A Robust and Secure Methodology for Network Communications

With the rapid development of a network multimedia environment, digital data can now be distributed much faster and easier. To maintain privacy and security cryptographic alone is not enough. In recent years, steganography has become attractive vicinity for network communications. In this paper, an attempt is made to develop a methodology which calculate the variance of secret message (which the sender wishes to send) and accordingly create a carrier file. This carrier file can be sent in any network (secure & unsecure) without giving any doubt in the attackers mind. The practical implementation of this has been done on Microsoft platform. Experimental results show the feasibility of the proposed techniques.

[1]  Ajith Abraham,et al.  Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[2]  Gadadhar Sahoo,et al.  Some new methodologies for secured data coding and transmission , 2010, Int. J. Electron. Secur. Digit. Forensics.

[3]  Claudio Soriente,et al.  Taking advantages of a disadvantage: Digital forensics and steganography using document metadata , 2007, J. Syst. Softw..

[4]  Yun Q. Shi,et al.  Formatted text document data hiding robust to printing, copying and scanning , 2005, 2005 IEEE International Symposium on Circuits and Systems.

[5]  K.B. Raja,et al.  A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.

[6]  Scott Craver,et al.  On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.

[7]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[8]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[9]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[10]  Bret Dunbar,et al.  A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .

[11]  Gadadhar Sahoo,et al.  Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization , 2008 .

[12]  Lisa M. Marvel,et al.  A methodology for data hiding using images , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).

[13]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[14]  Christian Cachin,et al.  An information-theoretic model for steganography , 2004, Inf. Comput..

[15]  Wen-Hsiang Tsai,et al.  A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.

[16]  Subariah Ibrahim,et al.  Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..

[17]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.