A New Authenticable Steganographic Method via the Use of Numeric Data on Public Websites

A new steganographic method via the use of numeric data on public websites with a self-authentication capability is proposed. The proposed technique transforms a secret message into partial shares by Shamir’s (k, n)-threshold secret sharing scheme with n = k + 1. The generated k+1 partial shares then are embedded into the numeric items to be disguised as part of the website’s numeric content, yielding the stego numeric content. Afterward, a receiver links to the website and extracts every k shares among the k+1 ones from the stego numeric content to compute k+1 copies of the secret, and the phenomenon of value consistency of the computed k+1 copies is taken as an evidence to determine whether the extracted message is authentic or not, attaining the goal of self-authentication of the extracted secret message. Experimental results and discussions are provided to show the feasibility and effectiveness of the proposed method.




References:
[1] Shailender Gupta, Ankur Goyal, Bharat Bhushan,”Information Hiding
Using Least Significant Bit Steganography and Cryptography.”
International Journal of Modern Education and Computer Science, vol.4,
no.6, pp.27-34, 2012.
[2] Khan, M. K., Naseem, M., Hussain, I. M. and Ajmal, A., “Distributed
Least Significant Bit technique for data hiding in images.” 2011 IEEE
14th International Multitopic Conference (INMIC), pp. 149-154, 2011.
[3] Darabkh, K. A., Jafar, I. F., Al-Zubi, R. T., and Hawa, M., “An improved
image least significant bit replacement method.” In Information and
Communication Technology, Electronics and Microelectronics (MIPRO),
2014 37th International Convention on. IEEE. pp. 1182-1186, 2014.
[4] Da-Chun Wu and Wen-Hsiang Tsai, “A steganographic method for
images by pixel-value differencing”, Pattern Recognition Letters, vol. 24,
no. 9-10, pp. 1613–1626, 2003.
[5] Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai and Min-Shiang
Hwang, “A high quality steganographic method with pixel-value
differencing and modulus function.” Journal of Systems and Software,
vol. 81, no. 1, pp. 150-158, 2008.
[6] Zhang, Xinpeng, and Shuozhong Wang. “Vulnerability of pixel-value
differencing steganography to histogram analysis and modification for
enhanced security.” Pattern Recognition Letters, vol. 25, no. 3, pp.
331-339, 2004.
[7] Lee, I-Shi, and Wen-Hsiang Tsai. “A new approach to covert
communication via PDF files.” Signal Processing, vol. 90, no. 2, pp.
557-565, 2010.
[8] Park, Bora, Jungheum Park, and Sangjin Lee. “Data concealment and
detection in Microsoft Office 2007 files.” Digital Investigation, vol. 5, no.
3-4, pp. 104-114, 2009.
[9] Gopalan, Kaliappan. “Audio steganography using bit modification.”
Multimedia and Expo, 2003. ICME'03. Proceedings. 2003 International
Conference on. IEEE, vol. 1, pp. I-629-32, 2003.
[10] Qazanfari, Kazem, and Reza Safabakhsh. “A new steganography method
which preserves histogram: Generalization of LSB++.” Information
Sciences, vol. 277, pp. 90-101, 2014. [11] Lee, Yeuan-Kuen, and Ling-Hwei Chen. "An adaptive image
steganographic model based on minimum-error lsb replacement." Nineth
National Conference on Information Security. pp. 8-15, 1999.
[12] Chang, Chin-Chen, and Hsien-Wen Tseng. "A steganographic method for
digital images using side match." Pattern Recognition Letters, vol. 25,
no.12, pp. 1431-1437, 2004.
[13] Holub, Vojtěch, and Jessica Fridrich. "Digital image steganography using
universal distortion." Proceedings of the first ACM workshop on
Information hiding and multimedia security. ACM, pp. 59-68, 2013.
[14] Xinpeng Zhang. “Reversible data hiding in encrypted image.” Signal
Processing Letters, IEEE, vol. 18, no. 4, pp. 255-258, 2011.
[15] C. W. Lee and W. H. Tsai, “A Covert Communication Method via
Spreadsheets by Secret Sharing with a Self-Authentication Capability,”
Journal of Systems and Software, vol. 86, no. 2, pp. 324-334, 2013.
[16] A. Shamir, “How to share a secret,” Communication of ACM, vol. 22, pp.
612–613, 1979.