Compression‐based steganography

Conventional privacy‐enforcement mechanisms, such as encryption‐based ones, are frequently used to prevent third‐party eavesdroppers to intercept confidential information exchanged between two or more parties. However, the use of such mechanisms can be perceivable and it alerts the involved intercepting entities that could devote some effort in trying to remove the protection, eg, by cracking the encryption keys used or by exploiting the vulnerabilities of the technological solution used to protect the data. Sometimes, from the security point of view, avoiding to draw the attention or suspect to intermediate intercepting entities, may be better than protecting a data in a conventional manner. In such direction, one of the most effective approaches is hiding the secret information to be exchanged inside other data, through steganographic techniques. In this work, we exploit, for this specific purpose, the hierarchical structure of a compressed archive, as well as the algorithms and parameters used to create and maintain such archive. It is important to point out that, by doing this, the secret information is in no way semantically related to the contents of the compressed archive. This can be extremely useful in many cloud‐based situations where several confidential data is moved across multiple independent data center, which are under the control of different and not always fully trusted authorities. The effectiveness of this proposal has been assessed by using a properly designed and implemented prototype, where extensive tests have been performed within the context of a proof‐of‐concept.

[1]  Roman V. Yampolskiy,et al.  Steganography and Visual Cryptography in Computer Forensics , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[2]  Alfredo De Santis,et al.  An asynchronous covert channel using spam , 2012, Comput. Math. Appl..

[3]  Alfredo De Santis,et al.  On-Board Format-Independent Security of Functional Magnetic Resonance Images , 2017, ACM Trans. Embed. Comput. Syst..

[4]  Ilsun You,et al.  A Secure Distributed Video Surveillance System Based on Portable Devices , 2012, CD-ARES.

[5]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[6]  Friedrich L. Bauer Decrypted secrets - methods and maxims of cryptology , 1997 .

[7]  Alfredo De Santis,et al.  One-pass lossless data hiding and compression of remote sensing data , 2019, Future Gener. Comput. Syst..

[8]  Alfredo De Santis,et al.  On the Protection of fMRI Images in Multi-domain Environments , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.

[9]  Jeff Gilchrist Elytra PARALLEL DATA COMPRESSION WITH BZIP 2 , 2003 .

[10]  Pejman Khadivi,et al.  Hardware implementation of a novel adaptive version of Deflate compression algorithm , 2010, 2010 18th Iranian Conference on Electrical Engineering.

[11]  Bruno Carpentieri,et al.  The AVQ Algorithm: Watermarking and Compression Performances , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.

[12]  Nagarajan Ranganathan,et al.  High-speed VLSI designs for Lempel-Ziv-based data compression , 1993 .

[13]  Ilsun You,et al.  Secure and distributed video surveillance via portable devices , 2014, J. Ambient Intell. Humaniz. Comput..

[14]  Alfredo De Santis,et al.  On the protection of consumer genomic data in the Internet of Living Things , 2017, Comput. Secur..

[15]  Marek R. Ogiela,et al.  Key Generation for Multi-Secret Steganography , 2015, 2015 2nd International Conference on Information Science and Security (ICISS).

[16]  Alfredo De Santis,et al.  Protection of Microscopy Images through Digital Watermarking Techniques , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.

[17]  Dmitry A. Shkarin,et al.  PPM: one step to practicality , 2002, Proceedings DCC 2002. Data Compression Conference.

[18]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[19]  Alfredo De Santis,et al.  Format-Independent Protection of DNA Microarray Images , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).

[20]  Marek R. Ogiela,et al.  False and multi-secret steganography in digital images , 2015, Soft Comput..

[21]  Stefan Katzenbeisser,et al.  Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.

[22]  Bruno Carpentieri,et al.  Copyright Protection for Digital Images on Portable Devices , 2016, Comput. Informatics.

[23]  Francesco Palmieri,et al.  Automatic security assessment for next generation wireless mobile networks , 2011, Mob. Inf. Syst..

[24]  Marek R. Ogiela,et al.  Fuzzy Vault Schemes in Multi-secret Digital Steganography , 2015, 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA).

[25]  J. van Leeuwen,et al.  Information Hiding , 1999, Lecture Notes in Computer Science.

[26]  Alfredo De Santis,et al.  Reversible Copyright Protection for DNA Microarray Images , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).

[27]  Bruno Carpentieri,et al.  A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.

[28]  Bruno Carpentieri,et al.  Copyright Protection for Images on Mobile Devices , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[29]  Alfredo De Santis,et al.  E-mail-Based Covert Channels for Asynchronous Message Steganography , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.