PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Hiding inside html and other source codes

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Many steganographic techniques [1,2, 3, 4] were proposed for hiding secret message inside images, the simplest of them being the LSB data hiding [6, 7, 8, 9, 10, 11]. In this paper, we suggest a novel data hiding technique in an Html Web page [12] and also propose some simple techniques to extend the embedding technique to source codes written in any programming language (both case insensitive like Html, pascal and case sensitive languages like C, C++, Java) - an extension to [12]. We basically try to exploit the case-redundancy in case-insensitive language, while we try hiding data with minimal changes int the source code (almost not raising suspicion). Html Tags are case insensitive and hence an alphabet in lowercase and one in uppercase present inside an Html Tag are interpreted in the same manner by the browser, i.e., change in case in an web page is imperceptible to the browser. We first exploit this redundancy and use it to embed secret data inside an web page, with no changes visible to the user of the web page, so that he can not even suspect about the data hiding. The embedded data can be recovered by viewing the source of the Html page. This technique can easily be extended to embed secret message inside any piece of source-code where the standard interpreter of that language is case-insensitive. For case-sensitive programming languages we do minimal changes in the source code (e.g., add an extra character in the token identified by the lexical analyser) without violating the lexical and syntactic notation for that language) and try to make the change almost imperceptible.
Twórcy
autor
autor
  • Department of Quantitative Methods and Information Systems, College of Business Administration, Kuwait University, alqaheri@cba.edu.kw
Bibliografia
  • [1] F. N. Johnson, Sushil Jajodia, Steganography: Seeing the Unseen, IEEE Computer, February 1998, pp. 26-34
  • [2] W. Bender et al., Techniques for Data Hiding, Systems J., Vol. 35, Nos. 3 and 4, 1996, pp.313-336
  • [3] B. Pfitzmann, Information Hiding Terminology, Proc. First International Workshop Information Hiding, Lecture Notes in Computer Science No. 1174, Springer-Verlag, Berlin, 1996, pp. 347-356
  • [4] DaeMin Shin, Yeog Kim, KeunDuck Byun, SangJin Lee, Data Hiding in Windows Executable Files, Center for Information Security Technologies (CIST), Korea University, Seoul, Republic of Korea, available for download from “http://igneousscis.ecu.edu.au/proceedings/ 2008/forensics/Shin%20Data% 20Hiding%20in%20Windows% 20Executable%20Files.pdf”.
  • [5] C. Kurak, J. McHugh, A Cautionary Note On Image Downgrading, Proc. IEEE Eighth Annual Computer Security Applications Conf., IEEE Press, Piscataway, N.J., 1992, pp. 153-159
  • [6] F. Battisti, M. Carli, A. Neri, K. Egiaziarian, A Generalized Fibonacci LSB Data Hiding Technique, 3rd International Conference on Computers and Devices for Communication (CODEC-06) TEA, Institute of Radio Physics and Electronics, University of Calcutta, December 18-20, 2006
  • [7] Sandipan Dey, Ajith Abraham, Bijoy Bandyopadhyay and Sugata Sanyal, Data Hiding Techniques Using Prime and Natural Numbers, Journal of Digital Information Management, ISSN 0972-7272, Volume 6, No 3, 2008, pp. 463-485
  • [8] Sandipan Dey, Ajith Abraham and Sugata Sanyal, An LSB Data Hiding Technique Using Natural Numbers, IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007, Nov 26-28, 2007, Kaohsiung City, Taiwan, IEEE Computer Society press, USA, ISBN 0-7695-2994-1, pp. 473-476, 2007
  • [9] Sandipan Dey, Ajith Abraham and Sugata Sanyal, An LSB Data Hiding Technique Using Prime Numbers, Third International Symposium on Information Assurance and Security, August 29-31, 2007, Manchester, United Kingdom, IEEE Computer Society press, USA, ISBN 0-7695-2876-7, pp. 101-106, 2007
  • [10] R. Z. Wang, C. F. Lin and I. C. Lin, Image Hiding by LSB substitution and genetic algorithm, Pattern Recognition, Vol. 34, No. 3, pp. 671-683, 2001
  • [11] Chi-Kwong Chan, L.M. Cbeng, Hiding data in images by simple LSB substitution, Pattern Recognition, Vol. 37, pp. 469-474, 2004
  • [12] Sandipan Dey, Hameed Al-Qaheri, Sugata Sanyal, Embedding Secret Data in Html Web Page, In Book: Image Processing & Communications Challenges, Ed. Ryszard S. Choraś and Antoni Zabłudowski, Academy Publishing House EXIT, Warsaw 2009, pp. 474-481
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BAT5-0045-0007
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.