Abstract
The use of textual list of items, e.g., products, subjects, books, etc., is widely popular and linguistically legible. This motivates the development of List-Based Steganography Methodology (Listega). Listega takes advantage of such use of textual list to camouflage data by exploiting itemized data to conceal messages. Simply, it encodes a message then assigns it to legitimate items in order to generate a text-cover in a form of list. The generated list of items, the text-cover, can be embedded among other legitimate noncoded items for more protection based on a predetermined protocol among communicating parties such as read every other item, every fifth item, or any other way than the use of particular sequence. Listega neither hides data in a noise (errors) nor produces noise. Instead, it camouflages data by manipulating noiseless list of legitimate items. Listega establishes a covert channel among communicating parties by employing justifiably reasons based on the common practice of using textual list of items in order to achieve unsuspicious transmission of generated covers. The presented implementation, validation, and steganalysis of Listega demonstrate: the robustness capabilities of achieving the steganographic goal, the adequate room for concealing data, and the superior bitrate of roughly 1.32 up to 3.87% than contemporary linguistic steganography approaches.
Similar content being viewed by others
References
Kipper, G.: Investigator’s Guide to Steganography, pp. 15–16. CRC Press LLC, Boca Raton (2004)
Davern, P., Scott, M.: Steganography its history and its application to computer based data files. Internal Report Working Paper: CA-0795. School of Computing, Dublin City University. http://computing.dcu.ie/research/papers/1995/0795.pdf (1995). Accessed 3 Aug 2006
Johnson N.F., Katzenbeisser S.: A survey of steganographic techniques. In: Katzenbeisser, S., Petitcolas, F.(eds) Information Hiding, pp. 43–78. Artech House, Norwood (1999)
Kessler, G.C.: An Overview of Steganography for the Computer Forensics Examiner. An edited version, issue of Forensic Science Communications. Technical Report, 6, No. 3 (2004)
Martin A., Sapiro G., Seroussi G.: Is image steganography natural? IEEE Trans. Image Process. 14(12), 2040–2050 (2005)
Desoky A.: Graphstega: graph steganography methodology. J. Digit. Forensic Pract. 2(1), 27–36 (2008). doi:10.1080/15567280701797087
Desoky, A., Younis, M.: PSM: Public Steganography Methodology. Technical Report TR-CS-06–07, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County (2006)
Petitcolas, F.A.P.: Information hiding—a survey. In: Anderson, R.J., Kuhn, M.G. (eds.) Proceedings of the IEEE, vol. 87(7), pp. 1062–1078 (1999)
Bennett, K.: Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text. Technical Report CERIAS Tech Report 2004–13, Purdue University (2004)
Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new approach to Persian/Arabic text steganography. In: The Proceedings of 5th IEEE/ACIS International Conference on Computer and Information Science (ICIS-COMSAR 2006), 10–12 July, pp. 310–315. Honolulu, Hawaii (2006)
Anderson, R.J., Needham, R., Shamir, A.: The steganographic file system. In: Proceedings of the Second International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 1525, pp. 73–82. Springer, Berlin (1998)
ScramDisk: Free Hard Drive Encryption For Windows 95 & 98. http://www.scramdisk.clara.net. Accessed 3 Aug 2008
Handel, T.G., Sandford, M.T.: Data hiding in the OSI network model. In: Information Hiding: First International Workshop, Proceedings. Lecture Notes in Computer Science, vol. 1174, pp. 23–38. Springer, Berlin (1996)
Kahn, D.: The Codebreakers: The Story of Secret Writing. Revised edition. Scribner, New York (1996)
Wayner, P.: Mimic functions. Cryptologia XVI(3), 193–214 (1992). doi:10.1080/0161-119291866883
Wayner, P.: Disappearing Cryptography, 2nd edn, pp. 81–128. Morgan Kaufmann, Menlo Park (2002)
Chapman, M., Davida, G.: Hiding the hidden: a software system for concealing ciphertext as innocuous text. In: The Proceedings of the International Conference on Information and Communications Security. Lecture Notes in Computer Science, vol. 1334, pp. 335–345. Springer, Beijing (1997)
Chapman, M., Davida, G.I.: Nicetext System Official Home Page. http://www.nicetext.com. Accessed 3 Aug 2007
Chapman, M. et al.: A practical and effective approach to large-scale automated linguistic steganography. In: Proceedings of the Information Security Conference (ISC’01), pp. 156–165. Lecture Notes in Computer Science, vol. 2200. Springer, Malaga (2001)
Chapman, M., Davida, G.I.: Plausible deniability using automated linguistic steganography. In: Davida, G., Frankel, Y. (eds.) International Conference on Infrastructure Security (InfraSec’02). Lecture Notes in Computer Science, vol. 2437, pp. 276–287. Springer, Berlin (2002)
Grothoff, C. et al.: Translation-based steganography. Technical Report CSD TR# 05-009, Purdue University (CERIAS Tech Report 2005-39) (2005)
Grothoff, C. et al.: Translation-based steganography. In: Proceedings of Information Hiding Workshop (IH 2005), pp. 213–233. Springer, Barcelona (2005)
Stutsman, R. et al.: Lost in just the translation. In: Proceedings of the 21st Annual ACM Symposium on Applied Computing (SAC’06). Dijon, France (2006)
Topkara, M., Topkara, U., Atallah, M.J.: Information hiding through errors: a confusing approach. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents (2007)
Shirali-Shahreza, M. et al.: Text steganography in SMS. In: International Conference on Convergence Information Technology, Issue 21–23, pp. 2260–2265 (2007)
Winstein, K.: Lexical steganography through adaptive modulation of the word choice hash. January 1999. Secondary education at the Illinois Mathematics and Science Academy. http://alumni.imsa.edu/~keithw/tlex/lsteg.ps. Accessed 15 April 2008
Winstein, K.: Lexical steganography. http://alumni.imsa.edu/~keithw/tlex. Accessed 3 Aug 2008
Bolshakov, I.A.: A method of linguistic steganography based on collocationally-verified synonymy. In: Fridrich, J.J. (ed.) Information Hiding: 6th International Workshop. Lecture Notes in Computer Science, vol. 3200, pp. 180–191. Springer, Berlin (2004)
Bolshakov, I.A., Gelbukh, A.: Synonymous paraphrasing using wordnet and internet. In: Meziane, F., Metais, E. (eds.) Natural Language Processing and Information Systems: 9th International Conference on Applications of Natural Language to Information Systems, NLDB 2004. Lecture Notes in Computer Science, vol. 3136, pp. 312–323. Springer, Berlin (2004)
Calvo, H., Bolshakov, I.A.: Using selectional preferences for extending a synonymous paraphrasing method in steganography. In: Sossa Azuela, J.H. (ed.) Avances en Ciencias de la Computacion e Ingenieria de Computo—CIC’2004: XIII Congreso Internacional de Computacion, pp. 231–242 (2004)
Chand, V., Orgun, C.O.: Exploiting linguistic features in lexical steganography: design and proof-of-concept implementation. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS’06), vol. 6, p. 126b. IEEE, New York (2006)
Nakagawa, H., Sampei, K., Matsumoto, T., Kawaguchi, S., Makino, K., Murase, I.: Text information hiding with preserved meaning—a case for japanese documents. IPSJ Trans. 42(9):2339–2350 (2001). Originally published in Japanese. A similar paper By the first author in English. http://www.r.dl.itc.u-tokyo.ac.jp/nakagawa/academic-res/finpri02.pdf. Accessed 4 June 2008
Niimi, M., Minewaki, S., Noda, H., Kawaguchi, E.: A framework of text-based steganography using sd-form semantics model. IPSJ J. 44(8) (2003). http://www.know.comp.kyutech.ac.jp/STEG03/STEG03-PAPERS/papers/12-Niimi.pdf. Accessed 3 June 2008
Bergmair, R., Katzenbeisser, S.: Content-aware steganography: about lazy prisoners and narrow-minded wardens. In: Proceedings of the 8th Information Hiding Workshop. Lecture Notes in Computer Science, vol. 4437, pp. 109–123. Springer, Berlin (2007) (in print)
Bergmair, R.: Towards linguistic steganography: a systematic investigation of approaches, systems, and issues. final year project, The University of Derby (2004)
Bergmair, R., Katzenbeisser, S.: Towards human interactive proofs in the text-domain. In: Proceedings of the 7th Information Security Conference (ISC’04). Lecture Notes in Computer Science. Springer, Berlin (2004)
Topkara, U., Topkara, M., Atallah, M.J.: The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. In: MM&Sec’06: Proceeding of the 8th Workshop on Multimedia and Security, pp. 164–174. ACM Press, New York (2006)
Murphy, B., Vogel, C.: The syntax of concealment: reliable methods for plain text information hiding. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents (2007)
Atallah, M.J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., Naik, S.: Natural language watermarking: design, analysis, and a proof-of-concept implementation. In: Moskowitz, I.S. (ed.) Information Hiding: Fourth International Workshop. Lecture Notes in Computer Science, vol. 2137, pp. 185–199. Springer, Berlin (2001)
Atallah, M.J., Raskin, V., Hempelmann, C.F., Topkara, M., Sion, R., Topkara, U., Triezenberg, K.E.: Natural language watermarking and tamperproofing. In: Petitcolas, F.A.P. (ed.) Information Hiding: Fifth International Workshop. Lecture Notes in Computer Science, vol. 2578, pp. 196–212. Springer, Berlin (2002)
Desoky, A.: Nostega: noiseless steganography paradigm. J. Digit. Forensic Pract. (in press)
Desoky, A. et al.: Auto-summarization-based steganography. In: The Proceedings of the 5th IEEE International Conference on Innovations in Information Technology, Al-Ain, UAE (2008) (in press)
Cvejic, N., Seppanen, T.: Increasing robustness of LSB audio steganography using a novel embedding method. In: The Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04), pp. 533–537, Las Vegas, Nevada (2004)
Cvejic, N., Seppanen, T.: Reduced distortion bit-modification for LSB audio steganography. In:’04. 2004 in the Proceedings of the 7th International Conference on Signal Processing (ICSP 04), vol. 3, pp. 2318–2321, Beijing, China (2004)
Bender W. et al.: Techniques for data hiding. IBM Systems J. 35(3, 4), 313–336 (1996)
Kirovski, D., Malvar, H.: Spread-spectrum audio watermarking: requirements, applications, and limitations. In: The Proceedings of the 4th IEEE Workshop on Multimedia Signal Processing, pp. 219–224. Cannes, France (2001)
Ansari, R., Malik, H., Khokhar, A.: Data-hiding in audio using frequency-selective phase alteration. In: The Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP’04), 17–21 May, vol. 5, pp. 389–92 (2004)
Gruhl, D., Lu, A., Bender, W.: Echo hiding. In: The Proceedings of First International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 1174, pp. 295–316, Cambridge, UK. Springer, Berlin (1996)
Desoky, A., Younis, M.: Chestega: chess steganography methodology. J. Secur. Commun. Netw. (in press)
Laywine, C.F., Mullen, G.L.: Discrete Mathematics Using Latin Squares, 1st edn. Wiley-Interscience, London (1998)
Dénes, J., Keedwell, A.D.: Latin Squares (Annals of Discrete Mathematics), vol. 46. Elsevier, North-Holland (1991)
Google Internet Search Engine: http://www.google.com, used to generate the lest of items. Accessed 26 Sept 2008
List of Songs: http://www.advicenators.com/qview.php?q=549142. Accessed 26 Sept 2008
Intranet Book List: http://www.iblist.com. Accessed 26 Sept 2008
Spam Mimic: http://www.spammimic.com. Accessed 31 July 2007
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Desoky, A. Listega: list-based steganography methodology. Int. J. Inf. Secur. 8, 247–261 (2009). https://doi.org/10.1007/s10207-009-0079-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-009-0079-0