StegoGIS: A new steganography method using the geospatial domain

  Geographic data are used on a variety of computing devices for many different applications including navigation, tracking, location planning, and marketing. The prevalence of geographic data makes it possible to envision new useful applications. In this paper, we propose using geographic data as a medium for secret communication, or steganography. We develop a method called StegoGIS for hiding messages in geographic coordinates in the well-known binary of fast-moving objects and transmitting them secretly. We show that discovering this secret communication is practically impossible for third parties. We also show that a large amount of secret data can be transmitted this way, and that the receiver can easily extract the hidden message. We argue that StegoGIS offers a novel and practical secret communication method with minimal overhead.

___

  • Kurtuldu Ö, Arica N. A new steganography method using image layers. In: ISCIS 2008 23rd International Sympo- sium on Computer and Information Sciences; 27–29 October 2008; İstanbul, Turkey. New York, NY, USA: IEEE. pp .1-4.
  • Alla K, Shankar GG, Subrahmanyam GB. Secure transmission of authenticated messages using new encoding scheme and steganography. In: Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology; 26–28 October 2012. New York, NY, USA: ACM. pp. 749-752.
  • Arica N, Kurtuldu Ö. Image steganography by wavelet matching. J Electron Imaging 2009; 18: 033013.
  • Wu KC, Wang CM. Steganography using reversible texture synthesis. In: IEEE TIP IEEE Transactions on Image Processing; 14 November 2014. New York, NY, USA: IEEE. pp. 130-139.
  • Mazurczyk W, Szczypiorski K, Lubacz J. Four ways to smuggle messages through internet services. In: IEEE Spectrum; 2013. New York, NY, USA: IEEE. pp. 42-45.
  • Ren W, Liu Y, Zhao J. Provably secure information hiding via short text in social networking tools. Tsinghua Sci Technol 2012; 17: 225-231.
  • Li AB, Li SS, Lv GN. Disguise and reduction methods of GIS vector data based on difference expansion principle. Procedia Engineering 2012; 29: 1344-1350.
  • Zielinska E, Mazurczyk W, Szczypiorski K. Trends in steganography. Commun ACM 2014; 57: 86-95.
  • Niu XM, Shao CY, Wang XT. GIS watermarking: hiding data in 2D vector maps. SCI 2007; 58: pp.123–155.
  • OpenGIS Implementation Standard for Geographic Information. OGC. Version 1.2.1.
  • Geographic information Well known text representation of coordinate reference systems. OGC. Version 1.0.
  • OGC Web Feature Service 2.0 Interface Standard With Corrigendum. OGC. Version 2.0.2.
  • Hebbes L, Janjua F.Y., Livingstone D, Orwell J. A steganographic method for the secure embedding of GIS data streams into aerial photography. In: Joint IST Workshop on Mobile Future, 2006 and the Symposium on Trends in Communications; 24-27 June 2006. Bratislava, Slovakia: SympoTIC’06.
  • Klubsuwan K, Mungsing S. Digital data security and hiding on virtual reality VDO 3DGIS-map. In: IAM2008 4th IEEE International Conference on Management of Innovation and Technology; 13–15 May 2008; Bangkok, Thailand. New York, NY, USA: IEEE. pp. 548-553.
  • Wolthusen SD. Secure visualization of GIS data. In: IWIA 2006 IEEE Information Assurance Workshop; 21–23 June 2006; West Point, NY, USA. New York, NY, USA: IEEE. pp. 200-207.
  • Yershov A, Zabiniako V, Semenchuk P. Using concatenated steganography for visual analysis in GIS SOA. In: ACSS 2012. pp.74-82.
  • OpenGIS Implementation Standard for Geographic information - Simple Feature Access Part 2: SQL Option. OGC. Version 1.2.1.
  • Hemalatha S, Dinesh Acharya U, Renuka A, Kamath PR. A secure and high capacity image steganography technique. arXiv preprint 2013. arXiv:1304.3629.
  • Rabie T, Kamel I. High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimed Tools Appl 2016; 76: 6473-6493.
  • Brisbane G, Safavi-Naini R, Ogunbona P. High-capacity steganography using a shared colour palette. In: IEE Proceedings on Visual Image Signal Processings; 24 October 2005. pp. 787-792.
  • Szczypiorski K, Tyl T. MoveSteg: A method of network steganography detection. Int J Electron Telecommun 2016; 62: 335-341.
  • Watters PA, Martin F, Stripf HS. Visual steganalysis of LSB-encoded natural images. In: Proceedings of 3rd International Conference on Information Technology Applications; 1 August 2005; Sydney, Australia. New York, NY, USA: IEEE. pp. 746-751.