Research on information steganography based on network data stream

Neural Computing and Applications - Tập 33 - Trang 851-866 - 2020
Jiazhong Lu1, Weisha Zhang2, Ziye Deng3, Shibin Zhang1, Yan Chang1, Xiaolei Liu4
1School of Cybersecurity, Chengdu University of Information Technology, Chengdu, China
2School of Foreign Languages, Center for Digitalized Culture and Media, University of Electronic Science and Technology of China, Chengdu, China
3Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China
4Institute of Computer Application, China Academy of Engineering Physics, Mianyang, China

Tóm tắt

To protect the information from being intercepted by third parties during the network communication process, this paper proposes a new type of data steganography technology based on network data flow. Using the network protocol itself and the relationship between data packets in the entire network data stream to perform network data steganography, transfer hidden data, and perform secondary identity authentication. Different from the traditional steganography method, this method can encode the hidden data and send the interval value by embedding the data packet, thereby hiding and transmitting the hidden data. In this technology, the operation of hidden data does not affect the user's access request for real network data, and it can perform processes such as hidden data transfer and secondary authentication without the user being able to detect it. Through experimental verification and evaluation, our method improves the concealment of the steganographic channel, is not easy to attract attention and has no obvious statistical characteristics of the traffic, and can improve the concealment and robustness of the steganography technology based on network data streams.

Tài liệu tham khảo

Zielinska E, Mazurczyk W, Szczypiorski K (2012) Development trends in steganography [J]. https://arXiv.org/1202.5289 Kahn D (1996) The history of steganography [C]. International Workshop on Information Hiding 2018 Steganography [EB/OL]. https://en.wikipedia.org/wiki/Steganography Cheddad A, Condell J, Curran K et al (2010) Digital image steganography: survey and analysis of current methods [J]. Signal Process 90(3):727–752 Nosrati M, Karimi R, Hariri M (2012) Audio steganography: a survey on recent approaches [J]. World Appl Program 2(3):202–205 Balaji R, Naveen G (2011) Secure data transmission using video steganography[C]. In: IEEE International Conference on Electro/information Technology Duan Y, Lee VCS, Lam K et al (2019) A cross-layer design for data dissemination in vehicular ad hoc networks. Neural Comput Appl 31:2869–2887 Vimal S, Kalaivani L, Kaliappan M et al (2020) Development of secured data transmission using machine learning-based discrete-time partially observed Markov model and energy optimization in cognitive radio networks. Neural Comput Appl 32:151–161 Ooi KS, Kong CL, Goay CH et al (2020) Crosstalk modeling in high-speed transmission lines by multilayer perceptron neural networks. Neural Comput Appl 32:7311–7320 Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography [J]. IEEE Secur Priv 99(3):32–44 Fridrich J, Goljan M, Du R (2001) Detecting lsb steganography in color, and gray-scale images [J]. IEEE Multimedia 8(4):22–28 Zhou S, Tan B (2020) Electrocardiogram soft computing using hybrid deep learning CNN-ELM. Appl Soft Comput 86:105778 Zhou S, Ke M, Luo P (2019) Multi-camera transfer GAN for person re-identification. J Vis Commun Image Represent 59:393–400 Sheng DH, Kin TU (2011) A novel video steganography based on non-uniform rectangular partition [C]. In: IEEE International Conference on Computational Science and Engineering Zheng Xu, Guo L, Liu Y (2019) Special issue on intelligent signal processing methods and applications for photonic networks communications. Photon Netw Commun 37(2):139–140 Dong K, Kim HJ, Yu X, Feng X (2020) Reversible data hiding for binary images based on adaptive overlapping pattern. EURASIP J Inf Secur 11:1–13 Luo X, Chan EWW, Chang RKC (2008) Tcp covert timing channels: Design and detection [C]. In: IEEE International Conference on Dependable Systems and Networks with Ftcs and Dcc Wu CW (2008) Research on stealth detection technology of network protocol [D]. Nanjing University of Science and Technology, Nanjing Mingji Yu, Yuchen Liu Hu, Sun HY, Qiao T (2020) Adaptive and separable multiary reversible data hiding in encryption domain. EURASIP J Image Video Process 2020(1):16 Kim H-W, Mu H, Park JH, Sangaiah AK, Jeong Y-S (2020) Video transcoding scheme of multimedia data-hiding for multiform resources based on intra-cloud. J Ambient Intell Humaniz Comput 11(5):1809–1819 Anushiadevi R, Pravinkumar P, Rayappan JBB, Amirtharajan R (2020) A high payload separable reversible data hiding in cipher image with good decipher image quality. J Intell Fuzzy Syst 38(5):6403–6414 Bazyar M, Sudirman R (2014) A recen treview of mp3 based steganography methods [J]. Intern J Secur Its Appl 8(6):405–414 Binny A, Koilakuntla M (2014) Hiding secret information using lsb based audio steganography [C]. In: 2014 International Conferenceon Soft Computing and Machine Intelligence Xiaolong Xu, Liu X, Zhanyang Xu, Dai F, Zhang X, Qi L (2019) Trust-oriented IoT Service placement for smart cities in edge computing. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2019.2959124 Meng T, Wolter K, Wu H, Wang Q (2018) A secure and cost-efficient offloading policy for mobile cloud computing against timing attacks. Pervasive Mob Comput 45:4–18 Wu H, Han Z, Wolter K, Zhao Y, Ko H (2019) Deep learning driven wireless communications and mobile computing. Wirel Commun Mob Comput. https://doi.org/10.1155/2019/4578685