WO2013179304A2 - A computer implemented system and method for concealing confidential information - Google Patents
A computer implemented system and method for concealing confidential information Download PDFInfo
- Publication number
- WO2013179304A2 WO2013179304A2 PCT/IN2013/000318 IN2013000318W WO2013179304A2 WO 2013179304 A2 WO2013179304 A2 WO 2013179304A2 IN 2013000318 W IN2013000318 W IN 2013000318W WO 2013179304 A2 WO2013179304 A2 WO 2013179304A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- secret key
- confidential information
- characters
- grid
- computer implemented
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Definitions
- the present disclosure relates to the field of digital steganography.
- the present disclosure relates to camouflaging secret text.
- the present disclosure relates to computer implemented system and method for camouflaging secret text by embedding secret text with random text using digital steganography technique.
- Passwords are typically secret texts, normally known to respective users of a software application. While, user name typically required to access a software application is considered to be general text, the corresponding password is treated as confidential and secret text.
- Secret texts typically passwords, are utilized by software applications to authenticate and validate users. Passwords are generally made known to respective users and they are required to enter the password in order to access the corresponding software application.
- steganography is utilized to communicate messages in such a way that they cannot be detected and accessed by unauthorized users.
- Digital steganography technique is also utilized to protect information from various types of security attacks.
- Digital steganography technique proposes utilizing invisible ink to hide certain portions of the information.
- Digital steganography technique also proposes manipulating bits underlying the information in order to protect the information from unauthorized access.
- An object of the present disclosure is to provide a system that provides for concealing secret text within random text.
- Yet another object of the present disclosure is to provide a system that works hand-in-hand with graphical user interface elements of software applications.
- Still a further object of the present disclosure is to provide a system that displays text hidden within random text, on the graphical user interface of software applications.
- Another object of the present disclosure is to provide a system that protects information against various security attacks.
- Yet another object of the present disclosure is to provide a system that does not depend upon the characteristics associated with graphical user interfaces of software applications.
- Another object of the present disclosure is to provide a system that makes use of a secret key to conceal secret text within random text.
- One more object of the present disclosure is to provide a system that does not depend upon user interface characteristics such as color, position, size and the like for concealing secret text.
- the present disclosure envisages a computer implemented system for concealing confidential information by combining the confidential information with random text using a secret key.
- the system in accordance with the present disclosure includes:
- a first computer enabled device accessible to a sender of said confidential information, said first computer enabled device comprising: o a secret key generator configured to generate a plurality of secret keys;
- a reader having access to said confidential information and said secret key, said reader configured to sequentially read the characters contained in said confidential information and said secret key;
- a pairing module configured to combine each character of said confidential information with each character of said secret key and generate a combined string, said combined string having a plurality of cells wherein each cell comprises a character of said secret key paired with a character of said confidential information;
- a grid generator configured to generate a grid having a plurality of empty cells, said grid generator configured to replace at least some of said empty cells with cells of said combined string, said grid generator comprising:
- a random text generator configured to populate the remaining empty cells of the grid with random text selected from the group consisting of- alphabets, digits and special characters.
- a second computer enabled device accessible to a recipient of said confidential information comprising:
- retriever having access to said secret key, said retriever further configured to scan said grid and identify the cells containing characters of said secret key, said retriever still further configured to retrieve the characters adjacent to said characters of the secret key, from said cells, wherein said characters adjacent to the characters of said secret key correspond to the confidential information;
- an arranging module configured to arrange retrieved characters in a pre determined format and derive the confidential information.
- the first computer enabled device further comprises a transmitter configured to transmit said secret key and said grid to said second computer enabled device.
- the secret key generator is configured to generate secret keys always having a length greater than the length of said confidential information.
- the secret key generator is configured to generate secret keys comprising alphabets, digits, special characters and any combinations thereof.
- the secret key generator is configured to generate secret keys having non-repetitive elements.
- the pairing module is configured to combine successive characters of said secret key with successive characters of said confidential information.
- the present disclosure envisages a computer implemented method for concealing confidential information by combining the confidential information with random text using a secret key.
- the method in accordance with the present disclosure the method includes the following computer implemented steps:
- the method further includes the step of populating remaining empty cells of the grid with random alphabets, digits, special characters and any combinations thereof.
- the step of generating at least one secret key further includes the step of generating secret keys always having a length greater than the length of said confidential information.
- the step of generating at least one secret key further includes the step of generating secret keys comprising alphabets, digits, special characters and any combinations thereof. In accordance with the present disclosure, the step of generating at least one secret key further includes the step of generating secret keys having non- repetitive elements.
- the step of combining each character of said confidential information with each character of said secret key further includes the step of combining successive characters of said secret key with successive characters of said confidential information.
- FIGURE 1 exemplifies some of the conventional password patterns utilized by software applications
- FIGURE 2 exemplifies the secret key generated by the key generator, in accordance with the present disclosure
- FIGURE 3 exemplifies the confidential information string to be concealed and protected from unauthorized access, in accordance with the present disclosure
- FIGURE 4 exemplifies the exemplifies the aspect of combining confidential information string with the secret key
- FIGURE 5 illustrates a schematic of a computer implemented system for concealing confidential information, in accordance with the present disclosure.
- FIGURE 6 and FIGURE 7 illustrate a flowchart corresponding to a computer implemented method for concealing confidential information, in accordance with the present disclosure.
- FIGURE 1 exemplifies some of password patterns that are utilized for accessing software applications.
- a password can contain letters, numbers and combinations thereof. Certain password patterns also include special characters.
- the computer implemented system lOOconcealing confidential information includes a secret key generator 10 (as shown in FIGURE 5) configured to generate a plurality of secret keys. Secret keys generated by the secret key generator 10 are utilizedconceal the confidential information (secret text) with in random text. One secret key can be utilized to protect a plurality of secret textual items/confidential information. The secret key generated by the secret key generator 10 is made known only to sender of the confidential information and the intended/purported recipient.
- the secret key generated by the secret key generator 10 is typically defined in terms of an 'N' length character string wherein 'N' denotes the length of the character string.
- the constraint attached with the secret key is that the length of the secret key .i.e., 'N' must always be greater than the length of the confidential information string. For example, if the length of the confidential information string is 'L' then length of 'N' must always be greater than the length 'L'.
- the secret key generated by the secret key generator 10 is made known only to the sender of the confidential information and intended/purported recipient(s).
- the secret key generated by the secret key generator 10 typically includes at least arbitrarily arranged alphabets.
- the length 'N' of the secret key must be greater than the length of the longest confidential information string.
- Si, S 2 , S3 S n are the strings corresponding to confidential information and if S 2 is the longest string, then the length of the secret key ' ⁇ '. should be greater than the length of S 2 .
- FIGURE 2 exemplifies a secret key generated by the secret key generator.
- the secret key generated by the secret key generator lOincludes alphabets, numbers, special characters and any combinations thereof.
- the secret key contains the alphabets 'A', 'C ⁇ ' ⁇ ', ' ⁇ ', ⁇ ', 'W ⁇ 'L', ⁇ ', 'D' in the order of appearance.
- the sequence of alphabets is terminated by the symbol '.$'.
- Another prerequisite for the secret key is that the characters contained in the secret key are non- repeatable.
- FIGURE 3 exemplifies confidential information string to be concealed and protected from unauthorized access.
- the confidential information string can include alphabets, numbers, special characters and any combinations thereof.
- the secret key contains the alphabets 'G', ⁇ ', ' ⁇ ', ' ⁇ ', ' , '2' in the order of appearance.
- the system 100 further includes a reader 20, having access to the confidential information to be protected against unauthorized access and the secret key.
- the reader 20 is configured to access and sequentially read the confidential information string as well as the secret key.
- the reader 20, at least temporarily, stores the information corresponding to the order in which the characters of the confidential information are arranged prior to pairing.
- the reader 20 cooperates with a pairing module 30 configured to combine each character in the confidential information string with the subsequent character in the secret key.
- the pairing module 30 generates a combined string having a combination of characters from the confidential information string and the secret key.
- each character in the confidential information string is combined with a character in the secret key, by a pairing module 30 (shown in FIGURE 5).
- the combined string generated by the pairing module 30 includes a plurality of cells, with each cell comprising a combination of a character of confidential information string and a character of secret key.
- the system 100 further includes a grid generator 40 cooperating with the pairing module 30.
- the grid generator is configured to generate a grid having a plurality of empty cells.
- the grid generator 40 replaces some of the empty cells of the grid with the cells of the combined string generated by the pairing module 30.
- FIGURE 4 exemplifies the aspect of combining confidential information string as shown in FIGURE 3, with the secret key shown in FIGURE 2.
- FIGURE4 shows a grid containing a combination of the confidential information string and the secret key.
- the combination of characters contained in confidential information string and characters contained in the secret key are aligned in the form of a grid as shown in FIGURE 4.
- the cells containing a combination of secret key text and text from the confidential information are denoted by darkened lines in FIGURE 4.
- the cell denoting thetermination of hidden text is shown with dotted lines.
- the first element of the secret key i.e., 'A' is combined with the first element of the confidential information string i.e., 'G'
- second element of the secret key i.e., 'C is combined with second element of the confidential information string i.e., ⁇ '.
- third element of the secret key i.e., 'K' is combined with third element of the confidential information string i.e., 'T'.
- the fourth element of the secret key i.e., 'N' is combined with fourth element of the confidential information string i.e., ⁇ '.
- the fifth element of the secret key i.e., ⁇ ' is combined with fifth element of the confidential information string i.e., ' 1 ' and the sixth element of the secret key i.e., 'W is combined with sixth element of the confidential information string i.e., '2'.
- the grid generator 40 further includes a random text generator 50 adapted to generate random text to be inserted into the grid generated by the grid generator 40.
- Certain cells of the grid generated by the grid generator 40 include a combination of the characters of the confidential information string and characters of the secret key. Remaining cells of the grid are populated with the random text generated by the random text generator 50.
- One cell of the grid contains the termination character and the remaining cells of the grid are populated with random text.
- the system 100 further includes a retriever 60 adapted to retrieve the confidential information from the grid generated by the grid generator 40.
- the retriever 60 receives from the secret key generator 20, the secret key utilized to conceal the confidential information string.
- the retriever 60s cans the grid generated by the grid generator 40 and identifies the cells of the grid containing characters of the secret key .
- the retriever 60 scans the grid for the presence of the characters of the secret key and for every character in the secret key, retrieves the adjacent character. Since every character in the secret key is paired with every character of the confidential information string, once all the characters corresponding to the secret key are derived, the characters corresponding to the confidential information string are also obtained.
- the system 100 further includes an arranging module 70 configured to arrange the characters corresponding to the retrieved confidential information string, in a pre determined order, thereby deriving the confidential information.
- the arranging module 70 receives from the reader 30, the information corresponding to the order in which the elements of the confidential information string were arranged prior to pairing.
- the arranging module subsequently arranges the retrieved characters in the same order and reproduces the confidential information string.
- the secret key generator 10, reader 20, pairing module 30 and grid generator 40 are comprised in a first computer enabled device 500A accessible to a sender of the confidential information.
- the first computer enabled device 500A stores the confidential information to be sent to recipient(s).
- the retriever 60 and arranging module 70 are comprised in a second computer enabled device 500B accessible to an intended recipient of the confidential information.
- the method in accordance with the present disclosure includes the following computer implemented steps:
- the method further includes the step of populating remaining empty cells of the grid with random alphabets, digits, special characters and any combinations thereof.
- the step of generating at least one secret key further includes the step of generating secret keys always having a length greater than the length of said confidential information.
- the step of generating at least one secret key further includes the step of generating secret keys comprising alphabets, digits, special characters and any combinations thereof.
- the step of generating at least one secret key further includes the step of generating secret keys having non- repetitive elements.
- the step of combining each character of said confidential information with each character of said secret key further includes the step of combining successive characters of said secret key with successive characters of said confidential information.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Document Processing Apparatus (AREA)
Description
Claims
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN2112CH2012 | 2012-05-28 | ||
| IN2112/CHE/2012 | 2012-05-28 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2013179304A2 true WO2013179304A2 (en) | 2013-12-05 |
| WO2013179304A3 WO2013179304A3 (en) | 2014-01-16 |
Family
ID=49673993
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IN2013/000318 Ceased WO2013179304A2 (en) | 2012-05-28 | 2013-05-16 | A computer implemented system and method for concealing confidential information |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2013179304A2 (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109995503A (en) * | 2019-03-11 | 2019-07-09 | 青岛大学 | A Key-based Electronic Grid Construction Method |
| US10419444B2 (en) | 2015-08-24 | 2019-09-17 | Cyberlink Corp. | Systems and methods for protecting messages utilizing a hidden restriction mechanism |
| CN114519192A (en) * | 2020-11-19 | 2022-05-20 | 武汉斗鱼鱼乐网络科技有限公司 | Method for hiding secret key in module relocation table |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1921791A1 (en) * | 2005-07-19 | 2008-05-14 | NEC Corporation | Key issuing method and group signature system |
| US20080077604A1 (en) * | 2006-09-25 | 2008-03-27 | General Electric Company | Methods of de identifying an object data |
| US20090003701A1 (en) * | 2007-06-30 | 2009-01-01 | Lucent Technologies, Inc. | Method and apparatus for applying steganography to digital image files |
| CN102169535A (en) * | 2011-04-11 | 2011-08-31 | 桂林电子科技大学 | Text steganographic method based on keyword replacement |
-
2013
- 2013-05-16 WO PCT/IN2013/000318 patent/WO2013179304A2/en not_active Ceased
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10419444B2 (en) | 2015-08-24 | 2019-09-17 | Cyberlink Corp. | Systems and methods for protecting messages utilizing a hidden restriction mechanism |
| CN109995503A (en) * | 2019-03-11 | 2019-07-09 | 青岛大学 | A Key-based Electronic Grid Construction Method |
| CN109995503B (en) * | 2019-03-11 | 2022-03-18 | 青岛大学 | Electronic grid construction method based on secret key |
| CN114519192A (en) * | 2020-11-19 | 2022-05-20 | 武汉斗鱼鱼乐网络科技有限公司 | Method for hiding secret key in module relocation table |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2013179304A3 (en) | 2014-01-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ahvanooey et al. | AITSteg: An innovative text steganography technique for hidden transmission of text message via social media | |
| US10157270B2 (en) | Methods, apparatus, and articles of manufacture to encode auxiliary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data | |
| Abdullah et al. | New approaches to encrypt and decrypt data in image using cryptography and steganography algorithm | |
| US20090325640A1 (en) | System and Method for Multimedia Storing and Retrieval Using Low-Cost Tags as Virtual Storage Mediums | |
| Raggo et al. | Data hiding: exposing concealed data in multimedia, operating systems, mobile devices and network protocols | |
| Almehmadi et al. | Novel arabic e-text watermarking supporting partial dishonesty based on counting-based secret sharing | |
| Arun et al. | Design of image steganography using LSB XOR substitution method | |
| Hassan et al. | Data hiding techniques in Windows OS: a practical approach to investigation and defense | |
| US20090046848A1 (en) | Encryption management system | |
| Bhattacharyya et al. | Receiver compatible data hiding in color image | |
| Kaushik et al. | Zero-width text steganography in cybercrime attacks | |
| JP2006520047A (en) | Method and system for enabling remote message creation | |
| Hamdan et al. | AH4S: an algorithm of text in text steganography using the structure of omega network | |
| US20140143554A1 (en) | Methods, Systems and Apparatus for Managing Data Entries on a Database | |
| WO2013179304A2 (en) | A computer implemented system and method for concealing confidential information | |
| Alabdali et al. | An overview of steganography through history | |
| El_Rahman | A comprehensive image steganography tool using LSB scheme | |
| Chaudhary et al. | An elucidation on steganography and cryptography | |
| Abdul-rahman et al. | Arabic text steganography: Literature survey | |
| Saraswat et al. | A review of digital image steganography | |
| Beyer | Women in computer science: Deterrents | |
| Shah | LSB steganography using bits complementation | |
| Barannik et al. | Modification of the RGB Color Space in MS Word Documents for Steganographic Information Protection. | |
| Jain | A Comparative Study of Various Security and Issues in Steganography Techniques | |
| Sharma et al. | Visual cryptography authentication for data matrix code |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 13797637 Country of ref document: EP Kind code of ref document: A2 |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 13/06/2016) |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13797637 Country of ref document: EP Kind code of ref document: A2 |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 13797637 Country of ref document: EP Kind code of ref document: A2 |