B. Carpentieri, Arcangelo Castiglione, A. D. Santis, F. Palmieri, Raffaele Pizzolante
{"title":"使用压缩档案隐藏数据","authors":"B. Carpentieri, Arcangelo Castiglione, A. D. Santis, F. Palmieri, Raffaele Pizzolante","doi":"10.1145/3264746.3264752","DOIUrl":null,"url":null,"abstract":"The need to avoid suspicion in a potential observer/investigator, though it can be seen as a weak requirement for the protection of transmitted data, it can be extremely useful. For example, once discovered that the data has been protected by means of certain security tools, a malicious user that is strongly interested in such data could make a great effort in trying to remove the protection, for example, by cracking the password or by exploiting the vulnerabilities of the algorithm that was used to protect the data. Hence, to transfer information in a secure way, it is sometimes better to hide it inside other data, rather than protecting it in a conventional manner. One of the most important techniques in data hiding is steganography. In this work we propose a novel steganographic method which enables to hide information by using a compressed archive as information carrier. The method we propose uses these compressed archives, together with their relative hierarchical structure, to hide bits of information. We remark that by means of our method the hidden information does not have any semantic relation with respect to the content of the compressed archive, whereas such relation will concern how the archive (and the relative sub-archives) was compressed, i.e., what compression algorithms and relative parameters were used, as well as how this operation was performed. Since it is a common practice to send compressed data by means of a communication channel, we believe that our proposal can be a valid tool for steganographic purposes, since the suspect generated in a potential observer could be considered almost negligible.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Data hiding using compressed archives\",\"authors\":\"B. Carpentieri, Arcangelo Castiglione, A. D. Santis, F. Palmieri, Raffaele Pizzolante\",\"doi\":\"10.1145/3264746.3264752\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The need to avoid suspicion in a potential observer/investigator, though it can be seen as a weak requirement for the protection of transmitted data, it can be extremely useful. For example, once discovered that the data has been protected by means of certain security tools, a malicious user that is strongly interested in such data could make a great effort in trying to remove the protection, for example, by cracking the password or by exploiting the vulnerabilities of the algorithm that was used to protect the data. Hence, to transfer information in a secure way, it is sometimes better to hide it inside other data, rather than protecting it in a conventional manner. One of the most important techniques in data hiding is steganography. In this work we propose a novel steganographic method which enables to hide information by using a compressed archive as information carrier. The method we propose uses these compressed archives, together with their relative hierarchical structure, to hide bits of information. We remark that by means of our method the hidden information does not have any semantic relation with respect to the content of the compressed archive, whereas such relation will concern how the archive (and the relative sub-archives) was compressed, i.e., what compression algorithms and relative parameters were used, as well as how this operation was performed. Since it is a common practice to send compressed data by means of a communication channel, we believe that our proposal can be a valid tool for steganographic purposes, since the suspect generated in a potential observer could be considered almost negligible.\",\"PeriodicalId\":186790,\"journal\":{\"name\":\"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3264746.3264752\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3264746.3264752","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The need to avoid suspicion in a potential observer/investigator, though it can be seen as a weak requirement for the protection of transmitted data, it can be extremely useful. For example, once discovered that the data has been protected by means of certain security tools, a malicious user that is strongly interested in such data could make a great effort in trying to remove the protection, for example, by cracking the password or by exploiting the vulnerabilities of the algorithm that was used to protect the data. Hence, to transfer information in a secure way, it is sometimes better to hide it inside other data, rather than protecting it in a conventional manner. One of the most important techniques in data hiding is steganography. In this work we propose a novel steganographic method which enables to hide information by using a compressed archive as information carrier. The method we propose uses these compressed archives, together with their relative hierarchical structure, to hide bits of information. We remark that by means of our method the hidden information does not have any semantic relation with respect to the content of the compressed archive, whereas such relation will concern how the archive (and the relative sub-archives) was compressed, i.e., what compression algorithms and relative parameters were used, as well as how this operation was performed. Since it is a common practice to send compressed data by means of a communication channel, we believe that our proposal can be a valid tool for steganographic purposes, since the suspect generated in a potential observer could be considered almost negligible.