New Project 2
New Project 2
New Project 2
Abstract Steganography is the art of hiding secret information in media such as image,
audio and video. The purpose of steganography is to conceal the existence of the secret
information in any given medium. In the world of E-Commerce internet banking is one of the
indispensable applications. Security issues are to be addressed critically in internet banking
applications and it directly influences the comfort. This work aims at applying newly proposed
Dynamic Pattern based Image Steganography (DPIS) algorithm in the E-banking domain.
Using DPIS algorithm how the critical E-banking major security issues such as transaction
security and phishing threats are addressed discussed in this paper. DPIS algorithm has been
evaluated qualitatively and need for quantitatively analysis is emphasized.
Keywords- Image Steganography,E-Transaction,Phishing,Plug-in,Embedding,Extracting.
1 Introduction
Information is Wealth, is a profoundly known statement. This goes inherent in all the aspects of
business. With information serving a critical role in e-banking industry, preserving it becomes
the most challenging activity. This paper presents how steganography enhances the internet
banking transaction security and prevents phishing attack which are considered as top security
issues in E-banking industry.
Dynamic Pattern based Image Steganography (DPIS) algorithm is used in
E-banking
application to enhance the security of data with is transmitted between client and server. This
deals with the step-wise transition of data and suggests a mechanism to cover the information
from the intruders. The security is guaranteed by the inclusion of a stego-layer in the client and
server side.
Phishing is prevented by DPIS algorithm by importing the algorithm as plug-in and installed in
browser. Architecture, working model of the above methods were discussed and it has been
evaluated qualitatively and it also emphasis the need of quantitative analysis of the above
proposed methods in E-banking.
They are
Phishing
Injection of commands
In this, topic of focus, cracking of user credentials during transmission and phishing attack have
been analyzed and novel method has been proposed and implemented.
2.1 Transaction Level Security Literature Review
Financial institutions offering Internet-banking should have reliable and secure methods for
transactions. In this section some of the security mechanisms provided during transmission from
literature have been discussed.
Transaction level security [8] is also ensured by two factor authentication which is ensured by
something that user has (bank card), something that user is (finger prints), something that user
knows (password).
Hiltgen et.al [8] in his paper targets Man in the middle attack by Short-time password solutions
based on a password generating hardware token which are available from various manufacturers
such as RSA Security, Active Card or VeriSign. The RSAs Secure ID solution is the most
prominent example. It consists of a small device including a LCD display and one button the
user can press to initiate the calculation of the next short-time password.
Usage of cell phone services for secure transaction. For each transaction the secret code is send
to the users mobile. Only upon giving the correct code which is transferred to the mobile the
transaction will be carried out.
Secure Socket Layer (SSL) is another mechanism which was proposed for secure transaction.
AES is the most commonly used encryption algorithm [11] for high end security applications.
Recently it has been proven by cryptographers that the AES is breakable [1].
Though there are many transaction security mechanisms involved to safe users transaction yet lot
many theft occurs in internet banking and it urges the importance of some new concrete
mechanism to uplift the security in internet banking transaction.
2.2 Phishing Literature Review
A huge variety of phishing defense mechanism like email authentication [3], email filters [4],
anti-phishing plug-ins [5], malware scanners, personal firewalls, and other authentication
mechanisms [6] are reported in literature.
In this section Anti-Phishing plug-in such as net craft Toolbar, Trust Watch, Phish Net 1.2 and
Spoof Stick which are relevant to this paper are discussed in detail.
Net craft Toolbar
The Netcraft Toolbar [7] uses Netcrafts databases to track web site information such as sites
hosting location, country, longevity and popularity help of this information the website will be
found legitimate website or phished website. If the user accessed website attributes matches with
the already existing attributes in the Netcrafts database then the website is considered to be
legitimate website. If the attributes doesnt matches with the stored data base value then the
website is phished website.
Trust Watch
Trust Watch [8] works with third-party reputation services to determine whether the given site is
legitimate or phished one. Once the user types the URL in the address bar the text in it is
compared with the list of black listed URL database. If the match is found then the user will be
prevented from accessing the site else the web page will be loaded.
Phish Net 1.2
Phish Net 1.2 [9] is a sensitive user-interaction plug-in that seamlessly protects users from Web
phishing scams. With complicated behavioral analysis approach, the plug-in detects emails that
either originates from suspect locations, or emails with suspect content, that maliciously refers
users to phish sites.
Spoof Stick
Spoof Stick [10] makes it easier to spot a spoofed website by prominently displaying only the
most relevant domain information. Spoof stick works on the basic principle of domain name.
Domain name is obtained from the URL. If you are on a valid eBay website Spoof stick will say:
"You're on ebay.com". If you get fooled by going to a spoofed site, for example
http://signin.ebay.com@10.19.52.4/ Spoof stick will say: "You're on 10.19.52.4".
All the plug-in reported in the literature survey one way or the other depends on the database
which contains the black listed URLs. If the user types the URL in the address bar, the typed URL
is checked with all the entries in the database which is time consuming. Another drawback in the
existing techniques is that until the newly detected phishing website is added to the black listed
database the users are prone to the phishing attack.
These surveys on security mechanism on transaction security and phishing clearly points out the
need for a technique which ensures more secure in E-banking. In this work the concept of image
steganography using DPIS algorithm has been used and it addresses both transaction security and
phishing issues simultaneously.
The reason for choosing Steganography to enhance security in E-banking is because
Steganography hides the content of the message inside the digital medium. The main difference
between Cryptography and Steganography is Cryptography secures the secrecy of
communication and many methods have been developed to encrypt and decrypt the messages.
Unfortunately it is sometime not enough to keep the contents of message secret it may be also
necessary to keep the existence of message secret which is done by steganography.
Steganography involves hiding information inside any cover media (image or audio or video file)
such that it appears no message is hidden.
3 Dynamic Pattern Based Image Steganography Algorithm (DPIS)
Steganography is the art of hiding secret information in media such as image, audio and video
[4]. The purpose of steganography is to conceal the existence of the secret information in any
given digital medium. The following pseudo code explains clearly the proposed DPIS algorithm
[12] on RGB based Image steganography.
Embedding Part
Generate Indicator Sequence of any length
Get the Cover image
Get the Secret message to be embedded
For 1 to last _row
For 1 to last_col
Fix the Indicator Channel
If (Indicator channel is lowest)
Skip
Else
Find the lowest channel
Embed the secret message
bits
Mark the bits embedded in
rd
3 channel
End if
End For
End For
Extracting Part
Get the Indicator Sequence from embedding part
Get the Stego-Image
For 1 to last _row
For 1 to last_col
While (Entire bits not extracted = true)
Find the Indicator channel
If (Indicator channel is lowest)
Skip
Else
Find the data channel
Extract the bits embedded
End if
End While
End For
End For
Browser
Internet
E
x
t
r
a
c
ti
n
g
Bank Server
Bank Database
Brute force
Brute force attack on Indicator sequence: Brute force attacks for Stego-layer method [2] [3] [5]
involves in trying all possible keys until valid key is found. In dynamic pattern based image
steganography technique, indicator channel contains the information where the data are stored.
Intruder may try the brute force attack on indicator sequence until meaningful message is traced.
In all experiments length of indicator sequence is greater or equal to 20 so number of distinct
patterns generated is very high. For example if the indicator length is 20 the number of distinct
patterns generated is 7, 748, 40,978 and it is difficult to break by brute force attack.
The secret message shown in the Table 1 has been embedded in the cover medium by DPIS
technique Brute force attack has been applied on the indicator sequence for extracting message
from the stego image
Table 1: Embedded message and extracted message with wrong pixel indicator
Dept
QibP(97u2q < <] 4]nD
|:8* ~v&N-F KKe W;'
The above experiment depicts that even if one value in the indicator sequence is incorrect,
embedded secret message cannot be extracted.
Extracting data from all the pixels sequentially: In Stego-layer method data are not embedded
in all the pixels sequentially. Some pixels in the sequence are missed in order to strengthen the
algorithm. The Table 2 shows the result of extracting data from all the pixels from stegoimage.
The embedded message in the image cannot be extracted without the key. Since the Key is
known only by the communicating parties the DPIS algorithm prevents Man in the middle attack
and Session Hijacking.
Table 2: Embedded Message and Extracted Message from all the pixels in the Stego Image
Extracting same number of bits from all pixels: In the Stego-layer technique the number of bits
embedded in each pixel varies and it is decided during the run time. Experiments were conducted
for extracting same number of bits from all the pixels in the stegoimage generated by DPIS
technique. The Table 3 shows the result of extracting same number of bits from all the pixels
from stego-image.
Table 3: Embedded message and message extracted with uniform number of bits from pixels in
the stego image
Embedded Secret Message in cover medium
Pondicherry University
Computer Science Dept
Network Security
Transaction Security
Performance
Availability
Dependency
From previous section it has been proved that experimental results of DPIS algorithm perform
well in qualitative analysis. Currently we are focusing to compare the DPIS algorithm with other
different existing transaction security methods and anti-phishing methods quantitatively on
parameters such as performance, Integrity, Confidentiality, availability, System resources
utilization and non-repudiation.
References
[1] Alex Biryukov; Orr Dunkelman; Nathan Keller; Dmitry Khovratovich; Adi Shamir "Key Recovery Attacks
of Practical Complexity on AES Variants With Up To 10 Rounds" , 2009
[2] Anderson RJ, and Petitcolas FAP, On limits of steganography, IEEE Journals of selected areas in
communications , May 1998
[3] Andreas Westfeld , Andreas Pfitzmann, Attacks on Steganographic Systems, Proceedings of the Third
International Workshop on Information Hiding, p.61-76, September 29-October 01, 1999
[4] Bailey K, Curran K. An Evaluation of Image Based Steganography Methods Multimedia Tools &
Applications, Vol.30.No.1.pages 55-88 July 2006
[5] Christos K. Dimitriadis, Analyzing the Security of Internet Banking Authentication Mechanisms
Information Systems Control Journal, Volume 3, 2007
[6] Egwali Annie Oghenerukeyb et.al, Customers Perception of Security Indicators in Online Banking Sites in
Nigeria Journal of Internet Banking and Commerce, April 2009
[7] Geeta S Navale, Swati.S.Joshi, Aradhana A Deshmukh, M-banking Security a futuristic improved
Security approach, International journal of Computer Science Issues, Vol 7 Issue 1,No 2 , January 2010.
[8] Hiltgen A, Kramp T, Weigold T, (2006), Secure Internet Banking Authentication, IEEE Security and
Privacy, Vol. 4, No.2, 2006.
[9] Internet Banking in India-Part I - Dr A. K. Mishra http://www.banknetindia.com/banking/ibkg.htm
[10] Plossl K., Federrath H., Nowey T., Protection Mechanisms Against Phishing Attacks, in Trust, Privacy
and Security in Digital Business, Lecture Notes in Computer Science Volume 3592, Springer, 2005
[11] Svante Seleborg. About AES Advanced Encryption Standard www.axantum.com/axcrypt/etc/AboutAES.pdf, 2007
[12] Thiyagarajan P, Aghila G, Prasanna Venkatesan V, Dynamic Pattern Based Image Steganography,
Journal of Computing ISSN 2151-9617 Volume 3, Issue 2 February 2011.