Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Steganalysis of Chat based Steganography

Version 1 : Received: 16 February 2023 / Approved: 17 February 2023 / Online: 17 February 2023 (06:32:37 CET)

A peer-reviewed article of this Preprint also exists.

OKELLO, M.O. Steganalysis of Chat Based Steganography. International Journal of Informatics and Applied Mathematics 2023, doi:10.53508/ijiam.1243912. OKELLO, M.O. Steganalysis of Chat Based Steganography. International Journal of Informatics and Applied Mathematics 2023, doi:10.53508/ijiam.1243912.

Abstract

Steganalysis is the practice of identifying potential secret communication and taking appropriate action, such as deciphering to uncover the hidden contents or destroying the object containing the hidden information if it cannot be uncovered. At times, it’s very necessary to perform Steganalysis due to the fact that steganography is often misused by those with bad intentions, making it a platform for criminal communication. This paper presents a methodology for the detection of timing steganography. The method is based on user behavior during chat, such as the time taken to read, edit, and send text, etc. The method was tested using simulation-based chat software, and it can detect intended timing samples correctly. However, this method is not a very robust one due to some reasons. For instance, it only works well with text-based chat applications, and there are many factors that affect the typing and reading speed of an individual as well as their behavior during chat. These often make the method susceptible to fault detection as it is not easy to set an accurate mean value and deviation to accommodate different typists' normal behavior, which appears as an intended timing.

Keywords

Steganalysis; Steganography; Timing; Chat

Subject

Computer Science and Mathematics, Computer Vision and Graphics

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.