Hiding Secret Text inside a Dynamic Handwritten Signature as Steganography Application

Authors

  • Fahad Layth Malallah Cihan University, Sulaimaniya Iraq.
  • Ayad Hussain Abdalqadir Mosul University, Mosul/ Iraq.
  • Mohammad Aldabbagh Mosul University, Mosul/ Iraq.
  • Ammar Waisy Cihan University, Sulaimaniya Iraq.

DOI:

https://doi.org/10.25098/1.1.1

Keywords:

Information security, Steganography, Handwritten signature, Hiding, De-hiding

Abstract

One of the defects with Cryptography is that, when an opponent sees the message in the encrypted form, they might suspect that the message might carry something important, therefore, they will try to roll back the encrypted form to its original one by using all possible methods. The target of this paper is securing text inside an online handwritten signature in order not to raise any suspicion coming from the attacker. This type of protection named Steganography, which is hiding media inside another media. Here, Least Significant Bit (LSB) method is used. The hosted media is online signature that is consisting of three time series trajectories as: x[t], y[t] and the pen pressure p[t]. The result has shown that the hidden secret message in the source party has been reconstructed successfully with the same secret message in the destination party with a recognition rate is 100%. However, the drawback of this method is a slight distortion to the stego-signature, and hides fewer texts than other media.

References

Bansal, K. L., & Singh, A. (2012). Use of Textual Compression in Steganography and Cryptography. International Journal of Innovative Research and Development|| ISSN 2278–0211, 1(8), 109-115.

Chhajed, G. J., Deshmukh, K. V., & Kulkarni, T. S. (2011). Review on binary image steganography and watermarking. International Journal on Computer Science and Engineering, 3(11), 3645.

Coronado, A. S. (2013). Principles of Computer Security: CompTIA Security+™. Journal of Information Privacy and Security, 9(1), 70-72.

Cummins, J., Diskin, P., Lau, S., & Parlett, R. (2004). Steganography and digital watermarking. School of Computer Science, The University of Birmingham, 14, 60.

Handel, T. G., & Sandford II, M. T. (1996). Hiding data in the OSI network model. Paper presented at the International Workshop on Information Hiding.

Khan, S., Ahmad, N., & Wahid, M. (2016). Varying index varying bits substitution algorithm for the implementation of VLSB steganography. Journal of the Chinese Institute of Engineers, 39(1), 101-109.

Luo, W., Huang, F., & Huang, J. (2010). Edge adaptive image steganography based on LSB matching revisited. IEEE transactions on information forensics and security, 5(2), 201-214.

Malallah, F. L., Ahmad, S. S., Yussof, S., Adnan, W. W., Iranmanesh, V., & Arigbabu, O. (2013). A Review of Biometric Template Protection Techniques for Online Handwritten Signature Application. International Review on Computers and Software (I. RE. CO. S.), 8(12).

Malallah, F. L., Syed, S. M. B., Rahman, A. A., Wan, W. A. B., & Yussof, S. B. (2014). Non-Invertible Online Signature Biometric Template Protection via Shuffling and Trigonometry Transformation. International Journal of Computer Applications, 98(4).

Muttoo, S., & Kumar, S. (2008). A Multilayered Secure, Robust and High Capacity Image Steganographic Algorithm. Paper presented at the IEEE, 3rd International Conference on Communication Systems Software and Middleware and Workshops, COMSWARE.

Poornima, R., & Iswarya, R. (2013). An overview of digital image steganography. International Journal of Computer Science and Engineering Survey, 4(1), 23.

Saraireh, S. (2013). A Secure Data Communication system using cryptography and steganography. International Journal of Computer Networks & Communications, 5(3), 125.

Sedighi, V., Cogranne, R., & Fridrich, J. (2016). Content-adaptive steganography by minimizing statistical detectability. IEEE transactions on information forensics and security, 11(2), 221-234.

Shejul, A. A., & Kulkarni, U. L. (2011). A secure skin tone based steganography using wavelet transform. International Journal of computer theory and Engineering, 3(1), 16.

Szczypiorski, K., & Mazurczyk, W. (2016). Steganography in IEEE 802.11 OFDM symbols. Security and Communication Networks, 9(2), 118-129.

Yadav, P., Mishra, N., & Sharma, S. (2013). A secure video steganography with encryption based on LSB technique. Paper presented at the Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on.

Published

2025-02-17

How to Cite

Fahad Layth Malallah, Ayad Hussain Abdalqadir, Mohammad Aldabbagh, & Ammar Waisy. (2025). Hiding Secret Text inside a Dynamic Handwritten Signature as Steganography Application. The Scientific Journal of Cihan University– Sulaimaniya, 1(1), 2-16. https://doi.org/10.25098/1.1.1

Most read articles by the same author(s)