Research Article
PDF BibTex RIS Cite

Steganalysis of Chat Based Steganography

Year 2023, Volume: 6 Issue: 1, 29 - 39, 16.06.2023
https://doi.org/10.53508/ijiam.1243912

Abstract

Steganalysis is the practice of identifying potential secret communication and taking appropriate action, such as deciphering to uncover the hidden contents or destroying the object containing the hidden information if it cannot be uncovered. At times, it’s very necessary to perform Steganalysis due to the fact that steganography is often misused by those with bad intentions, making it a platform for criminal communication. This paper presents a methodology for the detection of timing steganography. The method is based on user behavior during chat, such as the time taken to read, edit, and send text, etc. The method was tested using simulation-based chat software, and it can detect intended timing samples correctly.

References

  • Nissar, A., & Mir, A. H. (2010). Classification of steganalysis techniques: A study. Digital Signal Processing, 20(6), 1758-1770.
  • Johnson, N. F., & Jajodia, S. (1998, September). Steganalysis: The investigation of hidden information. In 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No. 98EX228) (pp. 113-116). IEEE.
  • Okello, M. O. (2022). Optimal Covert Communication Techniques. International Journal of Informatics and Applied Mathematics, 5 (1) , 1-26 . DOI: 10.53508/ijiam.1073205
  • Kakungulu-Mayambala, R. (2008). Phone-tapping & the Right to Privacy: A Comparison of the Right to Privacy in Communication in Uganda & Canada. In BILETA Conference.
  • Atuhaire, E. (2021). Artificial intelligence and the right to privacy in Uganda (Doctoral dissertation, Makerere University).
  • Elsadig, Muawia & Gafar, Ahmed. (2022). PACKET LENGTH COVERT CHANNEL DETECTION: AN ENSEMBLE MACHINE LEARNING APPROACH. Journal of Theoretical and Applied Information Technology. 100. 7035-7043.
  • Mivule, K., & Turner, C. (2012). Applying Data Privacy Techniques on Published Data in Uganda. In Proceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
  • Zhang, Y., Zhang, W., Chen, K., Liu, J., Liu, Y., & Yu, N. (2018, June). Adversarial examples against deep neural network based steganalysis. In Proceedings of the 6th ACM Workshop on information hiding and multimedia security (pp. 67-72).
  • Tan, S., & Li, B. (2014, December). Stacked convolutional auto-encoders for steganalysis of digital images. In Signal and information processing association annual summit and conference (APSIPA), 2014 Asia-Pacific (pp. 1-4). IEEE.
  • Tabares-Soto, Reinel, Raúl Ramos-Pollán, Gustavo Isaza, Simon Orozco-Arias, Mario Alejandro Bravo Ortíz, Harold Brayan Arteaga Arteaga, Alejandro Mora Rubio, and Jesus Alejandro Alzate Grisales. "Digital media steganalysis." In Digital Media Steganography, pp. 259-293. Academic Press, 2020.
  • Gianvecchio, S., & Wang, H. (2007, October). Detecting covert timing channels: an entropy-based approach. In Proceedings of the 14th ACM conference on Computer and communications security. (pp. 307-316).
  • Liu, G., Zhai, J., & Dai, Y. (2012). Network covert timing channel with distribution matching. Telecommunication Systems, 49(2), 199-205
  • M. Okello, "A New Timing Steganography Algorithm in Real-Time Transmission Devices," 2018 IEEE 18th International Conference on Communication Technology (ICCT), Chongqing, China, 2018, pp. 880-884, doi: 10.1109/ICCT.2018.8600103.
  • Okello, M. O. (2021). Transmission of Secret Information Based on Time Instances. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 16, 209-218. DOI: 10.55549/epstem.1068612
  • William Soukoreff, R., & Scott Mackenzie, I. (1995). Theoretical upper and lower bounds on typing speed using a stylus and a soft keyboard. Behaviour & Information Technology, 14(6), 370-379.
  • Brysbaert, M. (2019). How many words do we read per minute? A review and meta-analysis of reading rate. Journal of memory and language, 109, 104047. Online blog typing speed by admin: https://onlinetyping.org/blog/average-typing-speed.php

Year 2023, Volume: 6 Issue: 1, 29 - 39, 16.06.2023
https://doi.org/10.53508/ijiam.1243912

Abstract

References

  • Nissar, A., & Mir, A. H. (2010). Classification of steganalysis techniques: A study. Digital Signal Processing, 20(6), 1758-1770.
  • Johnson, N. F., & Jajodia, S. (1998, September). Steganalysis: The investigation of hidden information. In 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No. 98EX228) (pp. 113-116). IEEE.
  • Okello, M. O. (2022). Optimal Covert Communication Techniques. International Journal of Informatics and Applied Mathematics, 5 (1) , 1-26 . DOI: 10.53508/ijiam.1073205
  • Kakungulu-Mayambala, R. (2008). Phone-tapping & the Right to Privacy: A Comparison of the Right to Privacy in Communication in Uganda & Canada. In BILETA Conference.
  • Atuhaire, E. (2021). Artificial intelligence and the right to privacy in Uganda (Doctoral dissertation, Makerere University).
  • Elsadig, Muawia & Gafar, Ahmed. (2022). PACKET LENGTH COVERT CHANNEL DETECTION: AN ENSEMBLE MACHINE LEARNING APPROACH. Journal of Theoretical and Applied Information Technology. 100. 7035-7043.
  • Mivule, K., & Turner, C. (2012). Applying Data Privacy Techniques on Published Data in Uganda. In Proceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
  • Zhang, Y., Zhang, W., Chen, K., Liu, J., Liu, Y., & Yu, N. (2018, June). Adversarial examples against deep neural network based steganalysis. In Proceedings of the 6th ACM Workshop on information hiding and multimedia security (pp. 67-72).
  • Tan, S., & Li, B. (2014, December). Stacked convolutional auto-encoders for steganalysis of digital images. In Signal and information processing association annual summit and conference (APSIPA), 2014 Asia-Pacific (pp. 1-4). IEEE.
  • Tabares-Soto, Reinel, Raúl Ramos-Pollán, Gustavo Isaza, Simon Orozco-Arias, Mario Alejandro Bravo Ortíz, Harold Brayan Arteaga Arteaga, Alejandro Mora Rubio, and Jesus Alejandro Alzate Grisales. "Digital media steganalysis." In Digital Media Steganography, pp. 259-293. Academic Press, 2020.
  • Gianvecchio, S., & Wang, H. (2007, October). Detecting covert timing channels: an entropy-based approach. In Proceedings of the 14th ACM conference on Computer and communications security. (pp. 307-316).
  • Liu, G., Zhai, J., & Dai, Y. (2012). Network covert timing channel with distribution matching. Telecommunication Systems, 49(2), 199-205
  • M. Okello, "A New Timing Steganography Algorithm in Real-Time Transmission Devices," 2018 IEEE 18th International Conference on Communication Technology (ICCT), Chongqing, China, 2018, pp. 880-884, doi: 10.1109/ICCT.2018.8600103.
  • Okello, M. O. (2021). Transmission of Secret Information Based on Time Instances. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 16, 209-218. DOI: 10.55549/epstem.1068612
  • William Soukoreff, R., & Scott Mackenzie, I. (1995). Theoretical upper and lower bounds on typing speed using a stylus and a soft keyboard. Behaviour & Information Technology, 14(6), 370-379.
  • Brysbaert, M. (2019). How many words do we read per minute? A review and meta-analysis of reading rate. Journal of memory and language, 109, 104047. Online blog typing speed by admin: https://onlinetyping.org/blog/average-typing-speed.php

Details

Primary Language English
Subjects Software Engineering (Other), Applied Mathematics
Journal Section Articles
Authors

Moses Oyaro OKELLO
It is not affiliated with an institution
0000-0002-5483-1147
Uganda

Early Pub Date June 3, 2023
Publication Date June 16, 2023
Acceptance Date April 11, 2023
Published in Issue Year 2023 Volume: 6 Issue: 1

Cite

Bibtex @research article { ijiam1243912, journal = {International Journal of Informatics and Applied Mathematics}, eissn = {2667-6990}, address = {}, publisher = {International Society of Academicians}, year = {2023}, volume = {6}, number = {1}, pages = {29 - 39}, doi = {10.53508/ijiam.1243912}, title = {Steganalysis of Chat Based Steganography}, key = {cite}, author = {Okello, Moses Oyaro} }
APA Okello, M. O. (2023). Steganalysis of Chat Based Steganography . International Journal of Informatics and Applied Mathematics , 6 (1) , 29-39 . DOI: 10.53508/ijiam.1243912
MLA Okello, M. O. "Steganalysis of Chat Based Steganography" . International Journal of Informatics and Applied Mathematics 6 (2023 ): 29-39 <https://dergipark.org.tr/en/pub/ijiam/issue/77845/1243912>
Chicago Okello, M. O. "Steganalysis of Chat Based Steganography". International Journal of Informatics and Applied Mathematics 6 (2023 ): 29-39
RIS TY - JOUR T1 - Steganalysis of Chat Based Steganography AU - Moses OyaroOkello Y1 - 2023 PY - 2023 N1 - doi: 10.53508/ijiam.1243912 DO - 10.53508/ijiam.1243912 T2 - International Journal of Informatics and Applied Mathematics JF - Journal JO - JOR SP - 29 EP - 39 VL - 6 IS - 1 SN - -2667-6990 M3 - doi: 10.53508/ijiam.1243912 UR - https://doi.org/10.53508/ijiam.1243912 Y2 - 2023 ER -
EndNote %0 International Journal of Informatics and Applied Mathematics Steganalysis of Chat Based Steganography %A Moses Oyaro Okello %T Steganalysis of Chat Based Steganography %D 2023 %J International Journal of Informatics and Applied Mathematics %P -2667-6990 %V 6 %N 1 %R doi: 10.53508/ijiam.1243912 %U 10.53508/ijiam.1243912
ISNAD Okello, Moses Oyaro . "Steganalysis of Chat Based Steganography". International Journal of Informatics and Applied Mathematics 6 / 1 (June 2023): 29-39 . https://doi.org/10.53508/ijiam.1243912
AMA Okello M. O. Steganalysis of Chat Based Steganography. IJIAM. 2023; 6(1): 29-39.
Vancouver Okello M. O. Steganalysis of Chat Based Steganography. International Journal of Informatics and Applied Mathematics. 2023; 6(1): 29-39.
IEEE M. O. Okello , "Steganalysis of Chat Based Steganography", International Journal of Informatics and Applied Mathematics, vol. 6, no. 1, pp. 29-39, Jun. 2023, doi:10.53508/ijiam.1243912

International Journal of Informatics and Applied Mathematics