+

WO2013179304A2 - A computer implemented system and method for concealing confidential information - Google Patents

A computer implemented system and method for concealing confidential information Download PDF

Info

Publication number
WO2013179304A2
WO2013179304A2 PCT/IN2013/000318 IN2013000318W WO2013179304A2 WO 2013179304 A2 WO2013179304 A2 WO 2013179304A2 IN 2013000318 W IN2013000318 W IN 2013000318W WO 2013179304 A2 WO2013179304 A2 WO 2013179304A2
Authority
WO
WIPO (PCT)
Prior art keywords
secret key
confidential information
characters
grid
secret
Prior art date
Application number
PCT/IN2013/000318
Other languages
French (fr)
Other versions
WO2013179304A3 (en
Inventor
Sri Venkat Bhaskar Krishna Mangipudi
Original Assignee
Sri Venkat Bhaskar Krishna Mangipudi
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sri Venkat Bhaskar Krishna Mangipudi filed Critical Sri Venkat Bhaskar Krishna Mangipudi
Publication of WO2013179304A2 publication Critical patent/WO2013179304A2/en
Publication of WO2013179304A3 publication Critical patent/WO2013179304A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Definitions

  • the present disclosure relates to the field of digital steganography.
  • the present disclosure relates to camouflaging secret text.
  • the present disclosure relates to computer implemented system and method for camouflaging secret text by embedding secret text with random text using digital steganography technique.
  • Passwords are typically secret texts, normally known to respective users of a software application. While, user name typically required to access a software application is considered to be general text, the corresponding password is treated as confidential and secret text.
  • Secret texts typically passwords, are utilized by software applications to authenticate and validate users. Passwords are generally made known to respective users and they are required to enter the password in order to access the corresponding software application.
  • steganography is utilized to communicate messages in such a way that they cannot be detected and accessed by unauthorized users.
  • Digital steganography technique is also utilized to protect information from various types of security attacks.
  • Digital steganography technique proposes utilizing invisible ink to hide certain portions of the information.
  • Digital steganography technique also proposes manipulating bits underlying the information in order to protect the information from unauthorized access.
  • An object of the present disclosure is to provide a system that provides for concealing secret text within random text.
  • Yet another object of the present disclosure is to provide a system that works hand-in-hand with graphical user interface elements of software applications.
  • Still a further object of the present disclosure is to provide a system that displays text hidden within random text, on the graphical user interface of software applications.
  • Another object of the present disclosure is to provide a system that protects information against various security attacks.
  • Yet another object of the present disclosure is to provide a system that does not depend upon the characteristics associated with graphical user interfaces of software applications.
  • Another object of the present disclosure is to provide a system that makes use of a secret key to conceal secret text within random text.
  • One more object of the present disclosure is to provide a system that does not depend upon user interface characteristics such as color, position, size and the like for concealing secret text.
  • the present disclosure envisages a computer implemented system for concealing confidential information by combining the confidential information with random text using a secret key.
  • the system in accordance with the present disclosure includes:
  • a first computer enabled device accessible to a sender of said confidential information, said first computer enabled device comprising: o a secret key generator configured to generate a plurality of secret keys;
  • a reader having access to said confidential information and said secret key, said reader configured to sequentially read the characters contained in said confidential information and said secret key;
  • a pairing module configured to combine each character of said confidential information with each character of said secret key and generate a combined string, said combined string having a plurality of cells wherein each cell comprises a character of said secret key paired with a character of said confidential information;
  • a grid generator configured to generate a grid having a plurality of empty cells, said grid generator configured to replace at least some of said empty cells with cells of said combined string, said grid generator comprising:
  • a random text generator configured to populate the remaining empty cells of the grid with random text selected from the group consisting of- alphabets, digits and special characters.
  • a second computer enabled device accessible to a recipient of said confidential information comprising:
  • retriever having access to said secret key, said retriever further configured to scan said grid and identify the cells containing characters of said secret key, said retriever still further configured to retrieve the characters adjacent to said characters of the secret key, from said cells, wherein said characters adjacent to the characters of said secret key correspond to the confidential information;
  • an arranging module configured to arrange retrieved characters in a pre determined format and derive the confidential information.
  • the first computer enabled device further comprises a transmitter configured to transmit said secret key and said grid to said second computer enabled device.
  • the secret key generator is configured to generate secret keys always having a length greater than the length of said confidential information.
  • the secret key generator is configured to generate secret keys comprising alphabets, digits, special characters and any combinations thereof.
  • the secret key generator is configured to generate secret keys having non-repetitive elements.
  • the pairing module is configured to combine successive characters of said secret key with successive characters of said confidential information.
  • the present disclosure envisages a computer implemented method for concealing confidential information by combining the confidential information with random text using a secret key.
  • the method in accordance with the present disclosure the method includes the following computer implemented steps:
  • the method further includes the step of populating remaining empty cells of the grid with random alphabets, digits, special characters and any combinations thereof.
  • the step of generating at least one secret key further includes the step of generating secret keys always having a length greater than the length of said confidential information.
  • the step of generating at least one secret key further includes the step of generating secret keys comprising alphabets, digits, special characters and any combinations thereof. In accordance with the present disclosure, the step of generating at least one secret key further includes the step of generating secret keys having non- repetitive elements.
  • the step of combining each character of said confidential information with each character of said secret key further includes the step of combining successive characters of said secret key with successive characters of said confidential information.
  • FIGURE 1 exemplifies some of the conventional password patterns utilized by software applications
  • FIGURE 2 exemplifies the secret key generated by the key generator, in accordance with the present disclosure
  • FIGURE 3 exemplifies the confidential information string to be concealed and protected from unauthorized access, in accordance with the present disclosure
  • FIGURE 4 exemplifies the exemplifies the aspect of combining confidential information string with the secret key
  • FIGURE 5 illustrates a schematic of a computer implemented system for concealing confidential information, in accordance with the present disclosure.
  • FIGURE 6 and FIGURE 7 illustrate a flowchart corresponding to a computer implemented method for concealing confidential information, in accordance with the present disclosure.
  • FIGURE 1 exemplifies some of password patterns that are utilized for accessing software applications.
  • a password can contain letters, numbers and combinations thereof. Certain password patterns also include special characters.
  • the computer implemented system lOOconcealing confidential information includes a secret key generator 10 (as shown in FIGURE 5) configured to generate a plurality of secret keys. Secret keys generated by the secret key generator 10 are utilizedconceal the confidential information (secret text) with in random text. One secret key can be utilized to protect a plurality of secret textual items/confidential information. The secret key generated by the secret key generator 10 is made known only to sender of the confidential information and the intended/purported recipient.
  • the secret key generated by the secret key generator 10 is typically defined in terms of an 'N' length character string wherein 'N' denotes the length of the character string.
  • the constraint attached with the secret key is that the length of the secret key .i.e., 'N' must always be greater than the length of the confidential information string. For example, if the length of the confidential information string is 'L' then length of 'N' must always be greater than the length 'L'.
  • the secret key generated by the secret key generator 10 is made known only to the sender of the confidential information and intended/purported recipient(s).
  • the secret key generated by the secret key generator 10 typically includes at least arbitrarily arranged alphabets.
  • the length 'N' of the secret key must be greater than the length of the longest confidential information string.
  • Si, S 2 , S3 S n are the strings corresponding to confidential information and if S 2 is the longest string, then the length of the secret key ' ⁇ '. should be greater than the length of S 2 .
  • FIGURE 2 exemplifies a secret key generated by the secret key generator.
  • the secret key generated by the secret key generator lOincludes alphabets, numbers, special characters and any combinations thereof.
  • the secret key contains the alphabets 'A', 'C ⁇ ' ⁇ ', ' ⁇ ', ⁇ ', 'W ⁇ 'L', ⁇ ', 'D' in the order of appearance.
  • the sequence of alphabets is terminated by the symbol '.$'.
  • Another prerequisite for the secret key is that the characters contained in the secret key are non- repeatable.
  • FIGURE 3 exemplifies confidential information string to be concealed and protected from unauthorized access.
  • the confidential information string can include alphabets, numbers, special characters and any combinations thereof.
  • the secret key contains the alphabets 'G', ⁇ ', ' ⁇ ', ' ⁇ ', ' , '2' in the order of appearance.
  • the system 100 further includes a reader 20, having access to the confidential information to be protected against unauthorized access and the secret key.
  • the reader 20 is configured to access and sequentially read the confidential information string as well as the secret key.
  • the reader 20, at least temporarily, stores the information corresponding to the order in which the characters of the confidential information are arranged prior to pairing.
  • the reader 20 cooperates with a pairing module 30 configured to combine each character in the confidential information string with the subsequent character in the secret key.
  • the pairing module 30 generates a combined string having a combination of characters from the confidential information string and the secret key.
  • each character in the confidential information string is combined with a character in the secret key, by a pairing module 30 (shown in FIGURE 5).
  • the combined string generated by the pairing module 30 includes a plurality of cells, with each cell comprising a combination of a character of confidential information string and a character of secret key.
  • the system 100 further includes a grid generator 40 cooperating with the pairing module 30.
  • the grid generator is configured to generate a grid having a plurality of empty cells.
  • the grid generator 40 replaces some of the empty cells of the grid with the cells of the combined string generated by the pairing module 30.
  • FIGURE 4 exemplifies the aspect of combining confidential information string as shown in FIGURE 3, with the secret key shown in FIGURE 2.
  • FIGURE4 shows a grid containing a combination of the confidential information string and the secret key.
  • the combination of characters contained in confidential information string and characters contained in the secret key are aligned in the form of a grid as shown in FIGURE 4.
  • the cells containing a combination of secret key text and text from the confidential information are denoted by darkened lines in FIGURE 4.
  • the cell denoting thetermination of hidden text is shown with dotted lines.
  • the first element of the secret key i.e., 'A' is combined with the first element of the confidential information string i.e., 'G'
  • second element of the secret key i.e., 'C is combined with second element of the confidential information string i.e., ⁇ '.
  • third element of the secret key i.e., 'K' is combined with third element of the confidential information string i.e., 'T'.
  • the fourth element of the secret key i.e., 'N' is combined with fourth element of the confidential information string i.e., ⁇ '.
  • the fifth element of the secret key i.e., ⁇ ' is combined with fifth element of the confidential information string i.e., ' 1 ' and the sixth element of the secret key i.e., 'W is combined with sixth element of the confidential information string i.e., '2'.
  • the grid generator 40 further includes a random text generator 50 adapted to generate random text to be inserted into the grid generated by the grid generator 40.
  • Certain cells of the grid generated by the grid generator 40 include a combination of the characters of the confidential information string and characters of the secret key. Remaining cells of the grid are populated with the random text generated by the random text generator 50.
  • One cell of the grid contains the termination character and the remaining cells of the grid are populated with random text.
  • the system 100 further includes a retriever 60 adapted to retrieve the confidential information from the grid generated by the grid generator 40.
  • the retriever 60 receives from the secret key generator 20, the secret key utilized to conceal the confidential information string.
  • the retriever 60s cans the grid generated by the grid generator 40 and identifies the cells of the grid containing characters of the secret key .
  • the retriever 60 scans the grid for the presence of the characters of the secret key and for every character in the secret key, retrieves the adjacent character. Since every character in the secret key is paired with every character of the confidential information string, once all the characters corresponding to the secret key are derived, the characters corresponding to the confidential information string are also obtained.
  • the system 100 further includes an arranging module 70 configured to arrange the characters corresponding to the retrieved confidential information string, in a pre determined order, thereby deriving the confidential information.
  • the arranging module 70 receives from the reader 30, the information corresponding to the order in which the elements of the confidential information string were arranged prior to pairing.
  • the arranging module subsequently arranges the retrieved characters in the same order and reproduces the confidential information string.
  • the secret key generator 10, reader 20, pairing module 30 and grid generator 40 are comprised in a first computer enabled device 500A accessible to a sender of the confidential information.
  • the first computer enabled device 500A stores the confidential information to be sent to recipient(s).
  • the retriever 60 and arranging module 70 are comprised in a second computer enabled device 500B accessible to an intended recipient of the confidential information.
  • the method in accordance with the present disclosure includes the following computer implemented steps:
  • the method further includes the step of populating remaining empty cells of the grid with random alphabets, digits, special characters and any combinations thereof.
  • the step of generating at least one secret key further includes the step of generating secret keys always having a length greater than the length of said confidential information.
  • the step of generating at least one secret key further includes the step of generating secret keys comprising alphabets, digits, special characters and any combinations thereof.
  • the step of generating at least one secret key further includes the step of generating secret keys having non- repetitive elements.
  • the step of combining each character of said confidential information with each character of said secret key further includes the step of combining successive characters of said secret key with successive characters of said confidential information.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)

Abstract

A computer implemented system and method for concealing confidential information by combining the confidential information with random text using a secret key have been disclosed. The system includes a secret key generator located at sender's end and configured to generate a plurality of secret keys. A pairing module combines each character of confidential information with each character of secret key and generates a combined string. Each. cell of combined string comprises a character of secret key paired with a character of confidential information. These cells are arranged in a grid format along with other cells containing certain random characters. The grid is scanned at the receiver's end by a retriever which identifies the cells of the grid containing characters of the secret key. The retriever retrieved the characters adjacent to the characters of the secret key, thereby retrieving the confidential information concealed within the grid.

Description

A COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR CONCEALING CONFIDENTIAL INFORMATION
FIELD OF DISCLOSURE
The present disclosure relates to the field of digital steganography. Particularly, the present disclosure relates to camouflaging secret text. More particularly the present disclosure relates to computer implemented system and method for camouflaging secret text by embedding secret text with random text using digital steganography technique.
BACKGROUND
Access to software applications are typically controlled by passwords which authenticate users before selectively enabling them to access the underlying software application. Passwords are typically secret texts, normally known to respective users of a software application. While, user name typically required to access a software application is considered to be general text, the corresponding password is treated as confidential and secret text. Secret texts, typically passwords, are utilized by software applications to authenticate and validate users. Passwords are generally made known to respective users and they are required to enter the password in order to access the corresponding software application.
Conceptually secret text such as a password cannot be viewed by users of software applications. Displaying passwords in the form of plain text is not a feasible option since it compromises the security associated with passwords. Steganography is the art and science of communicating in such a way that underlying message cannot be detected. Steganography techniques are utilized for concealing passwords but they are not suitable for viewing passwords since steganography is typically utilized for concealing information in image files, audio files and the like.
Typically, steganography is utilized to communicate messages in such a way that they cannot be detected and accessed by unauthorized users. Digital steganography technique is also utilized to protect information from various types of security attacks. Digital steganography technique proposes utilizing invisible ink to hide certain portions of the information. Digital steganography technique also proposes manipulating bits underlying the information in order to protect the information from unauthorized access.
Conventional digital steganography techniques are typically utilized for concealing data in image files, audio files and video files. These conventional methods cannot be utilized for concealing text within text. Moreover, conventional digital steganography techniques are complex in nature. Therefore, there is felt a need for a system which overcomes the limitations associated with conventional steganographic techniques and:
• provided for concealment of secret text within random text;
• provided a method which works in collusion with graphical user interfaces of software applications unlike the conventional digital steganographic techniques; and
• provided for concealing information within graphical user interface elements of software applications.
OBJECTS
Some of the objects of the present disclosure, which at least one embodiment herein satisfies are as follows: An object of the present disclosure is to provide a system that provides for concealing secret text within random text.
Yet another object of the present disclosure is to provide a system that works hand-in-hand with graphical user interface elements of software applications.
Still a further object of the present disclosure is to provide a system that displays text hidden within random text, on the graphical user interface of software applications.
Another object of the present disclosure is to provide a system that protects information against various security attacks.
Yet another object of the present disclosure is to provide a system that does not depend upon the characteristics associated with graphical user interfaces of software applications.
Another object of the present disclosure is to provide a system that makes use of a secret key to conceal secret text within random text.
One more object of the present disclosure is to provide a system that does not depend upon user interface characteristics such as color, position, size and the like for concealing secret text.
SUMMARY
The present disclosure envisages a computer implemented system for concealing confidential information by combining the confidential information with random text using a secret key. The system in accordance with the present disclosure includes:
a first computer enabled device accessible to a sender of said confidential information, said first computer enabled device comprising: o a secret key generator configured to generate a plurality of secret keys;
o a reader having access to said confidential information and said secret key, said reader configured to sequentially read the characters contained in said confidential information and said secret key;
o a pairing module configured to combine each character of said confidential information with each character of said secret key and generate a combined string, said combined string having a plurality of cells wherein each cell comprises a character of said secret key paired with a character of said confidential information; and
o a grid generator configured to generate a grid having a plurality of empty cells, said grid generator configured to replace at least some of said empty cells with cells of said combined string, said grid generator comprising:
> a random text generator configured to populate the remaining empty cells of the grid with random text selected from the group consisting of- alphabets, digits and special characters.
a second computer enabled device accessible to a recipient of said confidential information, said second computer enabled device comprising:
o a retriever having access to said secret key, said retriever further configured to scan said grid and identify the cells containing characters of said secret key, said retriever still further configured to retrieve the characters adjacent to said characters of the secret key, from said cells, wherein said characters adjacent to the characters of said secret key correspond to the confidential information; and
o an arranging module configured to arrange retrieved characters in a pre determined format and derive the confidential information.
In accordance with the present disclosure, the first computer enabled device further comprises a transmitter configured to transmit said secret key and said grid to said second computer enabled device.
In accordance with the present disclosure, the secret key generator is configured to generate secret keys always having a length greater than the length of said confidential information.
In accordance with the present disclosure, the secret key generator is configured to generate secret keys comprising alphabets, digits, special characters and any combinations thereof.
In accordance with the present disclosure, the secret key generator is configured to generate secret keys having non-repetitive elements.
In accordance with the present disclosure, the pairing module is configured to combine successive characters of said secret key with successive characters of said confidential information.
The present disclosure envisages a computer implemented method for concealing confidential information by combining the confidential information with random text using a secret key. The method in accordance with the present disclosure, the method includes the following computer implemented steps:
• accessing, at a first computer enabled device accessible to a sender, the confidential information to be protected against unauthorized access; • generating at least one secret key;
• sequentially reading the characters contained in said confidential information and said secret key;
• combining each character of said confidential information with each character of said secret key and generating a combined string;
• generating a grid having empty cells and replacing at least some of said empty cells with cells of said combined string;
• transmitting said grid, said secret key to a second computer enabled device accessible to a recipient of said confidential information;
• . accessing at said second computer enabled device, said secret key and scanning said grid to identify the cells containing characters of said secret key;
• retrieving the characters adjacent to said characters of the secret key, from said cells, wherein said characters adjacent to the characters of said secret key correspond to the confidential information; and
• arranging retrieved characters in a pre determined format and deriving said confidential information.
In accordance with the present disclosure, the method further includes the step of populating remaining empty cells of the grid with random alphabets, digits, special characters and any combinations thereof.
In accordance with the present disclosure, the step of generating at least one secret key further includes the step of generating secret keys always having a length greater than the length of said confidential information.
In accordance with the present disclosure, the step of generating at least one secret key further includes the step of generating secret keys comprising alphabets, digits, special characters and any combinations thereof. In accordance with the present disclosure, the step of generating at least one secret key further includes the step of generating secret keys having non- repetitive elements.
In accordance with the present disclosure, the step of combining each character of said confidential information with each character of said secret key further includes the step of combining successive characters of said secret key with successive characters of said confidential information.
BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWINGS
The computer implemented system and method for viewing secret text will now be described with reference to the non-limiting, accompanying drawings, in which:
FIGURE 1 exemplifies some of the conventional password patterns utilized by software applications;
FIGURE 2 exemplifies the secret key generated by the key generator, in accordance with the present disclosure;
FIGURE 3 exemplifies the confidential information string to be concealed and protected from unauthorized access, in accordance with the present disclosure;
FIGURE 4 exemplifies the exemplifies the aspect of combining confidential information string with the secret key;
FIGURE 5 illustrates a schematic of a computer implemented system for concealing confidential information, in accordance with the present disclosure; and
FIGURE 6 and FIGURE 7illustrate a flowchart corresponding to a computer implemented method for concealing confidential information, in accordance with the present disclosure. DETAILED DESCRIPTION OF THE ACCOMPANYING DRAWINGS
The computer implemented system and method for concealing confidential information will now be described with reference to the accompanying drawings which do not restrict the scope and ambit of the disclosure. The description provided is purely by way of example and illustration.
FIGURE 1 exemplifies some of password patterns that are utilized for accessing software applications. A password can contain letters, numbers and combinations thereof. Certain password patterns also include special characters. The computer implemented system lOOconcealing confidential information includes a secret key generator 10 (as shown in FIGURE 5) configured to generate a plurality of secret keys. Secret keys generated by the secret key generator 10 are utilizedconceal the confidential information (secret text) with in random text. One secret key can be utilized to protect a plurality of secret textual items/confidential information. The secret key generated by the secret key generator 10 is made known only to sender of the confidential information and the intended/purported recipient.
In accordance with the present disclosure, the secret key generated by the secret key generator 10 is typically defined in terms of an 'N' length character string wherein 'N' denotes the length of the character string. The constraint attached with the secret key is that the length of the secret key .i.e., 'N' must always be greater than the length of the confidential information string. For example, if the length of the confidential information string is 'L' then length of 'N' must always be greater than the length 'L'.
In accordance with the present disclosure, the secret key generated by the secret key generator 10 is made known only to the sender of the confidential information and intended/purported recipient(s). The secret key generated by the secret key generator 10 typically includes at least arbitrarily arranged alphabets. In the event that the same secret key is utilized to protect multiple confidential information strings, it is required that the length 'N' of the secret key must be greater than the length of the longest confidential information string.For example, if Si, S2, S3 Snare the strings corresponding to confidential information and if S2 is the longest string, then the length of the secret key 'Ν'. should be greater than the length of S2.
In accordance with the present disclosure, FIGURE 2 exemplifies a secret key generated by the secret key generator. The secret key generated by the secret key generator lOincludes alphabets, numbers, special characters and any combinations thereof. As seen in FIGURE 2, the secret key contains the alphabets 'A', 'C\ 'Κ', 'Ν', Ό', 'W\ 'L', Έ', 'D' in the order of appearance. The sequence of alphabets is terminated by the symbol '.$'. Another prerequisite for the secret key is that the characters contained in the secret key are non- repeatable.
In accordance with the present disclosure, FIGURE 3 exemplifies confidential information string to be concealed and protected from unauthorized access. The confidential information string can include alphabets, numbers, special characters and any combinations thereof. As seen in FIGURE 3, the secret key contains the alphabets 'G', Ά', 'Τ', 'Ε', ' , '2' in the order of appearance.
Referring to FIGURE 5, the system 100 further includes a reader 20, having access to the confidential information to be protected against unauthorized access and the secret key. The reader 20 is configured to access and sequentially read the confidential information string as well as the secret key. The reader 20, at least temporarily, stores the information corresponding to the order in which the characters of the confidential information are arranged prior to pairing.
The reader 20 cooperates with a pairing module 30 configured to combine each character in the confidential information string with the subsequent character in the secret key. The pairing module 30 generates a combined string having a combination of characters from the confidential information string and the secret key. In accordance with the present disclosure each character in the confidential information string is combined with a character in the secret key, by a pairing module 30 (shown in FIGURE 5). The combined string generated by the pairing module 30includes a plurality of cells, with each cell comprising a combination of a character of confidential information string and a character of secret key. For example, in the combined string generated by the pairing module 30, the first letter of the confidential information string is always combined with the first letter of the secret key, the subsequent letters of the confidential information string are combined with the subsequent letters of the secret key.The system 100 further includes a grid generator 40 cooperating with the pairing module 30.The grid generator is configured to generate a grid having a plurality of empty cells. The grid generator 40 replaces some of the empty cells of the grid with the cells of the combined string generated by the pairing module 30. FIGURE 4 exemplifies the aspect of combining confidential information string as shown in FIGURE 3, with the secret key shown in FIGURE 2. FIGURE4 shows a grid containing a combination of the confidential information string and the secret key. The combination of characters contained in confidential information string and characters contained in the secret key are aligned in the form of a grid as shown in FIGURE 4. The cells containing a combination of secret key text and text from the confidential information are denoted by darkened lines in FIGURE 4. The cell denoting thetermination of hidden text is shown with dotted lines. For example, as shown in FIGURE 4, the first element of the secret key i.e., 'A' is combined with the first element of the confidential information string i.e., 'G'
Further, second element of the secret key i.e., 'C is combined with second element of the confidential information string i.e., Ά'. Subsequently, third element of the secret key i.e., 'K' is combined with third element of the confidential information string i.e., 'T'. The fourth element of the secret key i.e., 'N' is combined with fourth element of the confidential information string i.e., Έ'. The fifth element of the secret key i.e., Ό' is combined with fifth element of the confidential information string i.e., ' 1 ' and the sixth element of the secret key i.e., 'W is combined with sixth element of the confidential information string i.e., '2'.
Referring to FIGURE 5, the grid generator 40further includes a random text generator 50 adapted to generate random text to be inserted into the grid generated by the grid generator 40. Certain cells of the grid generated by the grid generator 40 include a combination of the characters of the confidential information string and characters of the secret key. Remaining cells of the grid are populated with the random text generated by the random text generator 50. One cell of the grid contains the termination character and the remaining cells of the grid are populated with random text.
In accordance with the present disclosure, the system 100 further includes a retriever 60 adapted to retrieve the confidential information from the grid generated by the grid generator 40. The retriever 60receives from the secret key generator 20, the secret key utilized to conceal the confidential information string. The retriever 60scans the grid generated by the grid generator 40 and identifies the cells of the grid containing characters of the secret key .The retriever 60 scans the grid for the presence of the characters of the secret key and for every character in the secret key, retrieves the adjacent character. Since every character in the secret key is paired with every character of the confidential information string, once all the characters corresponding to the secret key are derived, the characters corresponding to the confidential information string are also obtained. In accordance with the present disclosure, the system 100 further includes an arranging module 70 configured to arrange the characters corresponding to the retrieved confidential information string, in a pre determined order, thereby deriving the confidential information. The arranging module 70 receives from the reader 30, the information corresponding to the order in which the elements of the confidential information string were arranged prior to pairing. The arranging module subsequently arranges the retrieved characters in the same order and reproduces the confidential information string.
In accordance with the present disclosure, the secret key generator 10, reader 20, pairing module 30 and grid generator 40 are comprised in a first computer enabled device 500A accessible to a sender of the confidential information. The first computer enabled device 500A stores the confidential information to be sent to recipient(s). Subsequently, the retriever 60 and arranging module 70 are comprised in a second computer enabled device 500B accessible to an intended recipient of the confidential information. The grid generated by the grid generator 40and the secret key generated by the secret key generator lOare transmitted from the first computer enabled device 500 A to second computer enabled device 500B through a transmitter denoted by the reference numeral 80.
Referring to FIGURE 6and FIGURE 7there is shown a flowchart corresponding to the computer implemented method for concealing confidential information by combining the confidential information with random text using a secret key. The method in accordance with the present disclosure includes the following computer implemented steps:
• accessing, at a first computer enabled device accessible to a sender, the confidential information to be protected against unauthorized access 200;
• generating at least one secret key 202; • sequentially reading the characters contained in said confidential information and said secret key 204;
• combining each character of said confidential information with each character of said secret key and generating a combined string 206;
• generating a grid having empty cells and replacing at least some of said empty cells with cells of said combined string 208;
- · transmitting said grid, said secret key to a second computer enabled device accessible to a recipient of said confidential information 210;
• accessing at a second computer enabled device, said secret key and scanning said grid to identify the cells containing characters of said secret key 212;
• retrieving the characters adjacent to said characters of the secret key, from said cells, wherein said characters adjacent to the characters of said secret key correspond to the confidential information 214; and
• arranging retrieved characters in a pre determined format and deriving said confidential information 216.
In accordance with the present disclosure, the method further includes the step of populating remaining empty cells of the grid with random alphabets, digits, special characters and any combinations thereof.
In accordance with the present disclosure, the step of generating at least one secret key further includes the step of generating secret keys always having a length greater than the length of said confidential information. In accordance with the present disclosure, the step of generating at least one secret key further includes the step of generating secret keys comprising alphabets, digits, special characters and any combinations thereof.
In accordance with the present disclosure, the step of generating at least one secret key further includes the step of generating secret keys having non- repetitive elements.
In accordance with the present disclosure, the step of combining each character of said confidential information with each character of said secret key further includes the step of combining successive characters of said secret key with successive characters of said confidential information.
TECHNICAL ADVANTAGES
The technical advantages of the computer implemented system for viewing secret text include the following:
• providing a system for concealing secret text within random text;
• providing a system that works hand-in-hand with graphical user interface elements of software applications;
• providing a system that displays text hidden within random text, on the graphical user interface of software applications;
• providing a system that protects information against various security attacks; and
• providing a system that does not depend upon the characteristics associated with graphical user interfaces of software applications; and • providing a system that does not depend upon user interface characteristics such as color, position, size and the like for concealing secret text.
While considerable emphasis has been placed herein on the particular features of this invention, it will be appreciated that various modifications can be made, and that many changes can be made in the preferred embodiment without departing from the principles of the invention. These and other modifications in the nature of the invention or the preferred embodiments will be apparent to those skilled in the art from the disclosure herein, whereby it is to be distinctly understood that the foregoing descriptive matter is to be interpreted merely as illustrative of the invention and not as a limitation.

Claims

Claims:
1. A computer implemented system for concealing confidential information by combining the confidential information with random text using a secret key, said system comprising:
a first computer enabled device accessible to a sender of said confidential information, said first computer enabled device comprising:
o a secret key generator configured to generate a plurality of secret keys;
o a reader having access to said confidential information and said secret key, said reader configured to sequentially read the characters contained in said confidential information and said secret key;
o a pairing module configured to combine each character of said confidential information with each character of said secret key and generate a combined string, said combined string having a plurality of cells wherein each cell comprises a character of said secret key paired with a character of said confidential information ; and
o a grid generator configured to generate a grid having a plurality of empty cells, said grid generator configured to replace at least some of said empty cells with cells of said combined string, said grid generator comprising:
a random text generator configured to populate the remaining empty cells of the grid with random text selected from the group consisting of alphabets, digits and special characters. ■ a second computer enabled device accessible to a recipient of said confidential information, said second computer enabled device comprising:
o a retriever having access to said secret key, said retriever further configured to scan said grid and identify the cells containing characters of said secret key, said retriever still further configured to retrieve the characters adjacent to said characters of the secret key, from said cells, wherein said characters adjacent to the characters of said secret key correspond to the confidential information; and o an arranging module configured to arrange retrieved characters in a pre determined format and derive the confidential information.
2. The computer implemented system as claimed in claim 1, wherein said first computer enabled device further comprises a transmitter configured to transmit said secret key and said grid to said second computer enabled device.
3. The computer implemented system as claimed in claim 1 , wherein said secret key generator is configured to generate secret keys always having a length greater than the length of said confidential information.
4. The computer implemented system as claimed in claim 1 , wherein said secret key generator is configured to generate secret keys comprising alphabets, digits, special characters and any combinations thereof.
5. The computer implemented system as claimed in claim 1, wherein said secret key generator is configured to generate secret keys having non- repetitive elements.
6. The computer implemented system as claimed in claim 1, wherein said pairing module is configured to combine successive characters of said secret key with successive characters of said confidential information.
7. A computer implemented method for concealing confidential information by combining the confidential information with random text using a secret key, said method comprising the following computer implemented steps:
• accessing, at a first computer enabled device accessible to a sender, the confidential information to be protected against unauthorized access 100;
• generating at least one secret key 102;
• sequentially reading the characters contained in said confidential information and said secret key 104;
• combining each character of said confidential information with each character of said secret key and generating a combined string 106;
• generating a grid having empty cells and replacing at least some of said empty cells with cells of said combined string 108;
• transmitting said grid, said secret key to a second computer enabled device accessible to a recipient of said confidential information 110;
• accessing at said second computer enabled device, said secret key and scanning said grid to identify the cells containing characters of said secret key 112;
• retrieving the characters adjacent to said characters of the secret key, from said cells, wherein said characters adjacent to the characters of said secret key correspond to the confidential information 114; and • arranging retrieved characters in a pre determined format and deriving said confidential information 116.
8. The computer implemented method as claimed in claim 7, wherein the method further includes the step of populating remaining empty cells of the grid with random alphabets, digits, special characters and any combinations thereof.
9. The computer implemented method as claimed in claim 7 , wherein the step of generating at least one secret key further includes the step of generating secret keys always having a length greater than the length of said confidential information.
10. The computer implemented method as claimed in claim 7, wherein the step of generating at least one secret key further includes the step of generating secret keys comprising alphabets, digits, special characters and any combinations thereof.
1 1. The computer implemented method as claimed in claim 7, wherein the step of generating at least one secret key further includes the step of generating secret keys having non-repetitive elements.
12. The computer implemented method as claimed in claim 7, wherein the step of combining each character of said confidential information with each character of said secret key further includes the step of combining successive characters of said secret key with successive characters of said confidential information.
PCT/IN2013/000318 2012-05-28 2013-05-16 A computer implemented system and method for concealing confidential information WO2013179304A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN2112CH2012 2012-05-28
IN2112/CHE/2012 2012-05-28

Publications (2)

Publication Number Publication Date
WO2013179304A2 true WO2013179304A2 (en) 2013-12-05
WO2013179304A3 WO2013179304A3 (en) 2014-01-16

Family

ID=49673993

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2013/000318 WO2013179304A2 (en) 2012-05-28 2013-05-16 A computer implemented system and method for concealing confidential information

Country Status (1)

Country Link
WO (1) WO2013179304A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995503A (en) * 2019-03-11 2019-07-09 青岛大学 A Key-based Electronic Grid Construction Method
US10419444B2 (en) 2015-08-24 2019-09-17 Cyberlink Corp. Systems and methods for protecting messages utilizing a hidden restriction mechanism
CN114519192A (en) * 2020-11-19 2022-05-20 武汉斗鱼鱼乐网络科技有限公司 Method for hiding secret key in module relocation table

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080077604A1 (en) * 2006-09-25 2008-03-27 General Electric Company Methods of de identifying an object data
US20090003701A1 (en) * 2007-06-30 2009-01-01 Lucent Technologies, Inc. Method and apparatus for applying steganography to digital image files
US20090034739A1 (en) * 2005-07-19 2009-02-05 Isamu Teranishi Key issuing method, group signature system, information processing apparatus, and program
CN102360413A (en) * 2011-04-11 2012-02-22 桂林电子科技大学 Steganographic method with misguiding function of controllable secret key sequence

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090034739A1 (en) * 2005-07-19 2009-02-05 Isamu Teranishi Key issuing method, group signature system, information processing apparatus, and program
US20080077604A1 (en) * 2006-09-25 2008-03-27 General Electric Company Methods of de identifying an object data
US20090003701A1 (en) * 2007-06-30 2009-01-01 Lucent Technologies, Inc. Method and apparatus for applying steganography to digital image files
CN102360413A (en) * 2011-04-11 2012-02-22 桂林电子科技大学 Steganographic method with misguiding function of controllable secret key sequence

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10419444B2 (en) 2015-08-24 2019-09-17 Cyberlink Corp. Systems and methods for protecting messages utilizing a hidden restriction mechanism
CN109995503A (en) * 2019-03-11 2019-07-09 青岛大学 A Key-based Electronic Grid Construction Method
CN109995503B (en) * 2019-03-11 2022-03-18 青岛大学 Electronic grid construction method based on secret key
CN114519192A (en) * 2020-11-19 2022-05-20 武汉斗鱼鱼乐网络科技有限公司 Method for hiding secret key in module relocation table

Also Published As

Publication number Publication date
WO2013179304A3 (en) 2014-01-16

Similar Documents

Publication Publication Date Title
Ahvanooey et al. AITSteg: An innovative text steganography technique for hidden transmission of text message via social media
US8238828B2 (en) System and method for multimedia storing and retrieval using low-cost tags as virtual storage mediums
US10157270B2 (en) Methods, apparatus, and articles of manufacture to encode auxiliary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data
Abdullah et al. New approaches to encrypt and decrypt data in image using cryptography and steganography algorithm
Raggo et al. Data hiding: exposing concealed data in multimedia, operating systems, mobile devices and network protocols
CN105825257A (en) Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof
Arun et al. Design of image steganography using LSB XOR substitution method
US20090046848A1 (en) Encryption management system
Almehmadi et al. Novel arabic e-text watermarking supporting partial dishonesty based on counting-based secret sharing
Hassan et al. Data hiding techniques in Windows OS: a practical approach to investigation and defense
Bhattacharyya et al. Receiver compatible data hiding in color image
Urbanovich et al. Theoretical Model of a Multi-Key Steganography System
JP2006520047A (en) Method and system for enabling remote message creation
Hamdan et al. AH4S: an algorithm of text in text steganography using the structure of omega network
Kaushik et al. Zero-width text steganography in cybercrime attacks
WO2013179304A2 (en) A computer implemented system and method for concealing confidential information
Samphaiboon Steganography via running short text messages
Zaynalov et al. Features of using invisible signs in the word environment for hiding data
Saraswat et al. A review of digital image steganography
El_Rahman A comprehensive image steganography tool using LSB scheme
Alabdali et al. An overview of steganography through history
Chaudhary et al. An elucidation on steganography and cryptography
Abdul-rahman Arabic Text Steganography: Literature Survey
Sharma et al. Visual cryptography authentication for data matrix code
Jain A Comparative Study of Various Security and Issues in Steganography Techniques

Legal Events

Date Code Title Description
122 Ep: pct application non-entry in european phase

Ref document number: 13797637

Country of ref document: EP

Kind code of ref document: A2

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 13/06/2016)

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13797637

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 13797637

Country of ref document: EP

Kind code of ref document: A2

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载