A New 3-Bit Hiding Covert Channel Algorithm for Public Data and Medical Data Security Using Format-Based Text Steganography

A New 3-Bit Hiding Covert Channel Algorithm for Public Data and Medical Data Security Using Format-Based Text Steganography

R. Gurunath, Debabrata Samanta
Copyright: © 2023 |Pages: 22
DOI: 10.4018/JDM.324076
Article PDF Download
Open access articles are freely available for download

Abstract

The primary concern of every individual and organization is the security of sensitive information generated via authorized activities; nonetheless, illicit data drawing and extraction by attackers is prevalent, which may be mitigated by covert approaches. Although cypher techniques give excellent protection, they raise suspicion in the eyes of adversaries, resulting in both passive and active assaults on the information sent. Steganography, on the other hand, helps to reduce third-party suspicion. This method conceals sensitive information on cover data and transports it to the targets without skepticism. However, the issue depends entirely on the effectiveness of the embedding method; it must also satisfy other data concealing features such as embedding capacity. As payload grows, so does skepticism. This article handled this issue to lessen suspicion while maintaining embedding capacity. The article proposes a format-based text concealing algorithm, a traditional way for dealing with embedding capacity and invisibility. The authors compared our results to those of other similar current methods. They discovered that theirs are pretty decent—the present study offered both standard public communication security and medical data protection.
Article Preview
Top

1. Introduction

The most critical concern in information transmission is security; encrypted data typically offer protection but attracts the attention of unauthorized Internet observers and is a sort of passive information assault. On the internet, attackers may find many tools for extracting information, analyzing it, and launching active attacks on encrypted data. The above behavior is cypher text, which is visible to everyone on the transport, causing suspicion. After cryptography privacy protection(Laskar, 2012)(Malina, 2021), the next degree of security is steganography, in which information is encrypted and disguised behind innocuous data and conveyed to the targets, avoiding suspicion. Image, audio, video, text, and network protocols are all examples of benign data(Gurunath R. &., 2021)(Gurunath R. &., 2021).Watermarking technology, like Steganography, conceals data on a cover to safeguard the security of digital documents. Watermarking protects the copyright and ensures the secrecy of the document's details. The document type might be anything from an image to text(Singh, 2021)(Iwendi, 2020).

Steganography uses a concealed writing method instead of transforming data into an unreadable format for secret communication(Sherly, 2010). Only the transmitter and recipient have access to the hidden message. Steganography derives its name from the Greek words “steganos,” which means “covered,” and “graphia,” which means “writing.” Johannes Trithemius used that name for the first time between 1462 and 1516(Fridrich, 2009).

The earliest steganographic techniques were discovered roughly 2500 years ago in ancient Greece when people used to convey secret information by etching it on their shaved heads. When the hair on the head comes back, send that individual to the target to bring the confidential material. During the same period, another example of steganography was embedding the message on a wood surface covered with a wax-like substance to prevent suspicion from other persons during transport(Shin, 2008).

In his ascent to power in ancient India, Chanakya aided the first Mauryan emperor Chandragupta in 283 BC (2303-2395 years ago). He was recognized as a key figure in creating the Maurya Empire. Both Chandragupta and his son Bindusara had Chanakya as their principle counsel. Chanakya proposed a highly evolved and upgraded all-pervasive system of espionage and government. During that period, hidden messages were sent by embedding them in intricately designed puzzles or poems, later carried to the intended recipients(Sarin, 2015).

There are several instances of such early steganography, and a similar concept has been used today as digital data hiding. It is now an element of information technology, alongside cryptography. Concealing, hiding, camouflaging, and embedding data on a text, image, audio, video, and using network protocol are all terms used to describe the modern-day digital steganography process.

Figure 1.

A typical classical steganography

JDM.324076.f01

The digital steganography process consists of two sub-processes: embedding and extraction (Figure 1), carried out by the transmitter and receiver, respectively. The process's fundamental purpose is to deliver the message to the intended recipient safely. The message is encoded inside an innocent cover object to avoid detection by third parties, and only the parties involved are aware of how to embed and extract the message. Stego-text results from embedding are comparable to a cover object holding a message and are subsequently sent to the receiver through the Internet (Insecure Channel). The receiver understands how to decode the message from the Stego-object. If a third party suspects the communication, an optional Stego-key can be employed to safeguard it. Stego-key produced by one of the communication parties using any known method and sent to the other communicating party through a secure channel. However, third-party communication attacks on the Internet cannot be ruled out. They are continually attempting to disrupt the steganography process, known as steganalysis.

Complete Article List

Search this Journal:
Reset
Volume 35: 1 Issue (2024)
Volume 34: 3 Issues (2023)
Volume 33: 5 Issues (2022): 4 Released, 1 Forthcoming
Volume 32: 4 Issues (2021)
Volume 31: 4 Issues (2020)
Volume 30: 4 Issues (2019)
Volume 29: 4 Issues (2018)
Volume 28: 4 Issues (2017)
Volume 27: 4 Issues (2016)
Volume 26: 4 Issues (2015)
Volume 25: 4 Issues (2014)
Volume 24: 4 Issues (2013)
Volume 23: 4 Issues (2012)
Volume 22: 4 Issues (2011)
Volume 21: 4 Issues (2010)
Volume 20: 4 Issues (2009)
Volume 19: 4 Issues (2008)
Volume 18: 4 Issues (2007)
Volume 17: 4 Issues (2006)
Volume 16: 4 Issues (2005)
Volume 15: 4 Issues (2004)
Volume 14: 4 Issues (2003)
Volume 13: 4 Issues (2002)
Volume 12: 4 Issues (2001)
Volume 11: 4 Issues (2000)
Volume 10: 4 Issues (1999)
Volume 9: 4 Issues (1998)
Volume 8: 4 Issues (1997)
Volume 7: 4 Issues (1996)
Volume 6: 4 Issues (1995)
Volume 5: 4 Issues (1994)
Volume 4: 4 Issues (1993)
Volume 3: 4 Issues (1992)
Volume 2: 4 Issues (1991)
Volume 1: 2 Issues (1990)
View Complete Journal Contents Listing