AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media

被引:30
作者
Ahvanooey, Milad Taleby [1 ]
Li, Qianmu [1 ]
Hou, Jun [1 ,2 ]
Mazraeh, Hassan Dana [3 ]
Zhang, Jing [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Jiangsu, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Marxism Studies, Nanjing 210094, Jiangsu, Peoples R China
[3] Damghan Univ, Sch Math & Comp Sci, Damghan 36715364, Iran
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Text steganography; chat hiding; covert communication; text hiding; social media; ALGORITHM;
D O I
10.1109/ACCESS.2018.2866063
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of smartphones and widespread use of high-speed Internet, social media has become a vital part of people's daily life. Currently, text messages are used in many applications, such as mobile chatting, mobile banking, and mobile commerce. However, when we send a text message via short message service (SMS) or social media, the information contained in the text message transmits as a plain text, which exposes it to attacks. In some cases, this information may be confidential, such as banking credentials, secret missions, and confidential appointments; moreover, it is a major drawback to send such information via SMS or social media, as neither provides security before transmission. In this paper, we propose a novel text steganography technique called AITSteg, which provides end-to-end security during the transmission of text messages via SMS or social media between end users. The AITSteg technique is evaluated by considering a trusted scenario. We then evaluate the efficiency of the proposed technique in terms of embedding capacity, invisibility, robustness, and security. The experiments confirm that the AITSteg is able to prevent various attacks, including man-in-the-middle attacks, message disclosure, and manipulation by readers. Moreover, we compare the experimental results with the existing techniques to show the superiority of the proposed technique. To the best of our knowledge, this is the first text steganography technique that provides end-to-end secure transmission of the text message using symmetric keys via social media.
引用
收藏
页码:65981 / 65995
页数:15
相关论文
共 23 条
  • [1] Agarwal M., 2013, INT J NETWORK SECURI, V5, P91, DOI DOI 10.5121/ijnsa.2013.5107
  • [2] A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents
    Ahvanooey, Milad Taleby
    Li, Qianmu
    Shim, Hiuk Jae
    Huang, Yanyan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [3] Ahvanooey MT, 2017, INT J ADV COMPUT SC, V8, P30, DOI 10.14569/IJACSA.2017.081005
  • [4] An innovative technique for web text watermarking (AITW)
    Ahvanooey, Milad Taleby
    Mazraeh, Hassan Dana
    Tabasi, Seyed Hashem
    [J]. INFORMATION SECURITY JOURNAL, 2016, 25 (4-6): : 191 - 196
  • [5] SmartSteg: A New Android Based Steganography Application
    Bucerzan, D.
    Ratiu, C.
    Manolescu, M. J.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2013, 8 (05) : 681 - 688
  • [6] Logic of authentication
    Burrows, Michael
    Abadi, Martin
    Needham, Roger
    [J]. Operating Systems Review (ACM), 1989, 23 (05): : 1 - 13
  • [7] A Survey of Man In The Middle Attacks
    Conti, Mauro
    Dragoni, Nicola
    Lesyk, Viktor
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03): : 2027 - 2051
  • [8] Security behaviors of smartphone users
    Das, Amit
    Khan, Habib Ullah
    [J]. INFORMATION AND COMPUTER SECURITY, 2016, 24 (01) : 116 - 134
  • [9] Davis M., 1993, COMPUTABILITY COMPLE, P47
  • [10] Gupta S, 2015, 2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), P60, DOI 10.1109/ICIIP.2015.7414741