New Solution for Password Key Transferring in Steganography Methods

One of the methods introduced for establishing hidden communication is steganography. One of the problems in these methods is the security of transferring password key used for steganography between sender and receiver of secure data. In this paper a new method is proposed for solving this problem using CAPTCHA method. In this method the password key is drawing in the image and the data are hidden in the image by this password key. So the human receiver can recognize the password from the image and extract the data from the image using this password, but a computer program cannot do above operation. By this method the user does not need to memorize any password for extracting the data.

[1]  Vladimiro Miranda,et al.  EPSO-evolutionary particle swarm optimization, a new algorithm with applications in power systems , 2002, IEEE/PES Transmission and Distribution Conference and Exhibition.

[2]  Yue Shi,et al.  A modified particle swarm optimizer , 1998, 1998 IEEE International Conference on Evolutionary Computation Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98TH8360).

[3]  Chu Kiong Loo,et al.  A new class of operators to accelerate particle swarm optimization , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[4]  Andries Petrus Engelbrecht,et al.  Fundamentals of Computational Swarm Intelligence , 2005 .

[5]  James Kennedy,et al.  The particle swarm: social adaptation of knowledge , 1997, Proceedings of 1997 IEEE International Conference on Evolutionary Computation (ICEC '97).

[6]  Xin Yao,et al.  Evolutionary programming made faster , 1999, IEEE Trans. Evol. Comput..

[7]  Peter J. Angeline,et al.  Evolutionary Optimization Versus Particle Swarm Optimization: Philosophy and Performance Differences , 1998, Evolutionary Programming.

[8]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[9]  Vladimiro Miranda,et al.  EPSO - best-of-two-worlds meta-heuristic applied to power system problems , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[10]  M. Montaz Ali,et al.  Population set-based global optimization algorithms: some modifications and numerical studies , 2004, Comput. Oper. Res..

[11]  John Langford,et al.  Telling humans and computers apart automatically , 2004, CACM.

[12]  Xin Yao,et al.  Fast Evolutionary Programming , 1996, Evolutionary Programming.

[13]  Sajad Shirali-Shahreza,et al.  Collage CAPTCHA , 2007, 2007 9th International Symposium on Signal Processing and Its Applications.

[14]  Manuel Blum,et al.  Toward a theory of steganography , 2004 .

[15]  Kevin Curran,et al.  An Evaluation of Steganography Methods , 2003 .

[16]  P. J. Angeline,et al.  Using selection to improve particle swarm optimization , 1998, 1998 IEEE International Conference on Evolutionary Computation Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98TH8360).

[17]  Yuhui Shi,et al.  Particle swarm optimization: developments, applications and resources , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).

[18]  Henry S. Baird,et al.  ScatterType: a reading CAPTCHA resistant to segmentation attack , 2005, IS&T/SPIE Electronic Imaging.