Conference Paper
BibTex RIS Cite

Transmission of Secret Information Based on Time Instances

Year 2021, Volume: 16 , 209 - 218, 31.12.2021
https://doi.org/10.55549/epstem.1068612

Abstract

This Paper presents improvement and extension of previous methodology about timing steganography based on network steganography. The previous article uses time interval between two successive time instances of transmissions mixed with cryptography prior to hiding. However, this improvement tends to extend and provide new methods based on single time instance unlike the previous methodology which depend on two-time instances such as hours, minutes, second, millisecond etc. It further examines how to handle effect of different time zone and high precision timing for ultrafast timing such as millisecond, and many more which human actions is too slow for perfect timing. In addition, the extension based on Transmission Control Protocol and Internet Protocol (TCP-IP) status codes where each element of set of status code are index and the index represents certain numeric of combination for hiding. Finally, the cryptography method is improved and extended to series-based cryptography with any defined number of different cryptography methods combined altogether with multiple keys generated dynamically. The methods for both cryptography and steganography were integrated and each module carefully tested for their feasibility and appropriate analysis, comparisons presented too. A brief discussion of possible extension or application of Time Interval and Instance Steganography from network based to Video and Audio time Steganography are presented which depends on time such as rate of change of features in Video, or in Audio as well. However, these video and audio Time steganography are considered as out of scope for this article which is mainly about network Steganography.

References

  • Cvejic, N., & Seppanen, T. (2002, December). Increasing the capacity of LSB-based audio steganography. In 2002 IEEE Workshop on Multimedia Signal Processing.
  • Djebbar, F., Ayad, B., Hamam, H., & Abed-Meraim, K. (2011, April). A view on latest audio steganography techniques. In 2011 International Conference on Innovations in Information Technology (pp. 409-414). IEEE Transactions on Information Forensics and Security, 9(5), 741-751.
  • Johri, P., Mishra, A., Das, S., & Kumar, A. (2016, March). Survey on steganography methods (text, image, audio, video, protocol and network steganography). In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 2906-2909).
  • Jonathan, K., & Yehuda, L. (2015). Introduction to Modern Cryptography.-2nd. http://203.162.10.101/jspui/handle/123456789/723
  • Kadhim, I. J., Premaratne, P., Vial, P. J., & Halloran, B. (2019). Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. Neurocomputing, 335, 299-326.
  • Liu, G., Zhai, J., & Dai, Y. (2012). Network covert timing channel with distribution matching. Telecommunication Systems, 49(2), 199-205.
  • Mazurczyk, W., Wendzel, S., Azagra Villares, I., & Szczypiorski, K. (2016). On importance of steganographic cost for network steganography. Security and Communication Networks, 9(8), 781-790.
  • Narayana, V. L., Gopi, A. P., & Kumar, N. A. (2018). Different techniques for hiding the text information using text steganography techniques. Neurocomputing, 335, 299-326.
  • Okello, M. (2018, October). A New Timing Steganography Algorithm in Real-Time Transmission Devices. In 2018 IEEE 18th International Conference on Communication Technology (ICCT) (pp. 880-884).
  • Okello, M. (2020). A mixture of timing steganography and series. https://www.techrxiv.org/articles/preprint/A_Mixture_of_Timing_Steganography_and_Series_Cryptography/13134992
  • Okello, M. A (2019). Secure and optimal method of steganography using bit combination and dynamical rotation. Over Addresses. Preprints 2019, 2019020252.
  • https://www.preprints.org/manuscript/201902.0252/v2
  • Papapanagiotou, K., Kellinis, E., Marias, G. F., & Georgiadis, P. (2005, December). Alternatives for multimedia messaging system steganography. In International Conference on Computational and Information Science (pp. 589-596). Springer, Berlin, Heidelberg.
  • Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97-102.
  • Wang, H., & Wang, S. (2004). Cyber warfare: steganography vs. steganalysis. Communications of the ACM, 47(10), 76-82.
  • Wang, K., Zhao, H., & Wang, H. (2014). Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Transactions on Information Forensics and Security, 9(5), 741-751.
Year 2021, Volume: 16 , 209 - 218, 31.12.2021
https://doi.org/10.55549/epstem.1068612

Abstract

References

  • Cvejic, N., & Seppanen, T. (2002, December). Increasing the capacity of LSB-based audio steganography. In 2002 IEEE Workshop on Multimedia Signal Processing.
  • Djebbar, F., Ayad, B., Hamam, H., & Abed-Meraim, K. (2011, April). A view on latest audio steganography techniques. In 2011 International Conference on Innovations in Information Technology (pp. 409-414). IEEE Transactions on Information Forensics and Security, 9(5), 741-751.
  • Johri, P., Mishra, A., Das, S., & Kumar, A. (2016, March). Survey on steganography methods (text, image, audio, video, protocol and network steganography). In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 2906-2909).
  • Jonathan, K., & Yehuda, L. (2015). Introduction to Modern Cryptography.-2nd. http://203.162.10.101/jspui/handle/123456789/723
  • Kadhim, I. J., Premaratne, P., Vial, P. J., & Halloran, B. (2019). Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. Neurocomputing, 335, 299-326.
  • Liu, G., Zhai, J., & Dai, Y. (2012). Network covert timing channel with distribution matching. Telecommunication Systems, 49(2), 199-205.
  • Mazurczyk, W., Wendzel, S., Azagra Villares, I., & Szczypiorski, K. (2016). On importance of steganographic cost for network steganography. Security and Communication Networks, 9(8), 781-790.
  • Narayana, V. L., Gopi, A. P., & Kumar, N. A. (2018). Different techniques for hiding the text information using text steganography techniques. Neurocomputing, 335, 299-326.
  • Okello, M. (2018, October). A New Timing Steganography Algorithm in Real-Time Transmission Devices. In 2018 IEEE 18th International Conference on Communication Technology (ICCT) (pp. 880-884).
  • Okello, M. (2020). A mixture of timing steganography and series. https://www.techrxiv.org/articles/preprint/A_Mixture_of_Timing_Steganography_and_Series_Cryptography/13134992
  • Okello, M. A (2019). Secure and optimal method of steganography using bit combination and dynamical rotation. Over Addresses. Preprints 2019, 2019020252.
  • https://www.preprints.org/manuscript/201902.0252/v2
  • Papapanagiotou, K., Kellinis, E., Marias, G. F., & Georgiadis, P. (2005, December). Alternatives for multimedia messaging system steganography. In International Conference on Computational and Information Science (pp. 589-596). Springer, Berlin, Heidelberg.
  • Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97-102.
  • Wang, H., & Wang, S. (2004). Cyber warfare: steganography vs. steganalysis. Communications of the ACM, 47(10), 76-82.
  • Wang, K., Zhao, H., & Wang, H. (2014). Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Transactions on Information Forensics and Security, 9(5), 741-751.
There are 16 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Articles
Authors

Moses Oyaro Okello

Publication Date December 31, 2021
Published in Issue Year 2021Volume: 16

Cite

APA Okello, M. O. (2021). Transmission of Secret Information Based on Time Instances. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 16, 209-218. https://doi.org/10.55549/epstem.1068612