StegoGIS: A new steganography method using the geospatial domain

StegoGIS: A new steganography method using the geospatial domain

Geographic data are used on a variety of computing devices for many different applications includingnavigation, tracking, location planning, and marketing. The prevalence of geographic data makes it possible to envisionnew useful applications. In this paper, we propose using geographic data as a medium for secret communication, orsteganography. We develop a method called StegoGIS for hiding messages in geographic coordinates in the well-knownbinary of fast-moving objects and transmitting them secretly. We show that discovering this secret communication ispractically impossible for third parties. We also show that a large amount of secret data can be transmitted this way,and that the receiver can easily extract the hidden message. We argue that StegoGIS offers a novel and practical secretcommunication method with minimal overhead.

___

  • [1] Kurtuldu Ö, Arica N. A new steganography method using image layers. In: ISCIS 2008 23rd International Symposium on Computer and Information Sciences; 27–29 October 2008; İstanbul, Turkey. New York, NY, USA: IEEE. pp .1-4.
  • [2] Alla K, Shankar GG, Subrahmanyam GB. Secure transmission of authenticated messages using new encoding scheme and steganography. In: Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology; 26–28 October 2012. New York, NY, USA: ACM. pp. 749-752.
  • [3] Arica N, Kurtuldu Ö. Image steganography by wavelet matching. J Electron Imaging 2009; 18: 033013.
  • [4] Wu KC, Wang CM. Steganography using reversible texture synthesis. In: IEEE TIP IEEE Transactions on Image Processing; 14 November 2014. New York, NY, USA: IEEE. pp. 130-139.
  • [5] Mazurczyk W, Szczypiorski K, Lubacz J. Four ways to smuggle messages through internet services. In: IEEE Spectrum; 2013. New York, NY, USA: IEEE. pp. 42-45.
  • [6] Ren W, Liu Y, Zhao J. Provably secure information hiding via short text in social networking tools. Tsinghua Sci Technol 2012; 17: 225-231.
  • [7] Li AB, Li SS, Lv GN. Disguise and reduction methods of GIS vector data based on difference expansion principle. Procedia Engineering 2012; 29: 1344-1350.
  • [8] Zielinska E, Mazurczyk W, Szczypiorski K. Trends in steganography. Commun ACM 2014; 57: 86-95.
  • [9] Niu XM, Shao CY, Wang XT. GIS watermarking: hiding data in 2D vector maps. SCI 2007; 58: pp.123–155.
  • [10] OpenGIS Implementation Standard for Geographic Information. OGC. Version 1.2.1.
  • [11] Geographic information Well known text representation of coordinate reference systems. OGC. Version 1.0.
  • [12] OGC Web Feature Service 2.0 Interface Standard With Corrigendum. OGC. Version 2.0.2.
  • [13] Hebbes L, Janjua F.Y., Livingstone D, Orwell J. A steganographic method for the secure embedding of GIS data streams into aerial photography. In: Joint IST Workshop on Mobile Future, 2006 and the Symposium on Trends in Communications; 24-27 June 2006. Bratislava, Slovakia: SympoTIC’06.
  • [14] Klubsuwan K, Mungsing S. Digital data security and hiding on virtual reality VDO 3DGIS-map. In: IAM2008 4th IEEE International Conference on Management of Innovation and Technology; 13–15 May 2008; Bangkok, Thailand. New York, NY, USA: IEEE. pp. 548-553.
  • [15] Wolthusen SD. Secure visualization of GIS data. In: IWIA 2006 IEEE Information Assurance Workshop; 21–23 June 2006; West Point, NY, USA. New York, NY, USA: IEEE. pp. 200-207.
  • [16] Yershov A, Zabiniako V, Semenchuk P. Using concatenated steganography for visual analysis in GIS SOA. In: ACSS 2012. pp.74-82.
  • [17] OpenGIS Implementation Standard for Geographic information - Simple Feature Access Part 2: SQL Option. OGC. Version 1.2.1.
  • [18] Hemalatha S, Dinesh Acharya U, Renuka A, Kamath PR. A secure and high capacity image steganography technique. arXiv preprint 2013. arXiv:1304.3629.
  • [19] Rabie T, Kamel I. High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimed Tools Appl 2016; 76: 6473-6493.
  • [20] Brisbane G, Safavi-Naini R, Ogunbona P. High-capacity steganography using a shared colour palette. In: IEE Proceedings on Visual Image Signal Processings; 24 October 2005. pp. 787-792.
  • [21] Szczypiorski K, Tyl T. MoveSteg: A method of network steganography detection. Int J Electron Telecommun 2016; 62: 335-341.
  • [22] Watters PA, Martin F, Stripf HS. Visual steganalysis of LSB-encoded natural images. In: Proceedings of 3rd International Conference on Information Technology Applications; 1 August 2005; Sydney, Australia. New York, NY, USA: IEEE. pp. 746-751.
Turkish Journal of Electrical Engineering and Computer Sciences-Cover
  • ISSN: 1300-0632
  • Yayın Aralığı: 6
  • Yayıncı: TÜBİTAK
Sayıdaki Diğer Makaleler

Thyristor-based “phase hopping” frequency conversion technique

Cheng CHEN, Daiwei FENG, Jiarui ZHANG, Jiaqi YU, Zhengwang XU, Wei MEI, Yuchun YI

Comparative analysis of a novel topology for single-phase Z-source inverter with reduced number of switches

Himanshu SHARMA, Neelu JAIN, Rintu KHANNA

Synchronization and antisynchronization protocol design of chaotic nonlinear gyros: an adaptive integral sliding mode approach

Qudrat KHAN, Rini AKMELIAWATI, Fazal ur RAHMAN

Automatic concept identification of software requirements in Turkish

Özlem AKTAŞ, Fatma BOZYİĞİT, Deniz KILINÇ

Improving side lobe level of X-band microstrip Rotman lens utilizing nonuniform distribution of output ports

Ehsan ZAREIAN-JAHROMI, Parvin SALEHI, Hamidreza KARAMI, Raheleh BASIRI

A novel and unified approach for averaged channel capacity and averaged effective capacity analyses of diversity combining and multihop transmission schemes in flat fading environments

Ferkan YILMAZ, Mohamed-Slim ALOUINI

A multiseed-based SVM classification technique for training sample reduction

Imran SHARIF, Debasis CHAUDHURI

Improvement of quantized adaptive switching median filter for impulse noise reduction in gray-scale digital images

Haidi IBRAHIM, Ahmed Khaldoon ABDALAMEER

Pipelined adders for ultralow-power wearables

Hinduja PUDI, Tejaswini DHALL, Tamish VERMA, Mansi JHAMB

Determination of distance between DC traction power centers in a 1500-V DC subway line with artificial intelligence methods

İlhan KOCAARSLAN, Mehmet Taciddin AKÇAY