Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach

This paper presents a Multilayer Partially Homomorphic Encryption Text Steganography, an invisible approach for covert communication. Existing text-based schemes are either successive in obtaining high concealing capacity, imperceptibility or robusrnes, but failed to achieve the balance between these conflicting parameters. To fill the gaps, we propose a new steganography scheme that successfully addresses the limitations of existing schemes. To achieve high hidden capacity, instead of using conventional secret stream embedding process, we substitute character of secret message with the cover message. Conversion of the multi-variate secret message into alphabets through the alphabetic transformation process is another additive characteristic of our proposed method which resolves the problem of cover message selection. Our proposed scheme is a blind embedding scheme that replaces a character of secret message with a character of cover message and hence-forth makes it zero-perceptible. Furthermore, robustness is achieved through implanting multilayer encoding concept where block encoding, use of partially homomorphic encryption, and alphabetic transformation provide multilayer security to secret message before its actual embedding. This multilayer encryption process also assists in the reduction of secret message size thus creating more space for concealment. Additionally, key generation process is also improved by employing identical range for the selection of both prime numbers in partially homomorphic algorithm to generate public and private keys for encryption process. We compared our scheme with the existing schemes to evaluate capacity, imperceptibility and robustness of the proposed method. Experimental results demonstrate that all identified issues of text steganography are successfully addressed and our proposed scheme outperforms the existing similar steganographic mechanisms.

[1]  Nuzhat Naqvi,et al.  Urdu text steganography: Utilizing isolated letters , 2015 .

[2]  Lip Yee Por,et al.  Information Hiding: A New Approach in Text Steganography , 2008 .

[3]  Sathiamoorthy Manoharan,et al.  A Comparative Review of Steganalysis Techniques , 2015, 2015 2nd International Conference on Information Science and Security (ICISS).

[4]  Abdelrahman Altigani,et al.  A hybrid approach to secure transmitted messages using advanced encryption standard (AES) and Word Shift Coding Protocol , 2013, 2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE).

[5]  Zhangbing Zhou,et al.  Audio steganography with AES for real-time covert voice over internet protocol communications , 2014, Science China Information Sciences.

[6]  Harsh K. Verma,et al.  A high capacity text steganography scheme based on LZW compression and color coding , 2017 .

[7]  Mohammad Hassan Shirali-Shahreza,et al.  A New Synonym Text Steganography , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[8]  Vishnu Sharma,et al.  Solving security issues in mobile computing using cryptography techniques — A Survey , 2015, International Conference on Computing, Communication & Automation.

[9]  Wesam Bhaya,et al.  Text Steganography based on Font Type in MS-Word Documents , 2013, J. Comput. Sci..

[10]  Mohammad Hassan Shirali-Shahreza,et al.  A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).

[11]  Chia-Chen Lin,et al.  A reversible information hiding scheme using left-right and up-down chinese character representation , 2009, J. Syst. Softw..

[12]  Sangita Roy,et al.  A novel approach to format based text steganography , 2011, ICCCS '11.

[13]  Esra Satir,et al.  A compression-based text steganography method , 2012, Journal of Systems and Software.

[14]  Cao Qi,et al.  A secure text steganography based on synonym substitution , 2013, IEEE Conference Anthology.

[15]  Jie Zhu,et al.  Steganography for MP3 audio by exploiting the rule of window switching , 2012, Comput. Secur..

[16]  Samayveer Singh,et al.  A high capacity email based text steganography scheme using Huffman compression , 2016, 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN).

[17]  Samayveer Singh,et al.  An Email based high capacity text steganography scheme using combinatorial compression , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).

[18]  A. A. Mohamed An improved algorithm for information hiding based on features of Arabic text: A Unicode approach , 2014 .

[19]  R. Thamaraiselvan,et al.  A Novel approach of Hybrid Method of Hiding the Text Information Using Stegnography , 2012 .

[20]  Vijay H. Mankar,et al.  Image steganography using redundant discrete wavelet transform and QR factorization , 2016, Comput. Electr. Eng..

[21]  May Htet,et al.  A New Embedding Algorithm for Data Security , 2015 .

[22]  Haider Ismael Shahadi,et al.  Concurrent hardware architecture for dual-mode audio steganography processor-based FPGA , 2016, Comput. Electr. Eng..

[23]  Ahmad Reza Naghsh-Nilchi,et al.  A novel joint secret image sharing and robust steganography method using wavelet , 2013, Multimedia Systems.

[24]  Abdelrahman Desoky,et al.  Listega: list-based steganography methodology , 2009, International Journal of Information Security.

[25]  Ayan Biswas,et al.  Hiding Data in Text Through Changing in Alphabet Letter Patterns (CALP) , 2011 .

[26]  Nor Ashidi Mat Isa,et al.  A data-hiding technique using scene-change detection for video steganography , 2016, Comput. Electr. Eng..

[27]  Tao Zhang,et al.  A novel blind detector for additive noise steganography in JPEG decompressed images , 2012, Multimedia Tools and Applications.

[28]  Prem Singh,et al.  A Novel Approach of Text Steganography based on null spaces , 2012 .

[29]  Fei Wang,et al.  A novel text steganography by context-based equivalent substitution , 2013, 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013).

[30]  KokSheik Wong,et al.  UniSpaCh: A text-based data hiding method using Unicode space characters , 2012, J. Syst. Softw..

[31]  Ganesh Aithal A New Approach for Video Steganography Based on Randomization and Parallelization , 2016 .

[32]  Munesh Chandra Trivedi,et al.  Analysis of Different Text Steganography Techniques: A Survey , 2016, 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT).

[33]  Rongxing Lu,et al.  Homomorphic Public Key Encryption Techniques , 2016 .

[34]  Sung Wook Baik,et al.  Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..