Computer Science and Engineering
p-ISSN: 2163-1484 e-ISSN: 2163-1492
2012; 2(5): 46-57
doi: 10.5923/j.computer.20120205.02
Vijayaratnam Ganeshkumar 1, Ravindra L. W. Koggalage 2
1Creative Technology Solutions Pte Ltd, Sri Lanka
2Deputy Vice Chancellor (Academic), General Sir John KotelawalaDefence University, Sri Lanka
Correspondence to: Vijayaratnam Ganeshkumar , Creative Technology Solutions Pte Ltd, Sri Lanka.
| Email: | ![]() |
Copyright © 2012 Scientific & Academic Publishing. All Rights Reserved.
Computer usage is increasing, for both social and business areas, and it will continue to do so. This naturally leads to an increase in the way in which we as individuals and organizations we work for may be attacked.Increase of cyber-crime has compelledto re-think for a secure communication medium in our day-to-day life. Protecting the information during transmission is a foremostchallenge against eavesdroppers. Encryption is one of the widely used techniques that ensure the security of the message. However, sending encrypted messages often draw eavesdropper’s attention. Steganography is a method of letteringsecret messages in a way that nobody except for the sender and the recipient would suspect the existence of the hidden message. In other words, it’s an art/science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read.Historical steganography involved techniques such as disappearing ink or microdots. Modern steganography involves in computer files such as images, audio, video files and even in text documents. However, each stereographic technique is focused in just one medium; such as image or audio file and etc. And each steganographic algorithms had independent implementation; as a resultthere is no generic framework or application that will produce stegano medium for an end-user. In this paper, a generic framework is presented, which provides generic steganographic functionality via well-defined Application Programming Interface (API). So that the advanced developers can develop framework modules, this can be used by the end-users directly as stegangraphicapplication. And also this paper describes a newly invented steganographic technique which utilizes the inter-character spacing of a Rich-Text-Format (RTF) document. This technique can be used to transmit concealed messages in multi-language or combination of languages, which can be represented in Unicode. As an additional optimization technique; user defined code based (UDC) technique is also proposed to achieve compression of Unicode languages. Another advantage is that this technique can be used to send multi different language secret messages through the communication channel.
Keywords: Steganography, Cryptography, Security, Unicode, Multi-language, Encryption, Eavesdropper, Framework
![]() | Figure 1. Steganography Framework |
|
| |||||||||||||||||||||||||||||||||
![]() | Figure 2. Encoded message |
![]() | (1) |
![]() | (2) |
![]() | Figure 3. UDC Encoded RTF file |
![]() | Figure 4. UDC Encoded RTF in word processor view |
![]() | Figure 5. High level design of the Framework |
![]() | Figure 6. Encryption module |
![]() | Figure 7. Stegno module interface |
![]() | Figure 8. Data module interface |
|
![]() | Figure 9. Custom language and character ID mapping for Sinhala language |
|
(data)” the local language is more understandable since English is used in braces.This section describes how to encode a message which was articulated using only one language using the proposed method. Let’s assume a message in Sinhala ‘’is the secret message that needs to be encoded. First step is to identify each character in the message and list down with the respective Unicode values and the corresponding User Defined Codes as in Table 5.As described earlier (Fig.9), the first two characters of the Unicode values are used as Language ID and the last two as the Character ID.Table 6 (column UDC) shows results of UDC encoding for each Unicode value.Since the entire message is in single (Sinhala) language, all the Language IDs are same for all the characters. Therefore, it is possible to assume the Language ID as the common value and excludes it from subsequent characters except for the first. The Fig.10 depicts the complete UDC encoded bit stream of the message.
|
![]() | Figure 10. UDC encoded message |
Careful analysis would reveal that the message typed in combination of two languages; Sinhala and Basic Latin (English). The characters are in Sinhala but
|
’ is encoded in the same way as discussed earlier. Next, the special character ![]() | Figure 11. UDC encoded message with special character |
![]() | Figure 12. Multiple language messages |
’, the next character is in English, so then there must be new Language ID for the rest of the characters. At the receiving/decoding end, there must be a way to instruct the decoder of a language termination. Therefore, ![]() | Figure 13. UDC encoded message with three languages |
![]() | Figure 14. Decoding process |
|
![]() | Graph 1. Visual representation of Table 8 |
|
![]() | Graph 2. Visual representation of Number of characters vs. Framework process |
![]() | Figure 15. Message in Russian, Greek and Urdu |
| |||||||||||||||||||||||||||||||||||||
|
| [1] | Stefan Katzenbeisse, Information Hiding Techniques for Steganography and Digital Watermarking, Fabien, Ed.: Artech, 99. |
| [2] | Wikipedia.[Online].http://en.wikipedia.org/wiki/Steganography. |
| [3] | JiuchaoFeng, Guangzhou Bo Wang, "A chaos-based steganography algorithm for H.264 standard video sequences," Communications, Circuits and Systems, ICCCAS 08. International Conference. |
| [4] | Ling-Hwei Chen Wen-Chao Yang, "A novel steganography method via various animation effects in PowerPoint files," IEEE, Machine Learning and Cybernetics, International Conference, vol. 6, pp. 3102-3107, July 08. |
| [5] | Jana Dittmann, Andreas Lang, Tobias Kühne Christian Krätzer, "WLAN Steganography: A First Practical Review," ACM, International Multimedia Conference, pp. 17 - 22, 06. |
| [6] | NatthawutSamphaiboon and Matthew N. Dailey, “Steganography in Thai Text”, ECTI-CON 08. |
| [7] | Mohammad Shirali-Shahreza, SajadShirali-Shahreza, “Persian/Arabic Unicode Text Steganography”, The Fourth International Conference on Information Assurance and Security, 08. |
| [8] | Changder, S. Debnath, N.C. Ghosh, D, “A New Approach to Hindi Text Steganography by Shifting Matra”, International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom '09, pp. 199-202. |
| [9] | I.V. Karpinskyy, M.P. Sagan, A.M. Vasiltsov, "Development of VHDL-based core with embedded steganography function," CAD Systems in Microelectronics, CADSM 03. Proceedings of the 7th International Conference, pp. 260- 261. |
| [10] | J.H.P. Eloff, M.S. Olivier T. Morkel, "An Overview Of Image Steganography," Proceedings of the Fifth Annual Information Security South Africa Conference. |
| [11] | M., Tehran Shirali-Shahreza, "Text Steganography by Changing Words Spelling," Advanced Communication Technology, ICACT 08 10th International Conference, vol. 3, pp. 1912-1913. |
| [12] | Alla, K. Prasad, R.S.R., “An Evolution of Hindi Text Steganography," Information Technology: New Generations, ITNG 09 Sixth International Conference, pp. 1577-1578. |
| [13] | The Unicode Standard, http://www.unicode.org, last visited: 14 May 2010. |
| [14] | Wikipedia,[Online].http://en.wikipedia.org/wiki/Chinese_character#Number_of_Chinese_characters. |
| [15] | Wikipedia,[Online].http://en.wikipedia.org/wiki/Han_unification. |
| [16] | Yong-Won Kim, Kyung-Ae Moon, and II-Seok Oh, "A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statics," 03. |
| [17] | V.M. Han, S. Chang, E, Potdar, "Dictionary Module and UDC: Two new approaches to Enhance Embedding Capacity of a Steganographic Channel," Industrial Informatics, INDIN '05. 3rd IEEE International Conference, pp. 697- 700. |
| [18] | (2010, December) Tech-faq.com.[Online].http://www.tech-faq.com/cryptography.html. |
| [19] | (2010, Devember) Mycrypto.net.[Online].http://www.mycrypto.net/encryption/crypto_algorithms.html. |
| [20] | (2010, September) Tools.ietf.org.[Online].http://tools.ietf.org/html/rfc1896. |
| [21] | PeterWayner, Disappearing Cryptography Information Hiding Steganography and Watermarking, 3rd ed.: Morgan Kaufmann, 2002. |
| [22] | Ajith Abraham, Computational Social Network Analysis: Trends, Tools and Research Advances (Computer Communications and Networks), 1st ed., Aboul-Ella Hassanien, Ed.: Springer, 2009. |
| [23] | Rainer Böhme, Advanced Statistical Steganalysis (Information Security and Cryptography), 1st ed.: Springer, 2010. |
| [24] | Hiding in Plain Sight: Steganography and the Art of Covert Communication: Wiley, 2003. |
| [25] | Stefan Katzenbeisser, Information Hiding Techniques for Steganography and Digital Watermarking: Artech, 1999. |
| [26] | Jatinder N. D. Gupta, Handbook of Research on Information Security and Assurance, 1st ed.: Information Science Reference, 2008. |
| [27] | Barry J. Blake, Secret Language: Codes, Tricks, Spies, Thieves, and Symbols: Oxford University Press, 2010. |
| [28] | Dorothy Elizabeth Robling Denning, Cryptography and Data Security: Addison-Wesley, 1982. |