. IEEE Trans Inf Theory 48(3):580–598

    Article  MathSciNet  Google Scholar 

  • DiVincenzo DP, Hayden P, Terhal BM (2003) Hiding quantum data. Found Phys 33(11):1629–1647

    Article  MathSciNet  Google Scholar 

  • Eggeling T, Werner RF (2002) Hiding classical data in multipartite quantum states. Phys Rev Lett 89(9):097905

    Article  Google Scholar 

  • Ekert G (1991) Quantum cryptography based on Bell’s theorem. Phys Rev Lett 67(6):661–663

    Article  MathSciNet  Google Scholar 

  • Gea-Banacloche J (2002) Hiding messages in quantum data. J Math Phys 43(9):4531–4536

    Article  MathSciNet  Google Scholar 

  • Mihara T (2012) Quantum steganography embedded any secret text without changing the content of cover data. J Quantum Inf Sci 2:10–14

    Article  Google Scholar 

  • Mihara T (2014) A new framework of steganography using the content of cover data. J Inf Hiding Multimed Signal Process 5(2):117–123

    Google Scholar 

  • Mihara T (2015) Quantum steganography using prior entanglement. Phys Lett A 379:952–955

    Article  Google Scholar 

  • Mihara T (2017) Multi-party quantum steganography. Int J Theor Phys 56:576

    Article  MathSciNet  Google Scholar 

  • Natori S (2006) Why quantum steganography can be stronger than classical steganography. Quantum Comput Inf 102:235–240

    MathSciNet  Google Scholar 

  • Nielsen MA, Chuang IL (2000) Quantum computation and quantum information. Cambridge University Press, Cambridge

    MATH  Google Scholar 

  • Ogiela MR, Koptyra K (2015) False and multi-secret steganography in digital images. Soft Comput 19:3331–3339

    Article  Google Scholar 

  • Petitcolas F, Anderson R, Kuhn M (1999) Information hiding—a survey. In: Proceedings of IEEE, special issue on protection of multimedia content, vol 87, no 7, pp 1062–1078

  • Qu Z-G, Chen X-B, Zhon X-J, Niu X-X, Yang Y-X (2010) Novel quantum steganography with large payload. Opt Commun 283(23):4782–4786

    Article  Google Scholar 

  • Qu Z-G, Chen X-B, Luo M-X, Niu X-X, Yang Y-X (2011) Quantum steganography with large payload based on entanglement swapping of \(\chi \)-type entangled states. Opt Commun 284(7):2075–2082

    Article  Google Scholar 

  • Shaw BA, Brun TA (2011) Quantum steganography with noisy quantum channels. Phys Rev A 83(2):022310

    Article  Google Scholar 

  • Shih FY (2017) Digital watermarking and steganography, fundamentals and techniques, 2nd edn. CRC Press, Boca Raton

    Book  Google Scholar 

  • Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13–14:95–113

    Article  Google Scholar 

  • Tang M, Hu J, Song W (2014) A high capacity image steganography using multi-layer embedding. Optik 125(15):3972–3976

    Article  Google Scholar 

  • Terhal BM, DiVincenzo DP, Leung DW (2001) Hiding bits in bell states. Phys Rev Lett 86(25):5807–5810

    Article  Google Scholar 

  • Wiesner S (1983) Conjugate coding. SIGACT News 15(1):78–88

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Takashi Mihara.

Ethics declarations

Conflict of interest

Not applicable.

Code availability

Not applicable.

Additional information

Communicated by A. Di Nola.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mihara, T. Misdirection steganography. Soft Comput 24, 16005–16010 (2020). https://doi.org/10.1007/s00500-020-05345-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-020-05345-1

Keywords

Navigation