Misdirection steganography
- PDF / 254,184 Bytes
- 6 Pages / 595.276 x 790.866 pts Page_size
- 85 Downloads / 175 Views
FOUNDATIONS
Misdirection steganography Takashi Mihara1 Published online: 26 September 2020 © Springer-Verlag GmbH Germany, part of Springer Nature 2020
Abstract Information is one of the most important resources in this world. Therefore, we must protect it from third parties. A typical method for protecting information contents is cryptography. We use cryptography to prevent secret information from leaking to third parties. However, we will use steganography to conceal the existence of information because cryptography cannot achieve this function. Many steganographic techniques have been also proposed as well as cryptography. In this paper, we propose a different type of steganography called misdirection steganography. Our steganography transfers two kinds of secret data, true secret data and decoy secret data, as data embedding into cover data, and the process embedding the true secret data depends on how to embed the decoy secret data, i.e., the information about embedding the decoy secret data is also required to extract the true secret data. Our aim is to transfer true secret data in secret by letting third parties pay attention to decoy secret data. In other words, misdirection in the proposed steganography techniques is caused by the fact that the decoy secret data protect the true secret data against third parties. Keywords Steganography · Data hiding · Misdirection · Entanglement · Quantum code
1 Introduction Knowledge is power, and information is a source of knowledge. For example, technical information is an important factor for developing corporations and for generating their profits. Therefore, they should not easily disclose confidential corporate information. Similarly, personal information is also important. In today’s Internet society, especially, we must pay careful attention to them. Otherwise, we may suffer great damage. A typical method for solving these situations is information security, and cryptography is positioned as one of the most fundamental techniques. We apply cryptography to prevent secret information from leaking to third parties. However, third parties can be aware that we are transferring important although the information is encrypted. In other words, third parties that are aware of the existence of such information can easily attack the information; thus, stronger cryptographic techniques are required. Recently, quantum Communicated by A. Di Nola.
B 1
Takashi Mihara [email protected] Department of Information Sciences and Arts, Toyo University, 2100 Kujirai Kawagoe, Saitama 350-8585, Japan
cryptography based on quantum physics has also been proposed as a kind of an unconditionally secure cryptographic technique (Bennett and Brassard 1984; Ekert 1991). Furthermore, a technique concealing data within other data in secret, data hiding, has been also proposed (Anderson and Petitcolas 1998; Petitcolas et al. 1999). Data hiding technique exists from ancient times as well as cryptography. However, this technique is developing rapidly with the invention of digital equipment. In this pa
Data Loading...