A Novel Plausible Deniability Scheme in Secure Steganography
The goal of steganography is to avoid drawing
suspicion to the transmission of a hidden message. If suspicion is
raised, steganography may fail. The success of steganography
depends on the secrecy of the action. If steganography is detected,
the system will fail but data security depends on the robustness of the
applied algorithm. In this paper, we propose a novel plausible
deniability scheme in steganography by using a diversionary message
and encrypt it with a DES-based algorithm. Then, we compress the
secret message and encrypt it by the receiver-s public key along with
the stego key and embed both messages in a carrier using an
embedding algorithm. It will be demonstrated how this method can
support plausible deniability and is robust against steganalysis.
[1] Y.H. Yu, C.C. Cheng, Y.C. Hu, "Hiding secret data in image via
predictive coding" , Pattern Recognition, Vol. 38, pp 691-705, 2005.
[2] Fisk G., Fisk, M., Papadopoulos, C., Joshua, N., "Eliminating
Steganography in Internet Traffic with Active Wardens",
Available:http://citeseer.nj.nec.com/fisk2eliminating.html, 2002
[3] Fabien A.B.P., Anderson R., Kuhn M.," Information Hiding- A Survey",
in Proceeding of IEEE, pp. 1062-78, 1999.
[4] Potdar V., Chang E., "Visibly Invisible". Available:
http://www.fit.cbs.curtin.edu.au/ceela/docs/index.php, 2004.
[5] Provos N., "Defending against statistical steganalysis", 10th USENIX
Security Symposium, 2001.
[6] Sallee P., "Model-based steganography", International Workshop on
Digital Watermarking, Seoul, Korea, 2003..
[7] Walton D., "Plausible Deniability and Evasion of Burden of Proof".
Available: http://io.uwinnipeg.ca/~walton/96deniability.pdf, 1996.
[8] Canetti R., Dwork C., Naor M., Ostrovsky R.,"Deniable Encryption",
Crypto '97, pp. 90-104, 1997.
[9] Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu, " Digital
Invisible Ink and its Applications in Steganography", Proceeding of the
8th workshop on Multimedia and security, Geneva, Switzerland, pp. 23
- 28, 2006.
[1] Y.H. Yu, C.C. Cheng, Y.C. Hu, "Hiding secret data in image via
predictive coding" , Pattern Recognition, Vol. 38, pp 691-705, 2005.
[2] Fisk G., Fisk, M., Papadopoulos, C., Joshua, N., "Eliminating
Steganography in Internet Traffic with Active Wardens",
Available:http://citeseer.nj.nec.com/fisk2eliminating.html, 2002
[3] Fabien A.B.P., Anderson R., Kuhn M.," Information Hiding- A Survey",
in Proceeding of IEEE, pp. 1062-78, 1999.
[4] Potdar V., Chang E., "Visibly Invisible". Available:
http://www.fit.cbs.curtin.edu.au/ceela/docs/index.php, 2004.
[5] Provos N., "Defending against statistical steganalysis", 10th USENIX
Security Symposium, 2001.
[6] Sallee P., "Model-based steganography", International Workshop on
Digital Watermarking, Seoul, Korea, 2003..
[7] Walton D., "Plausible Deniability and Evasion of Burden of Proof".
Available: http://io.uwinnipeg.ca/~walton/96deniability.pdf, 1996.
[8] Canetti R., Dwork C., Naor M., Ostrovsky R.,"Deniable Encryption",
Crypto '97, pp. 90-104, 1997.
[9] Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu, " Digital
Invisible Ink and its Applications in Steganography", Proceeding of the
8th workshop on Multimedia and security, Geneva, Switzerland, pp. 23
- 28, 2006.
@article{"International Journal of Information, Control and Computer Sciences:62172", author = "Farshad Amin and Majid Soleimanipour and Alireza Karimi", title = "A Novel Plausible Deniability Scheme in Secure Steganography", abstract = "The goal of steganography is to avoid drawing
suspicion to the transmission of a hidden message. If suspicion is
raised, steganography may fail. The success of steganography
depends on the secrecy of the action. If steganography is detected,
the system will fail but data security depends on the robustness of the
applied algorithm. In this paper, we propose a novel plausible
deniability scheme in steganography by using a diversionary message
and encrypt it with a DES-based algorithm. Then, we compress the
secret message and encrypt it by the receiver-s public key along with
the stego key and embed both messages in a carrier using an
embedding algorithm. It will be demonstrated how this method can
support plausible deniability and is robust against steganalysis.", keywords = "Steganography, Cryptography, Information Hiding.", volume = "2", number = "7", pages = "2543-3", }