Data hiding using compressed archives

The need to avoid suspicion in a potential observer/investigator, though it can be seen as a weak requirement for the protection of transmitted data, it can be extremely useful. For example, once discovered that the data has been protected by means of certain security tools, a malicious user that is strongly interested in such data could make a great effort in trying to remove the protection, for example, by cracking the password or by exploiting the vulnerabilities of the algorithm that was used to protect the data. Hence, to transfer information in a secure way, it is sometimes better to hide it inside other data, rather than protecting it in a conventional manner. One of the most important techniques in data hiding is steganography. In this work we propose a novel steganographic method which enables to hide information by using a compressed archive as information carrier. The method we propose uses these compressed archives, together with their relative hierarchical structure, to hide bits of information. We remark that by means of our method the hidden information does not have any semantic relation with respect to the content of the compressed archive, whereas such relation will concern how the archive (and the relative sub-archives) was compressed, i.e., what compression algorithms and relative parameters were used, as well as how this operation was performed. Since it is a common practice to send compressed data by means of a communication channel, we believe that our proposal can be a valid tool for steganographic purposes, since the suspect generated in a potential observer could be considered almost negligible.

[1]  Bruno Carpentieri,et al.  A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.

[2]  Bruno Carpentieri,et al.  The AVQ Algorithm: Watermarking and Compression Performances , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.

[3]  Friedrich L. Bauer Decrypted secrets - methods and maxims of cryptology , 1997 .

[4]  Friedrich L. Bauer,et al.  Decrypted secrets - methods and maxims of cryptology (4. ed.) , 2002 .

[5]  Alfredo De Santis,et al.  Format-Independent Protection of DNA Microarray Images , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).

[6]  Roman V. Yampolskiy,et al.  Steganography and Visual Cryptography in Computer Forensics , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[7]  Ilsun You,et al.  A Secure Distributed Video Surveillance System Based on Portable Devices , 2012, CD-ARES.

[8]  Alfredo De Santis,et al.  On-Board Format-Independent Security of Functional Magnetic Resonance Images , 2017, ACM Trans. Embed. Comput. Syst..

[9]  Alfredo De Santis,et al.  Reversible Copyright Protection for DNA Microarray Images , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).

[10]  Alfredo De Santis,et al.  E-mail-Based Covert Channels for Asynchronous Message Steganography , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[11]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[12]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[13]  Alfredo De Santis,et al.  On the Protection of fMRI Images in Multi-domain Environments , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.

[14]  Stefan Katzenbeisser,et al.  Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.

[15]  Ilsun You,et al.  Secure and distributed video surveillance via portable devices , 2014, J. Ambient Intell. Humaniz. Comput..

[16]  Bruno Carpentieri,et al.  Copyright Protection for Images on Mobile Devices , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[17]  Bruno Carpentieri,et al.  Copyright Protection for Digital Images on Portable Devices , 2016, Comput. Informatics.

[18]  Alfredo De Santis,et al.  An asynchronous covert channel using spam , 2012, Comput. Math. Appl..

[19]  Alfredo De Santis,et al.  Protection of Microscopy Images through Digital Watermarking Techniques , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.