Covert Transmission of Embedded Image Using “Stegacrypt”

Purpose: The aim of this research paper is to develop demonstrate the use of Stegacrypt – a software for Encrypting and Embedding Secret Digital Information to mitigate external threats in an Organizational information systems.

Design/methodology/approach: This new steganography scheme modifies the palettes of the carrier image by embedding one message bit of an encrypted file into each pixel in a Graphic Interchange Format (GIF) image. Passwords are used as identification schemes to prevent unauthorized use of the software and hybridization of encryption and steganography in the scheme provides an extra layer of security that cannot be easily outwitted by hackers.

Findings: Our findings showed that Stegacrypt does not suffering from visual degradation of stego images when compared with the original image file. The stability of Stegacrypt against attacks was ascertained by using StegalyzerSS, a digital forensic analyzer to launch pair values, RS and Chi-square attacks on stego-images embedded by the software. The result of the stego-analysis showed that Stegacrypt is able to withstand various forms of attack and can therefore be employed for covert transmission of information.

Research limitations/implications: This research shows that existing embedding software can be improved using the techniques adopted in Stegarypt.

Practical and Policy implications: Graphic Interchange Format (GIF) Image is the file format used as the carrier image for hidden messages in Stegacrypt. Other forms of image can be tested to see how they scale for embedding and encryption.

Social implications: This novelty will improve covert channel transmission of sensitive information and make the cyber space safer for users.

Originality/value: This research goes beyond encryption (which remains the most popular tool for security) to employ image embedding as a means of transmitting sensitive information on IS networks. We also improved on the preservation of the image carrier quality which is a problem suffered by existing stega-systems.

Keywords: Stegacrypt, Steganography, Cryptography, Ciphertext, Encryption, Decryption, Steganalysis, Protection, Covert, Cyber crime.


Longe, O.B. and Dada, E.G. (2010) Covert Transmission of Embedded Image Using “Stegacrypt”, Anthology of Abstracts of the 3rd International Conference on ICT for Africa, March 25-27, Yaoundé, Cameroon. Baton Rouge, LA: International Center for IT and Development.

TO ACCESS FULL PAPER, CONTACT AUTHORS VIA CORRESPONDING EMAIL (longeolumide@icitd.org)

Advertisements
This entry was posted in ICTs in Sub-Saharan Africa. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s