17-12-2012, 02:54 PM
Secret Communication through Web Pages Using Special Space Background Color in HTML Files
Secret Communication.doc (Size: 286.5 KB / Downloads: 28)
Abstract:
Watermarking provides for the embedding of information in a block of host data in conditions where perceptible modification of the host data is intolerable. Watermark techniques are highly dependent on the character string of the host data. A technique for embedding information in image makes subtle changes in hue, while a method for embedding information in audio data could exploit the limitations of the human ear by encoding the encapsulated information in inaudible frequency ranges. Current implementations of textual Steganography exploit tolerances in typesetting by making minute changes in line placement and kerning in order to encapsulate hidden information, making them vulnerable to simple retype setting attacks. In this research we present a method to hide text in HTML Web page files using HTML characteristics without given suspicious to the hidden data. The embedding process and the extracting process need keys to embed and extract hidden data.
Introduction:
Every few years, computer security has to re-invert itself. New technologies and new applications bring new threats, and force us to invent new protection mechanisms. Cryptography has become important when businesses started to build networked computer system; virus epidemics started once large numbers of personal computer (PC) users were swapping programs; and when the Internet took off, the firewall industry was one of the first to benefit [2]. One of the newest hot spots in security applications is information hiding. It is driven by two of the biggest policy issues of the information age-copyright protection (Watermark) and state surveillance (Steganography).
The general model of hiding data in other data can be described as follows: The embedded data is the message that one wishes to send secretly. It is usually hidden in an innocuous message referred to as a cover-text, cover-image or cover-audio as appropriate, producing the W-text or other W-object. A w-key is used to control the hiding process so as to restrict detection and/or recovery of the embedded data to parties who know it (or who know some derived key value)[1]. The figure(1) is show the core part Information Hiding.
HTML Characteristics:
It is a hyper text markup language for connecting web pages on the web sites. Now a day’s xml is used 4 creating web pages or also used software named dream viewer OK.HTML is very popular markup [3]. HTML email is extremely popular in today’s world where the Internet and email play such an important part in all our lives. Most forms of communication, or maybe even all of it, make use of the Internet mainly because it is convenient, user friendly and, for the most part, reliable.
Related work:
Techniques 1
In [5] the main idea of this approach is to make a secret communication method via web pages by embedding special space codes in HTML text to encode message bits in triplets (3bit) is proposed. The proposed method carries out the communication work between two sites, a sender and a receiver, through the Internet via web page publishing and downloading in the following way. Two distinct types of space characters, named (normal) space and non-breaking space. The proposed method is feasible. For security consideration, the length of secret data should be long enough, e. g., more than 256 characters, to reduce the probability for a hacker to guess the message correctly.
Embedding of a secret message:
When input side, A secret message S in the form of a character string, a cover HTML text CT, a secret key S(K), and a random number generator f() then in output side W-HTML text T’ with S embedded create. In this process convert the length n of S in the unit of character into a binary number and add leading 0’s to it to form a 3m-bit binary string B, where m is a pre-selected integer such that 3m is no smaller than the length of any possible message to be hidden. Transform each character in S' into its 8-bit binary ASCII code and concatenate them to form a binary string suppose S1.
In the above algorithm we assume that the text T is long enough to embed the message S. Also, the length of the message is also embedded in the leading between-word locations in T. This is necessary for the later work of message recovery to extract a correct numbers of characters from the stego-text. The detailed algorithm for extracting the embedded message is as follows.
Extraction of a secret message.
When input inside for the extraction a secret message a W-HTML text T’ with a message S embedded, and a secret key K and a random number generator f as those used in embedded algorithm. Then output side embedded message S get.
There are specifying space name as normal space and the non breaking space. So that there also specify the special code define according to the space and code type(Unicode and HTML name).These codes appear as white spaces in the web page, and so may be used to encode secret message bits with watermarked effects. The codes are the result of a thorough investigation of all possible coding systems which can be applied in the HTML file. The character string of each message, before being embedded, is randomized with a secret key.
Techniques 2
In [6] The main idea of proposed some techniques(empty elements, White spaces, Appearing order of the elements, attributes, other element) for hiding information using XML file. Techniques discussed were empty elements, white spaces in tags, attribute and element ordering. It has ability to trace the source of unauthorized copies. All these techniques have been proposed as a communication model; none of these were implemented to show the results of these techniques but proposed as a future recommendation. Experiments and analysis prove that different ways can be adopted to use each method hence varieties are noticed amongst different authors.