Data hiding using compressed archives

B. Carpentieri, Arcangelo Castiglione, A. D. Santis, F. Palmieri, Raffaele Pizzolante
{"title":"Data hiding using compressed archives","authors":"B. Carpentieri, Arcangelo Castiglione, A. D. Santis, F. Palmieri, Raffaele Pizzolante","doi":"10.1145/3264746.3264752","DOIUrl":null,"url":null,"abstract":"The need to avoid suspicion in a potential observer/investigator, though it can be seen as a weak requirement for the protection of transmitted data, it can be extremely useful. For example, once discovered that the data has been protected by means of certain security tools, a malicious user that is strongly interested in such data could make a great effort in trying to remove the protection, for example, by cracking the password or by exploiting the vulnerabilities of the algorithm that was used to protect the data. Hence, to transfer information in a secure way, it is sometimes better to hide it inside other data, rather than protecting it in a conventional manner. One of the most important techniques in data hiding is steganography. In this work we propose a novel steganographic method which enables to hide information by using a compressed archive as information carrier. The method we propose uses these compressed archives, together with their relative hierarchical structure, to hide bits of information. We remark that by means of our method the hidden information does not have any semantic relation with respect to the content of the compressed archive, whereas such relation will concern how the archive (and the relative sub-archives) was compressed, i.e., what compression algorithms and relative parameters were used, as well as how this operation was performed. Since it is a common practice to send compressed data by means of a communication channel, we believe that our proposal can be a valid tool for steganographic purposes, since the suspect generated in a potential observer could be considered almost negligible.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3264746.3264752","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

The need to avoid suspicion in a potential observer/investigator, though it can be seen as a weak requirement for the protection of transmitted data, it can be extremely useful. For example, once discovered that the data has been protected by means of certain security tools, a malicious user that is strongly interested in such data could make a great effort in trying to remove the protection, for example, by cracking the password or by exploiting the vulnerabilities of the algorithm that was used to protect the data. Hence, to transfer information in a secure way, it is sometimes better to hide it inside other data, rather than protecting it in a conventional manner. One of the most important techniques in data hiding is steganography. In this work we propose a novel steganographic method which enables to hide information by using a compressed archive as information carrier. The method we propose uses these compressed archives, together with their relative hierarchical structure, to hide bits of information. We remark that by means of our method the hidden information does not have any semantic relation with respect to the content of the compressed archive, whereas such relation will concern how the archive (and the relative sub-archives) was compressed, i.e., what compression algorithms and relative parameters were used, as well as how this operation was performed. Since it is a common practice to send compressed data by means of a communication channel, we believe that our proposal can be a valid tool for steganographic purposes, since the suspect generated in a potential observer could be considered almost negligible.
使用压缩档案隐藏数据
需要避免潜在的观察员/调查员的怀疑,虽然它可以被视为保护传输数据的弱要求,但它可能非常有用。例如,一旦发现数据受到某些安全工具的保护,对这些数据非常感兴趣的恶意用户可能会努力试图删除保护,例如,通过破解密码或利用用于保护数据的算法的漏洞。因此,为了以安全的方式传输信息,有时最好将其隐藏在其他数据中,而不是以传统方式保护它。数据隐藏中最重要的技术之一是隐写术。在这项工作中,我们提出了一种新的隐写方法,利用压缩档案作为信息载体来隐藏信息。我们提出的方法使用这些压缩的档案,连同它们的相对层次结构,来隐藏信息位。我们注意到,通过我们的方法,隐藏的信息与压缩归档的内容没有任何语义关系,而这种关系将涉及归档(和相关子归档)如何被压缩,即使用什么压缩算法和相关参数,以及如何执行此操作。由于通过通信通道发送压缩数据是一种常见的做法,我们认为我们的建议可以成为用于隐写目的的有效工具,因为在潜在的观察者中产生的怀疑几乎可以忽略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信