Advertisement

International Journal of Information Security

, Volume 8, Issue 4, pp 247–261 | Cite as

Listega: list-based steganography methodology

  • Abdelrahman DesokyEmail author
Regular Contribution

Abstract

The use of textual list of items, e.g., products, subjects, books, etc., is widely popular and linguistically legible. This motivates the development of List-Based Steganography Methodology (Listega). Listega takes advantage of such use of textual list to camouflage data by exploiting itemized data to conceal messages. Simply, it encodes a message then assigns it to legitimate items in order to generate a text-cover in a form of list. The generated list of items, the text-cover, can be embedded among other legitimate noncoded items for more protection based on a predetermined protocol among communicating parties such as read every other item, every fifth item, or any other way than the use of particular sequence. Listega neither hides data in a noise (errors) nor produces noise. Instead, it camouflages data by manipulating noiseless list of legitimate items. Listega establishes a covert channel among communicating parties by employing justifiably reasons based on the common practice of using textual list of items in order to achieve unsuspicious transmission of generated covers. The presented implementation, validation, and steganalysis of Listega demonstrate: the robustness capabilities of achieving the steganographic goal, the adequate room for concealing data, and the superior bitrate of roughly 1.32 up to 3.87% than contemporary linguistic steganography approaches.

Keywords

Linguistic steganography Steganography 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kipper, G.: Investigator’s Guide to Steganography, pp. 15–16. CRC Press LLC, Boca Raton (2004)Google Scholar
  2. 2.
    Davern, P., Scott, M.: Steganography its history and its application to computer based data files. Internal Report Working Paper: CA-0795. School of Computing, Dublin City University. http://computing.dcu.ie/research/papers/1995/0795.pdf (1995). Accessed 3 Aug 2006
  3. 3.
    Johnson N.F., Katzenbeisser S.: A survey of steganographic techniques. In: Katzenbeisser, S., Petitcolas, F.(eds) Information Hiding, pp. 43–78. Artech House, Norwood (1999)Google Scholar
  4. 4.
    Kessler, G.C.: An Overview of Steganography for the Computer Forensics Examiner. An edited version, issue of Forensic Science Communications. Technical Report, 6, No. 3 (2004)Google Scholar
  5. 5.
    Martin A., Sapiro G., Seroussi G.: Is image steganography natural? IEEE Trans. Image Process. 14(12), 2040–2050 (2005)CrossRefGoogle Scholar
  6. 6.
    Desoky A.: Graphstega: graph steganography methodology. J. Digit. Forensic Pract. 2(1), 27–36 (2008). doi: 10.1080/15567280701797087 CrossRefGoogle Scholar
  7. 7.
    Desoky, A., Younis, M.: PSM: Public Steganography Methodology. Technical Report TR-CS-06–07, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County (2006)Google Scholar
  8. 8.
    Petitcolas, F.A.P.: Information hiding—a survey. In: Anderson, R.J., Kuhn, M.G. (eds.) Proceedings of the IEEE, vol. 87(7), pp. 1062–1078 (1999)Google Scholar
  9. 9.
    Bennett, K.: Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text. Technical Report CERIAS Tech Report 2004–13, Purdue University (2004)Google Scholar
  10. 10.
    Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new approach to Persian/Arabic text steganography. In: The Proceedings of 5th IEEE/ACIS International Conference on Computer and Information Science (ICIS-COMSAR 2006), 10–12 July, pp. 310–315. Honolulu, Hawaii (2006)Google Scholar
  11. 11.
    Anderson, R.J., Needham, R., Shamir, A.: The steganographic file system. In: Proceedings of the Second International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 1525, pp. 73–82. Springer, Berlin (1998)Google Scholar
  12. 12.
    ScramDisk: Free Hard Drive Encryption For Windows 95 & 98. http://www.scramdisk.clara.net. Accessed 3 Aug 2008
  13. 13.
    Handel, T.G., Sandford, M.T.: Data hiding in the OSI network model. In: Information Hiding: First International Workshop, Proceedings. Lecture Notes in Computer Science, vol. 1174, pp. 23–38. Springer, Berlin (1996)Google Scholar
  14. 14.
    Kahn, D.: The Codebreakers: The Story of Secret Writing. Revised edition. Scribner, New York (1996)Google Scholar
  15. 15.
    Wayner, P.: Mimic functions. Cryptologia XVI(3), 193–214 (1992). doi: 10.1080/0161-119291866883
  16. 16.
    Wayner, P.: Disappearing Cryptography, 2nd edn, pp. 81–128. Morgan Kaufmann, Menlo Park (2002)Google Scholar
  17. 17.
    Chapman, M., Davida, G.: Hiding the hidden: a software system for concealing ciphertext as innocuous text. In: The Proceedings of the International Conference on Information and Communications Security. Lecture Notes in Computer Science, vol. 1334, pp. 335–345. Springer, Beijing (1997)Google Scholar
  18. 18.
    Chapman, M., Davida, G.I.: Nicetext System Official Home Page. http://www.nicetext.com. Accessed 3 Aug 2007
  19. 19.
    Chapman, M. et al.: A practical and effective approach to large-scale automated linguistic steganography. In: Proceedings of the Information Security Conference (ISC’01), pp. 156–165. Lecture Notes in Computer Science, vol. 2200. Springer, Malaga (2001)Google Scholar
  20. 20.
    Chapman, M., Davida, G.I.: Plausible deniability using automated linguistic steganography. In: Davida, G., Frankel, Y. (eds.) International Conference on Infrastructure Security (InfraSec’02). Lecture Notes in Computer Science, vol. 2437, pp. 276–287. Springer, Berlin (2002)Google Scholar
  21. 21.
    Grothoff, C. et al.: Translation-based steganography. Technical Report CSD TR# 05-009, Purdue University (CERIAS Tech Report 2005-39) (2005)Google Scholar
  22. 22.
    Grothoff, C. et al.: Translation-based steganography. In: Proceedings of Information Hiding Workshop (IH 2005), pp. 213–233. Springer, Barcelona (2005)Google Scholar
  23. 23.
    Stutsman, R. et al.: Lost in just the translation. In: Proceedings of the 21st Annual ACM Symposium on Applied Computing (SAC’06). Dijon, France (2006)Google Scholar
  24. 24.
    Topkara, M., Topkara, U., Atallah, M.J.: Information hiding through errors: a confusing approach. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents (2007)Google Scholar
  25. 25.
    Shirali-Shahreza, M. et al.: Text steganography in SMS. In: International Conference on Convergence Information Technology, Issue 21–23, pp. 2260–2265 (2007)Google Scholar
  26. 26.
    Winstein, K.: Lexical steganography through adaptive modulation of the word choice hash. January 1999. Secondary education at the Illinois Mathematics and Science Academy. http://alumni.imsa.edu/~keithw/tlex/lsteg.ps. Accessed 15 April 2008
  27. 27.
    Winstein, K.: Lexical steganography. http://alumni.imsa.edu/~keithw/tlex. Accessed 3 Aug 2008
  28. 28.
    Bolshakov, I.A.: A method of linguistic steganography based on collocationally-verified synonymy. In: Fridrich, J.J. (ed.) Information Hiding: 6th International Workshop. Lecture Notes in Computer Science, vol. 3200, pp. 180–191. Springer, Berlin (2004)Google Scholar
  29. 29.
    Bolshakov, I.A., Gelbukh, A.: Synonymous paraphrasing using wordnet and internet. In: Meziane, F., Metais, E. (eds.) Natural Language Processing and Information Systems: 9th International Conference on Applications of Natural Language to Information Systems, NLDB 2004. Lecture Notes in Computer Science, vol. 3136, pp. 312–323. Springer, Berlin (2004)Google Scholar
  30. 30.
    Calvo, H., Bolshakov, I.A.: Using selectional preferences for extending a synonymous paraphrasing method in steganography. In: Sossa Azuela, J.H. (ed.) Avances en Ciencias de la Computacion e Ingenieria de Computo—CIC’2004: XIII Congreso Internacional de Computacion, pp. 231–242 (2004)Google Scholar
  31. 31.
    Chand, V., Orgun, C.O.: Exploiting linguistic features in lexical steganography: design and proof-of-concept implementation. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS’06), vol. 6, p. 126b. IEEE, New York (2006)Google Scholar
  32. 32.
    Nakagawa, H., Sampei, K., Matsumoto, T., Kawaguchi, S., Makino, K., Murase, I.: Text information hiding with preserved meaning—a case for japanese documents. IPSJ Trans. 42(9):2339–2350 (2001). Originally published in Japanese. A similar paper By the first author in English. http://www.r.dl.itc.u-tokyo.ac.jp/nakagawa/academic-res/finpri02.pdf. Accessed 4 June 2008
  33. 33.
    Niimi, M., Minewaki, S., Noda, H., Kawaguchi, E.: A framework of text-based steganography using sd-form semantics model. IPSJ J. 44(8) (2003). http://www.know.comp.kyutech.ac.jp/STEG03/STEG03-PAPERS/papers/12-Niimi.pdf. Accessed 3 June 2008
  34. 34.
    Bergmair, R., Katzenbeisser, S.: Content-aware steganography: about lazy prisoners and narrow-minded wardens. In: Proceedings of the 8th Information Hiding Workshop. Lecture Notes in Computer Science, vol. 4437, pp. 109–123. Springer, Berlin (2007) (in print)Google Scholar
  35. 35.
    Bergmair, R.: Towards linguistic steganography: a systematic investigation of approaches, systems, and issues. final year project, The University of Derby (2004)Google Scholar
  36. 36.
    Bergmair, R., Katzenbeisser, S.: Towards human interactive proofs in the text-domain. In: Proceedings of the 7th Information Security Conference (ISC’04). Lecture Notes in Computer Science. Springer, Berlin (2004)Google Scholar
  37. 37.
    Topkara, U., Topkara, M., Atallah, M.J.: The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. In: MM&Sec’06: Proceeding of the 8th Workshop on Multimedia and Security, pp. 164–174. ACM Press, New York (2006)Google Scholar
  38. 38.
    Murphy, B., Vogel, C.: The syntax of concealment: reliable methods for plain text information hiding. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents (2007)Google Scholar
  39. 39.
    Atallah, M.J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., Naik, S.: Natural language watermarking: design, analysis, and a proof-of-concept implementation. In: Moskowitz, I.S. (ed.) Information Hiding: Fourth International Workshop. Lecture Notes in Computer Science, vol. 2137, pp. 185–199. Springer, Berlin (2001)Google Scholar
  40. 40.
    Atallah, M.J., Raskin, V., Hempelmann, C.F., Topkara, M., Sion, R., Topkara, U., Triezenberg, K.E.: Natural language watermarking and tamperproofing. In: Petitcolas, F.A.P. (ed.) Information Hiding: Fifth International Workshop. Lecture Notes in Computer Science, vol. 2578, pp. 196–212. Springer, Berlin (2002)Google Scholar
  41. 41.
    Desoky, A.: Nostega: noiseless steganography paradigm. J. Digit. Forensic Pract. (in press)Google Scholar
  42. 42.
    Desoky, A. et al.: Auto-summarization-based steganography. In: The Proceedings of the 5th IEEE International Conference on Innovations in Information Technology, Al-Ain, UAE (2008) (in press)Google Scholar
  43. 43.
    Cvejic, N., Seppanen, T.: Increasing robustness of LSB audio steganography using a novel embedding method. In: The Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04), pp. 533–537, Las Vegas, Nevada (2004)Google Scholar
  44. 44.
    Cvejic, N., Seppanen, T.: Reduced distortion bit-modification for LSB audio steganography. In:’04. 2004 in the Proceedings of the 7th International Conference on Signal Processing (ICSP 04), vol. 3, pp. 2318–2321, Beijing, China (2004)Google Scholar
  45. 45.
    Bender W. et al.: Techniques for data hiding. IBM Systems J. 35(3, 4), 313–336 (1996)CrossRefGoogle Scholar
  46. 46.
    Kirovski, D., Malvar, H.: Spread-spectrum audio watermarking: requirements, applications, and limitations. In: The Proceedings of the 4th IEEE Workshop on Multimedia Signal Processing, pp. 219–224. Cannes, France (2001)Google Scholar
  47. 47.
    Ansari, R., Malik, H., Khokhar, A.: Data-hiding in audio using frequency-selective phase alteration. In: The Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP’04), 17–21 May, vol. 5, pp. 389–92 (2004)Google Scholar
  48. 48.
    Gruhl, D., Lu, A., Bender, W.: Echo hiding. In: The Proceedings of First International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 1174, pp. 295–316, Cambridge, UK. Springer, Berlin (1996)Google Scholar
  49. 49.
    Desoky, A., Younis, M.: Chestega: chess steganography methodology. J. Secur. Commun. Netw. (in press)Google Scholar
  50. 50.
    Laywine, C.F., Mullen, G.L.: Discrete Mathematics Using Latin Squares, 1st edn. Wiley-Interscience, London (1998)Google Scholar
  51. 51.
    Dénes, J., Keedwell, A.D.: Latin Squares (Annals of Discrete Mathematics), vol. 46. Elsevier, North-Holland (1991)Google Scholar
  52. 52.
    Google Internet Search Engine: http://www.google.com, used to generate the lest of items. Accessed 26 Sept 2008
  53. 53.
    List of Songs: http://www.advicenators.com/qview.php?q=549142. Accessed 26 Sept 2008
  54. 54.
    Intranet Book List: http://www.iblist.com. Accessed 26 Sept 2008
  55. 55.
    Spam Mimic: http://www.spammimic.com. Accessed 31 July 2007

Copyright information

© Springer-Verlag 2009

Authors and Affiliations

  1. 1.Department of Computer Science and Electrical EngineeringUniversity of MarylandBaltimore County, BaltimoreUSA

Personalised recommendations