Research Article
BibTex RIS Cite

Steganalysis of Chat Based Steganography

Year 2023, Volume: 6 Issue: 1, 29 - 39, 16.06.2023
https://doi.org/10.53508/ijiam.1243912

Abstract

Steganalysis is the practice of identifying potential secret communication and taking appropriate action, such as deciphering to uncover the hidden contents or destroying the object containing the hidden information if it cannot be uncovered. At times, it’s very necessary to perform Steganalysis due to the fact that steganography is often misused by those with bad intentions, making it a platform for criminal communication. This paper presents a methodology for the detection of timing steganography. The method is based on user behavior during chat, such as the time taken to read, edit, and send text, etc. The method was tested using simulation-based chat software, and it can detect intended timing samples correctly.

References

  • Nissar, A., & Mir, A. H. (2010). Classification of steganalysis techniques: A study. Digital Signal Processing, 20(6), 1758-1770.
  • Johnson, N. F., & Jajodia, S. (1998, September). Steganalysis: The investigation of hidden information. In 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No. 98EX228) (pp. 113-116). IEEE.
  • Okello, M. O. (2022). Optimal Covert Communication Techniques. International Journal of Informatics and Applied Mathematics, 5 (1) , 1-26 . DOI: 10.53508/ijiam.1073205
  • Kakungulu-Mayambala, R. (2008). Phone-tapping & the Right to Privacy: A Comparison of the Right to Privacy in Communication in Uganda & Canada. In BILETA Conference.
  • Atuhaire, E. (2021). Artificial intelligence and the right to privacy in Uganda (Doctoral dissertation, Makerere University).
  • Elsadig, Muawia & Gafar, Ahmed. (2022). PACKET LENGTH COVERT CHANNEL DETECTION: AN ENSEMBLE MACHINE LEARNING APPROACH. Journal of Theoretical and Applied Information Technology. 100. 7035-7043.
  • Mivule, K., & Turner, C. (2012). Applying Data Privacy Techniques on Published Data in Uganda. In Proceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
  • Zhang, Y., Zhang, W., Chen, K., Liu, J., Liu, Y., & Yu, N. (2018, June). Adversarial examples against deep neural network based steganalysis. In Proceedings of the 6th ACM Workshop on information hiding and multimedia security (pp. 67-72).
  • Tan, S., & Li, B. (2014, December). Stacked convolutional auto-encoders for steganalysis of digital images. In Signal and information processing association annual summit and conference (APSIPA), 2014 Asia-Pacific (pp. 1-4). IEEE.
  • Tabares-Soto, Reinel, Raúl Ramos-Pollán, Gustavo Isaza, Simon Orozco-Arias, Mario Alejandro Bravo Ortíz, Harold Brayan Arteaga Arteaga, Alejandro Mora Rubio, and Jesus Alejandro Alzate Grisales. "Digital media steganalysis." In Digital Media Steganography, pp. 259-293. Academic Press, 2020.
  • Gianvecchio, S., & Wang, H. (2007, October). Detecting covert timing channels: an entropy-based approach. In Proceedings of the 14th ACM conference on Computer and communications security. (pp. 307-316).
  • Liu, G., Zhai, J., & Dai, Y. (2012). Network covert timing channel with distribution matching. Telecommunication Systems, 49(2), 199-205
  • M. Okello, "A New Timing Steganography Algorithm in Real-Time Transmission Devices," 2018 IEEE 18th International Conference on Communication Technology (ICCT), Chongqing, China, 2018, pp. 880-884, doi: 10.1109/ICCT.2018.8600103.
  • Okello, M. O. (2021). Transmission of Secret Information Based on Time Instances. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 16, 209-218. DOI: 10.55549/epstem.1068612
  • William Soukoreff, R., & Scott Mackenzie, I. (1995). Theoretical upper and lower bounds on typing speed using a stylus and a soft keyboard. Behaviour & Information Technology, 14(6), 370-379.
  • Brysbaert, M. (2019). How many words do we read per minute? A review and meta-analysis of reading rate. Journal of memory and language, 109, 104047. Online blog typing speed by admin: https://onlinetyping.org/blog/average-typing-speed.php
Year 2023, Volume: 6 Issue: 1, 29 - 39, 16.06.2023
https://doi.org/10.53508/ijiam.1243912

Abstract

References

  • Nissar, A., & Mir, A. H. (2010). Classification of steganalysis techniques: A study. Digital Signal Processing, 20(6), 1758-1770.
  • Johnson, N. F., & Jajodia, S. (1998, September). Steganalysis: The investigation of hidden information. In 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No. 98EX228) (pp. 113-116). IEEE.
  • Okello, M. O. (2022). Optimal Covert Communication Techniques. International Journal of Informatics and Applied Mathematics, 5 (1) , 1-26 . DOI: 10.53508/ijiam.1073205
  • Kakungulu-Mayambala, R. (2008). Phone-tapping & the Right to Privacy: A Comparison of the Right to Privacy in Communication in Uganda & Canada. In BILETA Conference.
  • Atuhaire, E. (2021). Artificial intelligence and the right to privacy in Uganda (Doctoral dissertation, Makerere University).
  • Elsadig, Muawia & Gafar, Ahmed. (2022). PACKET LENGTH COVERT CHANNEL DETECTION: AN ENSEMBLE MACHINE LEARNING APPROACH. Journal of Theoretical and Applied Information Technology. 100. 7035-7043.
  • Mivule, K., & Turner, C. (2012). Applying Data Privacy Techniques on Published Data in Uganda. In Proceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
  • Zhang, Y., Zhang, W., Chen, K., Liu, J., Liu, Y., & Yu, N. (2018, June). Adversarial examples against deep neural network based steganalysis. In Proceedings of the 6th ACM Workshop on information hiding and multimedia security (pp. 67-72).
  • Tan, S., & Li, B. (2014, December). Stacked convolutional auto-encoders for steganalysis of digital images. In Signal and information processing association annual summit and conference (APSIPA), 2014 Asia-Pacific (pp. 1-4). IEEE.
  • Tabares-Soto, Reinel, Raúl Ramos-Pollán, Gustavo Isaza, Simon Orozco-Arias, Mario Alejandro Bravo Ortíz, Harold Brayan Arteaga Arteaga, Alejandro Mora Rubio, and Jesus Alejandro Alzate Grisales. "Digital media steganalysis." In Digital Media Steganography, pp. 259-293. Academic Press, 2020.
  • Gianvecchio, S., & Wang, H. (2007, October). Detecting covert timing channels: an entropy-based approach. In Proceedings of the 14th ACM conference on Computer and communications security. (pp. 307-316).
  • Liu, G., Zhai, J., & Dai, Y. (2012). Network covert timing channel with distribution matching. Telecommunication Systems, 49(2), 199-205
  • M. Okello, "A New Timing Steganography Algorithm in Real-Time Transmission Devices," 2018 IEEE 18th International Conference on Communication Technology (ICCT), Chongqing, China, 2018, pp. 880-884, doi: 10.1109/ICCT.2018.8600103.
  • Okello, M. O. (2021). Transmission of Secret Information Based on Time Instances. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 16, 209-218. DOI: 10.55549/epstem.1068612
  • William Soukoreff, R., & Scott Mackenzie, I. (1995). Theoretical upper and lower bounds on typing speed using a stylus and a soft keyboard. Behaviour & Information Technology, 14(6), 370-379.
  • Brysbaert, M. (2019). How many words do we read per minute? A review and meta-analysis of reading rate. Journal of memory and language, 109, 104047. Online blog typing speed by admin: https://onlinetyping.org/blog/average-typing-speed.php
There are 16 citations in total.

Details

Primary Language English
Subjects Software Engineering (Other), Applied Mathematics
Journal Section Articles
Authors

Moses Oyaro Okello 0000-0002-5483-1147

Early Pub Date June 3, 2023
Publication Date June 16, 2023
Acceptance Date April 11, 2023
Published in Issue Year 2023 Volume: 6 Issue: 1

Cite

APA Okello, M. O. (2023). Steganalysis of Chat Based Steganography. International Journal of Informatics and Applied Mathematics, 6(1), 29-39. https://doi.org/10.53508/ijiam.1243912
AMA Okello MO. Steganalysis of Chat Based Steganography. IJIAM. June 2023;6(1):29-39. doi:10.53508/ijiam.1243912
Chicago Okello, Moses Oyaro. “Steganalysis of Chat Based Steganography”. International Journal of Informatics and Applied Mathematics 6, no. 1 (June 2023): 29-39. https://doi.org/10.53508/ijiam.1243912.
EndNote Okello MO (June 1, 2023) Steganalysis of Chat Based Steganography. International Journal of Informatics and Applied Mathematics 6 1 29–39.
IEEE M. O. Okello, “Steganalysis of Chat Based Steganography”, IJIAM, vol. 6, no. 1, pp. 29–39, 2023, doi: 10.53508/ijiam.1243912.
ISNAD Okello, Moses Oyaro. “Steganalysis of Chat Based Steganography”. International Journal of Informatics and Applied Mathematics 6/1 (June 2023), 29-39. https://doi.org/10.53508/ijiam.1243912.
JAMA Okello MO. Steganalysis of Chat Based Steganography. IJIAM. 2023;6:29–39.
MLA Okello, Moses Oyaro. “Steganalysis of Chat Based Steganography”. International Journal of Informatics and Applied Mathematics, vol. 6, no. 1, 2023, pp. 29-39, doi:10.53508/ijiam.1243912.
Vancouver Okello MO. Steganalysis of Chat Based Steganography. IJIAM. 2023;6(1):29-3.

International Journal of Informatics and Applied Mathematics