Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2896387.2896408acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccConference Proceedingsconference-collections
research-article

Detection Of URL In Image Steganography

Published: 22 March 2016 Publication History

Abstract

Steganography is the science of hiding data within data. Either for the good purpose of secret communication or for the bad intention of leaking sensitive confidential data or embedding malicious code or URL. However, many different carrier file formats can be used to hide these data (network, audio, image.etc) but the most common steganography carrier is embedding secret data within images as it is considered to be the best and easiest way to hide all types of files (secret files) within an image using different formats (another image, text, video, virus, URL.etc). To the human eye, the changes in the image appearance with the hidden data can be imperceptible. In fact, images can be more than what we see with our eyes. Therefore, many solutions where proposed to help in detecting these hidden data but each solution have their own strong and weak points either by the limitation of resolving one type of image along with specific hiding technique and or most likely without extracting the hidden data. This paper intends to propose a novel detection approach that will concentrate on detecting any kind of hidden URL in all types of images and extract the hidden URL from the carrier image that used the LSB least significant bit hiding technique.

References

[1]
M. Hariri, R. Karimi, and M. Nosrati, "An introduction to steganography methods," World Applied Programming, vol. 1, no. 3, pp. 191--195, 2011.
[2]
R. Krenn, "Steganography and steganalysis," Retrieved September, vol. 8, p. 2007, 2004.
[3]
N. F. Johnson and S. Jajodia, "Exploring steganography: Seeing the unseen," Computer, vol. 31, no. 2, pp. 26--34, 1998.
[4]
N. Provos and P. Honeyman, "Hide and seek: An introduction to steganography," Security & Privacy, IEEE, vol. 1, no. 3, pp. 32--44, 2003.
[5]
A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, "Digital image steganography: Survey and analysis of current methods," Signal processing, vol. 90, no. 3, pp. 727--752, 2010.
[6]
softonic. (2015) Xiao steganography. {Online}. Available: http://xiao-steganography.en.softonic.com/
[7]
C. Mohapatra and M. Pandey, "A review on current methods and application of digital image steganography." International Journal of Multidisciplinary Approach & Studies, vol. 2, no. 2, 2015.
[8]
T. Morkel, J. H. Eloff, and M. S. Olivier, "An overview of image steganography." in ISSA, 2005, pp. 1--11.
[9]
Y. J. Chanu, T. Tuithung, and K. Manglem Singh, "A short survey on image steganography and steganalysis techniques," in Emerging Trends and Applications in Computer Science (NCETACS), 2012 3rd National Conference on. IEEE, 2012, pp. 52--55.
[10]
O. K. E. Satir, "A distortionless image steganography method via url," in The 7th International Conference Information Security and Cryptology, 2014.
[11]
D. S. C. T. U. T. Intelligence. (2015) Stegoloader: A stealthy information stealer. {Online}. Available: http://www.secureworks.com/cyber-threat-intelligence/threats/stegoloader-a-stealthy-information-stealer/
[12]
D. S. C. T. U. Brett Stone-Gross, Ph.D. (2014) Malware analysis of the lurk downloader. {Online}. Available: http://www.secureworks.com/cyber-threat-intelligence/threats/malware-analysis-of-the-lurk-downloader/?view=Standard
[13]
ICANN. (2016) List of top-level domains. https://www.icann.org/resources/pages/tlds-2012-02-25-en. {Online}. Available: https://www.icann.org/resources/pages/tlds-2012-02-25-en
[14]
R. Sedgewick and K. Wayne. (2014) Radix sorts. {Online}. Available: https://www.cs.princeton.edu/~rs/AlgsDS07/18RadixSort.pdf

Cited By

View all
  • (2023)Removing Stegomalware from Digital Image FilesAdvances in IoT and Security with Computational Intelligence10.1007/978-981-99-5085-0_2(15-26)Online publication date: 23-Sep-2023
  • (2022)Revealing MageCart-like Threats in Favicons via Artificial IntelligenceProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544437(1-7)Online publication date: 23-Aug-2022
  • (2022)A Novel Steganography Approach to Embed Secret Information into a Legitimate URL2022 2nd International Conference on Computing and Information Technology (ICCIT)10.1109/ICCIT52419.2022.9711647(180-185)Online publication date: 25-Jan-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICC '16: Proceedings of the International Conference on Internet of things and Cloud Computing
March 2016
535 pages
ISBN:9781450340632
DOI:10.1145/2896387
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 March 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Image Steganography
  2. Security
  3. Steganography
  4. String Matching
  5. URL Detection
  6. steganalysis

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICC '16

Acceptance Rates

Overall Acceptance Rate 213 of 590 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Removing Stegomalware from Digital Image FilesAdvances in IoT and Security with Computational Intelligence10.1007/978-981-99-5085-0_2(15-26)Online publication date: 23-Sep-2023
  • (2022)Revealing MageCart-like Threats in Favicons via Artificial IntelligenceProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544437(1-7)Online publication date: 23-Aug-2022
  • (2022)A Novel Steganography Approach to Embed Secret Information into a Legitimate URL2022 2nd International Conference on Computing and Information Technology (ICCIT)10.1109/ICCIT52419.2022.9711647(180-185)Online publication date: 25-Jan-2022
  • (2022)Detecting Stegomalware: Malicious Image Steganography and Its Intrusion in WindowsSecurity, Privacy and Data Analytics10.1007/978-981-16-9089-1_9(103-116)Online publication date: 8-Apr-2022
  • (2020)A Novel Image Steganography Using Multiple LSB Substitution and Pixel Randomization Using Stern-Brocot SequenceAdvances in Information and Communication10.1007/978-3-030-39445-5_55(756-773)Online publication date: 25-Feb-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media