PERMUTATION-BASED POLYMORPHIC STEGO-WATERMARKS FOR PROGRAM CODES
DOI:
https://doi.org/10.18372/2306-1472.67.10431Keywords:
data protection, digital watermarks, information security, program code, steganographyAbstract
Purpose: One of the most actual trends in program code protection is code marking. The problem consists in creation of some digital “watermarks” which allow distinguishing different copies of the same program codes. Such marks could be useful for authority protection, for code copies numbering, for program propagation monitoring, for information security proposes in client-server communication processes. Methods: We used the methods of digital steganography adopted for program codes as text objects. The same-shape symbols method was transformed to same-semantic element method due to codes features which makes them different from ordinary texts. We use dynamic principle of marks forming making codes similar to be polymorphic. Results: We examined the combinatorial capacity of permutations possible in program codes. As a result it was shown that the set of 5-7 polymorphic variables is suitable for the most modern network applications. Marks creation and restoration algorithms where proposed and discussed. The main algorithm is based on full and partial permutations in variables names and its declaration order. Algorithm for partial permutation enumeration was optimized for calculation complexity. PHP code fragments which realize the algorithms were listed. Discussion: Methodic proposed in the work allows distinguishing of each client-server connection. In a case if a clone of some network resource was found the methodic could give information about included marks and thereby data on IP, date and time, authentication information of client copied the resource. Usage of polymorphic stego-watermarks should improve information security indexes in network communications.
References
Cachin, C. Digital Steganography [WWW document]/ Christian Cachin // IBM Research Zurich Research Laboratory CH-8803 Rüschlikon, Switzerland cca@zurich.ibm.com February 17, 2005 – Access from: https://www.zurich.ibm.com/~cca/ papers/encyc.pdf
Simmons, G. J. The Prisoners’ Problem and the Subliminal Channel [Text] / G. J. Simmons // Advances in Cryptology. – 1985, Vol. 209, Р. 364–378.
Bäcker, C. Subliminal Channels in Cryptographic Systems [WWW document]/Christian Bäcker/ – Access from: http://citeseerx.ist.psu.edu/ viewdoc/download?doi=10.1.1.392.8043&rep=rep1&type=pdf
Simmons, G. J. Authentication Theory / Coding Theory [Text] / G. J. Simmons // Advances in Cryptology. – 1985. – Vol. 196. – Р. 411–431.
Pei, D. Y. Authentication Schemes [WWW document] / D. Y. Pei. // Singapore: Institute for Mathematical Sciences.– 2001. – 36 p. – Access from: www2.ims.nus.edu.sg.
Zhang, F., Lee, B., Kim, K. Exploring Signature Schemes with Subliminal Channel / Fangguo Zhang, Byoungcheon Lee, Kwangjo Kim // SCIS 2003 The 2003 Symposium on Cryptography and Information Security Hamamatsu,Japan, Jan. 26-29, 2003 The Institute of Electronics, Information and Communication Engineers
Samoilenko D., Miroshnichenko O., Popov D. Fractal images usage for printed production protection. [Text] / Kvalilohiya book : Coll. Science. pr. / Eng. Acad. printing., 2010, № 2 (18), p. 77-81
Michaud, E. Current Steganography Tools and Methods (Use offense to inform defense. Find flaws before the bad guys do.) [WWW document] / Erin Michaud / SANS Institute, As part of GIAC practical repository, 2003 Access from: https://cyber-defense.sans.org/resources/papers/ gsec/current-steganography-tools-methods-104695
Agarwal, M. Text steganographic approaches: a comparison [Text] / Monika Agarwal // International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.1, January 2013
Sagan, C. 10 Data Hiding in Text [WWW document] Access from: http://www.springer.com /cda/content/document/cda_downloaddocument/9780387003115-c10.pdf
Garg, M. A. Novel Text Steganography Technique Based on Html Documents [Text] / International Journal of Advanced Science and Technology Vol. 35, October, 2011
Wagner D. J. The Combinatorics of the Permutation Enumeration of Wreath Products between Cyclic and Symmetric Groups. PhD Thesis in Mathematics. [WWW document] / University of California, San Diego Access from: https://math.ucsd.edu/~thesis/thesis/jwagner/