A New Solution for Password Key Transferring in Steganography Methods by CAPTCHA through MMS Technology

The Multimedia Messaging System (MMS) allows a user of a mobile phone to send messages containing multimedia objects, such as images, audio or video clips. On the other hand establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Therefore steganography in MMS is an interesting idea. One of the problems in steganography methods is the security of transferring password key used for steganography between sender and receiver of secure data. In this paper a new method is proposed for solving this problem using CAPTCHA method through MMS messages. In this method the password key is spoken in an audio file and the data are hidden in the image by this password key. Then the image and audio files are inserted in a MMS message and sent to the receiver. Therefore the human receiver can recognize the password from the audio file and extract the data from the image using this password, but the computer cannot recognize the spoken word from the audio file and extracting the password. By this method the user does not need to memorize any password for extracting the data. This method has been implemented in J2ME programming language.

[1]  J C Judge,et al.  Steganography: Past, Present, Future , 2001 .

[2]  Mohammad Hassan Shirali-Shahreza,et al.  Persian/Arabic Baffletext CAPTCHA , 2006, J. Univers. Comput. Sci..

[3]  Giannis F. Marias,et al.  Alternatives for Multimedia Messaging System Steganography , 2005, CIS.

[4]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[5]  A. M. Turing,et al.  Computing Machinery and Intelligence , 1950, The Philosophy of Artificial Intelligence.

[6]  Mohammad Shirali Shahreza An improved method for steganography on mobile phone , 2005 .

[7]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[8]  A. M. Turing,et al.  Computing Machinery and Intelligence , 1950, The Philosophy of Artificial Intelligence.

[9]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[10]  M. Masotti,et al.  Lightweight steganography on smartphones , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[11]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[12]  Sajad Shirali-Shahreza,et al.  Collage CAPTCHA , 2007, 2007 9th International Symposium on Signal Processing and Its Applications.

[13]  Sajad Shirali-Shahreza,et al.  A New Anti-Spam Protocol Using CAPTCHA , 2007, 2007 IEEE International Conference on Networking, Sensing and Control.

[14]  Manuel Blum,et al.  Toward a theory of steganography , 2004 .

[15]  Tsz-Yan Chan,et al.  Using a test-to-speech synthesizer to generate a reverse Turing test , 2003, Proceedings. 15th IEEE International Conference on Tools with Artificial Intelligence.

[16]  Patrice Y. Simard,et al.  Using Machine Learning to Break Visual Human Interaction Proofs (HIPs) , 2004, NIPS.

[17]  Kevin Curran,et al.  An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.

[18]  J. Doug Tygar,et al.  Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks , 2005, HIP.

[19]  Bernd Girod,et al.  Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video , 1997, ECMAST.

[20]  John Langford,et al.  Telling humans and computers apart automatically , 2004, CACM.