Loading...

A new solution for password key transferring in steganography methods by CAPTCHA through MMS technology

Shirali Shahreza, M ; Sharif University of Technology | 2007

1 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ICIET.2007.4381325
  3. Publisher: 2007
  4. Abstract:
  5. The Multimedia Messaging System (MMS) allows a user of a mobile phone to send messages containing multimedia objects, such as images, audio or video clips. On the other hand establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Therefore steganography in MMS is an interesting idea. One of the problems in steganography methods is the security of transferring password key used for steganography between sender and receiver of secure data. In this paper a new method is proposed for solving this problem using CAPTCHA method through MMS messages. In this method the password key is spoken in an audio file and the data are hidden in the image by this password key. Then the image and audio files are inserted in a MMS message and sent to the receiver. Therefore the human receiver can recognize the password from the audio file and extract the data from the image using this password, but the computer cannot recognize the spoken word from the audio file and extracting the password. By this method the user does not need to memorize any password for extracting the data. This method has been implemented in J2ME programming language
  6. Keywords:
  7. Computer networks ; Computer programming languages ; Cryptography ; Multimedia systems ; Problem oriented languages ; Semiconductor quantum dots ; Telecommunication equipment ; Telephone systems ; Completely automated public turing test to tell computers and human apart (CAPTCHA) ; Image steganography ; Information hiding ; Multimedia messaging service (MMS) ; Password distribution ; Speech recognition ; Security of data
  8. Source: 2007 International Conference on Information and Emerging Technologies, ICIET, Karachi, 6 July 2007 through 7 July 2007 ; 2007 , Pages 136-141 ; 1424412463 (ISBN); 9781424412464 (ISBN)
  9. URL: https://ieeexplore.ieee.org/document/4381325