2018
DOI: 10.1016/j.diin.2018.03.003
|View full text |Cite
|
Sign up to set email alerts
|

Dismantling OpenPuff PDF steganography

Abstract: The version in the Kent Academic Repository may differ from the final published version. Users are advised to check http://kar.kent.ac.uk for the status of the paper. Users should always cite the published version of record.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…While a CM H is shared on network channels, it is vulnerable to passive/active attacks that may perform the above intelligent steganalysis models to identify measurable features between standard text message and stegotext in terms of imperceptibility [33]. Note that, the primary goal of text steganography is to decrease the statistical distribution difference among these two text strings.…”
Section: Cyberattack Scenariosmentioning
confidence: 99%
See 1 more Smart Citation
“…While a CM H is shared on network channels, it is vulnerable to passive/active attacks that may perform the above intelligent steganalysis models to identify measurable features between standard text message and stegotext in terms of imperceptibility [33]. Note that, the primary goal of text steganography is to decrease the statistical distribution difference among these two text strings.…”
Section: Cyberattack Scenariosmentioning
confidence: 99%
“…Note that the steganalysis only allows the detection of abnormal changes through the CM H . However, in a case that the SK is neither generated nor saved/shared by the corresponding algorithm, then adversaries cannot extract/decode the original SM from the H data even if (s)he has complete knowledge about the details of the steganography approach [33]. Also, if an attacker discovers any abnormal H data through the transferred conversations between Alice and Bob, then (s)he may still take some practical actions, such as blocking the network channel or reporting their activities to the authorities.…”
Section: Cyberattack Scenariosmentioning
confidence: 99%
“…The incremental update method is appropriate for smaller embedding capacity. An approach in [12] described that OpenPuff scheme implants secret contents within the end-of-line symbols which are referred to as white-space-characters. In this [12], an analytical study was presented that a steganography using popular OpenPuff tool can also be detected which implies that a high embedding capacity scheme is not only the parameter for better performance of steganography technique.…”
Section: Related Workmentioning
confidence: 99%
“…An approach in [12] described that OpenPuff scheme implants secret contents within the end-of-line symbols which are referred to as white-space-characters. In this [12], an analytical study was presented that a steganography using popular OpenPuff tool can also be detected which implies that a high embedding capacity scheme is not only the parameter for better performance of steganography technique. Threshold secret sharing scheme is presented in [13] that utilize the cryptographic hash procedure to validate the shared information by an authorized shareholder through implementing the secret sharing method of [14].…”
Section: Related Workmentioning
confidence: 99%