A COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR CONCEALING CONFIDENTIAL INFORMATION
FIELD OF DISCLOSURE
The present disclosure relates to the field of digital steganography. Particularly, the present disclosure relates to camouflaging secret text. More particularly the present disclosure relates to computer implemented system and method for camouflaging secret text by embedding secret text with random text using digital steganography technique.
BACKGROUND
Access to software applications are typically controlled by passwords which authenticate users before selectively enabling them to access the underlying software application. Passwords are typically secret texts, normally known to respective users of a software application. While, user name typically required to access a software application is considered to be general text, the corresponding password is treated as confidential and secret text. Secret texts, typically passwords, are utilized by software applications to authenticate and validate users. Passwords are generally made known to respective users and they are required to enter the password in order to access the corresponding software application.
Conceptually secret text such as a password cannot be viewed by users of software applications. Displaying passwords in the form of plain text is not a feasible option since it compromises the security associated with passwords. Steganography is the art and science of communicating in such a way that underlying message cannot be detected. Steganography techniques are utilized for concealing passwords but they are not suitable for viewing passwords since
steganography is typically utilized for concealing information in image files, audio files and the like.
Typically, steganography is utilized to communicate messages in such a way that they cannot be detected and accessed by unauthorized users. Digital steganography technique is also utilized to protect information from various types of security attacks. Digital steganography technique proposes utilizing invisible ink to hide certain portions of the information. Digital steganography technique also proposes manipulating bits underlying the information in order to protect the information from unauthorized access.
Conventional digital steganography techniques are typically utilized for concealing data in image files, audio files and video files. These conventional methods cannot be utilized for concealing text within text. Moreover, conventional digital steganography techniques are complex in nature. Therefore, there is felt a need for a system which overcomes the limitations associated with conventional steganographic techniques and:
• provided for concealment of secret text within random text;
• provided a method which works in collusion with graphical user interfaces of software applications unlike the conventional digital steganographic techniques; and
• provided for concealing information within graphical user interface elements of software applications.
OBJECTS
Some of the objects of the present disclosure, which at least one embodiment herein satisfies are as follows:
An object of the present disclosure is to provide a system that provides for concealing secret text within random text.
Yet another object of the present disclosure is to provide a system that works hand-in-hand with graphical user interface elements of software applications.
Still a further object of the present disclosure is to provide a system that displays text hidden within random text, on the graphical user interface of software applications.
Another object of the present disclosure is to provide a system that protects information against various security attacks.
Yet another object of the present disclosure is to provide a system that does not depend upon the characteristics associated with graphical user interfaces of software applications.
Another object of the present disclosure is to provide a system that makes use of a secret key to conceal secret text within random text.
One more object of the present disclosure is to provide a system that does not depend upon user interface characteristics such as color, position, size and the like for concealing secret text.
SUMMARY
The present disclosure envisages a computer implemented system for concealing confidential information by combining the confidential information with random text using a secret key. The system in accordance with the present disclosure includes:
■ a first computer enabled device accessible to a sender of said confidential information, said first computer enabled device comprising:
o a secret key generator configured to generate a plurality of secret keys;
o a reader having access to said confidential information and said secret key, said reader configured to sequentially read the characters contained in said confidential information and said secret key;
o a pairing module configured to combine each character of said confidential information with each character of said secret key and generate a combined string, said combined string having a plurality of cells wherein each cell comprises a character of said secret key paired with a character of said confidential information; and
o a grid generator configured to generate a grid having a plurality of empty cells, said grid generator configured to replace at least some of said empty cells with cells of said combined string, said grid generator comprising:
> a random text generator configured to populate the remaining empty cells of the grid with random text selected from the group consisting of- alphabets, digits and special characters.
a second computer enabled device accessible to a recipient of said confidential information, said second computer enabled device comprising:
o a retriever having access to said secret key, said retriever further configured to scan said grid and identify the cells containing characters of said secret key, said retriever still further configured to retrieve the characters adjacent to said characters of the secret key, from said cells, wherein said
characters adjacent to the characters of said secret key correspond to the confidential information; and
o an arranging module configured to arrange retrieved characters in a pre determined format and derive the confidential information.
In accordance with the present disclosure, the first computer enabled device further comprises a transmitter configured to transmit said secret key and said grid to said second computer enabled device.
In accordance with the present disclosure, the secret key generator is configured to generate secret keys always having a length greater than the length of said confidential information.
In accordance with the present disclosure, the secret key generator is configured to generate secret keys comprising alphabets, digits, special characters and any combinations thereof.
In accordance with the present disclosure, the secret key generator is configured to generate secret keys having non-repetitive elements.
In accordance with the present disclosure, the pairing module is configured to combine successive characters of said secret key with successive characters of said confidential information.
The present disclosure envisages a computer implemented method for concealing confidential information by combining the confidential information with random text using a secret key. The method in accordance with the present disclosure, the method includes the following computer implemented steps:
• accessing, at a first computer enabled device accessible to a sender, the confidential information to be protected against unauthorized access;
• generating at least one secret key;
• sequentially reading the characters contained in said confidential information and said secret key;
• combining each character of said confidential information with each character of said secret key and generating a combined string;
• generating a grid having empty cells and replacing at least some of said empty cells with cells of said combined string;
• transmitting said grid, said secret key to a second computer enabled device accessible to a recipient of said confidential information;
• . accessing at said second computer enabled device, said secret key and scanning said grid to identify the cells containing characters of said secret key;
• retrieving the characters adjacent to said characters of the secret key, from said cells, wherein said characters adjacent to the characters of said secret key correspond to the confidential information; and
• arranging retrieved characters in a pre determined format and deriving said confidential information.
In accordance with the present disclosure, the method further includes the step of populating remaining empty cells of the grid with random alphabets, digits, special characters and any combinations thereof.
In accordance with the present disclosure, the step of generating at least one secret key further includes the step of generating secret keys always having a length greater than the length of said confidential information.
In accordance with the present disclosure, the step of generating at least one secret key further includes the step of generating secret keys comprising alphabets, digits, special characters and any combinations thereof.
In accordance with the present disclosure, the step of generating at least one secret key further includes the step of generating secret keys having non- repetitive elements.
In accordance with the present disclosure, the step of combining each character of said confidential information with each character of said secret key further includes the step of combining successive characters of said secret key with successive characters of said confidential information.
BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWINGS
The computer implemented system and method for viewing secret text will now be described with reference to the non-limiting, accompanying drawings, in which:
FIGURE 1 exemplifies some of the conventional password patterns utilized by software applications;
FIGURE 2 exemplifies the secret key generated by the key generator, in accordance with the present disclosure;
FIGURE 3 exemplifies the confidential information string to be concealed and protected from unauthorized access, in accordance with the present disclosure;
FIGURE 4 exemplifies the exemplifies the aspect of combining confidential information string with the secret key;
FIGURE 5 illustrates a schematic of a computer implemented system for concealing confidential information, in accordance with the present disclosure; and
FIGURE 6 and FIGURE 7illustrate a flowchart corresponding to a computer implemented method for concealing confidential information, in accordance with the present disclosure.
DETAILED DESCRIPTION OF THE ACCOMPANYING DRAWINGS
The computer implemented system and method for concealing confidential information will now be described with reference to the accompanying drawings which do not restrict the scope and ambit of the disclosure. The description provided is purely by way of example and illustration.
FIGURE 1 exemplifies some of password patterns that are utilized for accessing software applications. A password can contain letters, numbers and combinations thereof. Certain password patterns also include special characters. The computer implemented system lOOconcealing confidential information includes a secret key generator 10 (as shown in FIGURE 5) configured to generate a plurality of secret keys. Secret keys generated by the secret key generator 10 are utilizedconceal the confidential information (secret text) with in random text. One secret key can be utilized to protect a plurality of secret textual items/confidential information. The secret key generated by the secret key generator 10 is made known only to sender of the confidential information and the intended/purported recipient.
In accordance with the present disclosure, the secret key generated by the secret key generator 10 is typically defined in terms of an 'N' length character string wherein 'N' denotes the length of the character string. The constraint attached with the secret key is that the length of the secret key .i.e., 'N' must always be greater than the length of the confidential information string. For example, if the length of the confidential information string is 'L' then length of 'N' must always be greater than the length 'L'.
In accordance with the present disclosure, the secret key generated by the secret key generator 10 is made known only to the sender of the confidential information and intended/purported recipient(s). The secret key generated by the secret key generator 10 typically includes at least arbitrarily arranged
alphabets. In the event that the same secret key is utilized to protect multiple confidential information strings, it is required that the length 'N' of the secret key must be greater than the length of the longest confidential information string.For example, if Si, S2, S3 Snare the strings corresponding to confidential information and if S2 is the longest string, then the length of the secret key 'Ν'. should be greater than the length of S2.
In accordance with the present disclosure, FIGURE 2 exemplifies a secret key generated by the secret key generator. The secret key generated by the secret key generator lOincludes alphabets, numbers, special characters and any combinations thereof. As seen in FIGURE 2, the secret key contains the alphabets 'A', 'C\ 'Κ', 'Ν', Ό', 'W\ 'L', Έ', 'D' in the order of appearance. The sequence of alphabets is terminated by the symbol '.$'. Another prerequisite for the secret key is that the characters contained in the secret key are non- repeatable.
In accordance with the present disclosure, FIGURE 3 exemplifies confidential information string to be concealed and protected from unauthorized access. The confidential information string can include alphabets, numbers, special characters and any combinations thereof. As seen in FIGURE 3, the secret key contains the alphabets 'G', Ά', 'Τ', 'Ε', ' , '2' in the order of appearance.
Referring to FIGURE 5, the system 100 further includes a reader 20, having access to the confidential information to be protected against unauthorized access and the secret key. The reader 20 is configured to access and sequentially read the confidential information string as well as the secret key. The reader 20, at least temporarily, stores the information corresponding to the order in which the characters of the confidential information are arranged prior to pairing.
The reader 20 cooperates with a pairing module 30 configured to combine each character in the confidential information string with the subsequent character in
the secret key. The pairing module 30 generates a combined string having a combination of characters from the confidential information string and the secret key. In accordance with the present disclosure each character in the confidential information string is combined with a character in the secret key, by a pairing module 30 (shown in FIGURE 5). The combined string generated by the pairing module 30includes a plurality of cells, with each cell comprising a combination of a character of confidential information string and a character of secret key. For example, in the combined string generated by the pairing module 30, the first letter of the confidential information string is always combined with the first letter of the secret key, the subsequent letters of the confidential information string are combined with the subsequent letters of the secret key.The system 100 further includes a grid generator 40 cooperating with the pairing module 30.The grid generator is configured to generate a grid having a plurality of empty cells. The grid generator 40 replaces some of the empty cells of the grid with the cells of the combined string generated by the pairing module 30. FIGURE 4 exemplifies the aspect of combining confidential information string as shown in FIGURE 3, with the secret key shown in FIGURE 2. FIGURE4 shows a grid containing a combination of the confidential information string and the secret key. The combination of characters contained in confidential information string and characters contained in the secret key are aligned in the form of a grid as shown in FIGURE 4. The cells containing a combination of secret key text and text from the confidential information are denoted by darkened lines in FIGURE 4. The cell denoting thetermination of hidden text is shown with dotted lines. For example, as shown in FIGURE 4, the first element of the secret key i.e., 'A' is combined with the first element of the confidential information string i.e., 'G'
Further, second element of the secret key i.e., 'C is combined with second element of the confidential information string i.e., Ά'. Subsequently, third
element of the secret key i.e., 'K' is combined with third element of the confidential information string i.e., 'T'. The fourth element of the secret key i.e., 'N' is combined with fourth element of the confidential information string i.e., Έ'. The fifth element of the secret key i.e., Ό' is combined with fifth element of the confidential information string i.e., ' 1 ' and the sixth element of the secret key i.e., 'W is combined with sixth element of the confidential information string i.e., '2'.
Referring to FIGURE 5, the grid generator 40further includes a random text generator 50 adapted to generate random text to be inserted into the grid generated by the grid generator 40. Certain cells of the grid generated by the grid generator 40 include a combination of the characters of the confidential information string and characters of the secret key. Remaining cells of the grid are populated with the random text generated by the random text generator 50. One cell of the grid contains the termination character and the remaining cells of the grid are populated with random text.
In accordance with the present disclosure, the system 100 further includes a retriever 60 adapted to retrieve the confidential information from the grid generated by the grid generator 40. The retriever 60receives from the secret key generator 20, the secret key utilized to conceal the confidential information string. The retriever 60scans the grid generated by the grid generator 40 and identifies the cells of the grid containing characters of the secret key .The retriever 60 scans the grid for the presence of the characters of the secret key and for every character in the secret key, retrieves the adjacent character. Since every character in the secret key is paired with every character of the confidential information string, once all the characters corresponding to the secret key are derived, the characters corresponding to the confidential information string are also obtained.
In accordance with the present disclosure, the system 100 further includes an arranging module 70 configured to arrange the characters corresponding to the retrieved confidential information string, in a pre determined order, thereby deriving the confidential information. The arranging module 70 receives from the reader 30, the information corresponding to the order in which the elements of the confidential information string were arranged prior to pairing. The arranging module subsequently arranges the retrieved characters in the same order and reproduces the confidential information string.
In accordance with the present disclosure, the secret key generator 10, reader 20, pairing module 30 and grid generator 40 are comprised in a first computer enabled device 500A accessible to a sender of the confidential information. The first computer enabled device 500A stores the confidential information to be sent to recipient(s). Subsequently, the retriever 60 and arranging module 70 are comprised in a second computer enabled device 500B accessible to an intended recipient of the confidential information. The grid generated by the grid generator 40and the secret key generated by the secret key generator lOare transmitted from the first computer enabled device 500 A to second computer enabled device 500B through a transmitter denoted by the reference numeral 80.
Referring to FIGURE 6and FIGURE 7there is shown a flowchart corresponding to the computer implemented method for concealing confidential information by combining the confidential information with random text using a secret key. The method in accordance with the present disclosure includes the following computer implemented steps:
• accessing, at a first computer enabled device accessible to a sender, the confidential information to be protected against unauthorized access 200;
• generating at least one secret key 202;
• sequentially reading the characters contained in said confidential information and said secret key 204;
• combining each character of said confidential information with each character of said secret key and generating a combined string 206;
• generating a grid having empty cells and replacing at least some of said empty cells with cells of said combined string 208;
- · transmitting said grid, said secret key to a second computer enabled device accessible to a recipient of said confidential information 210;
• accessing at a second computer enabled device, said secret key and scanning said grid to identify the cells containing characters of said secret key 212;
• retrieving the characters adjacent to said characters of the secret key, from said cells, wherein said characters adjacent to the characters of said secret key correspond to the confidential information 214; and
• arranging retrieved characters in a pre determined format and deriving said confidential information 216.
In accordance with the present disclosure, the method further includes the step of populating remaining empty cells of the grid with random alphabets, digits, special characters and any combinations thereof.
In accordance with the present disclosure, the step of generating at least one secret key further includes the step of generating secret keys always having a length greater than the length of said confidential information.
In accordance with the present disclosure, the step of generating at least one secret key further includes the step of generating secret keys comprising alphabets, digits, special characters and any combinations thereof.
In accordance with the present disclosure, the step of generating at least one secret key further includes the step of generating secret keys having non- repetitive elements.
In accordance with the present disclosure, the step of combining each character of said confidential information with each character of said secret key further includes the step of combining successive characters of said secret key with successive characters of said confidential information.
TECHNICAL ADVANTAGES
The technical advantages of the computer implemented system for viewing secret text include the following:
• providing a system for concealing secret text within random text;
• providing a system that works hand-in-hand with graphical user interface elements of software applications;
• providing a system that displays text hidden within random text, on the graphical user interface of software applications;
• providing a system that protects information against various security attacks; and
• providing a system that does not depend upon the characteristics associated with graphical user interfaces of software applications; and
• providing a system that does not depend upon user interface characteristics such as color, position, size and the like for concealing secret text.
While considerable emphasis has been placed herein on the particular features of this invention, it will be appreciated that various modifications can be made, and that many changes can be made in the preferred embodiment without departing from the principles of the invention. These and other modifications in the nature of the invention or the preferred embodiments will be apparent to those skilled in the art from the disclosure herein, whereby it is to be distinctly understood that the foregoing descriptive matter is to be interpreted merely as illustrative of the invention and not as a limitation.