Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3538969.3544440acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article
Open access

Using Telegram as a carrier for image steganography: Analysing Telegrams API limits

Published: 23 August 2022 Publication History

Abstract

Telegram is a messaging platform with millions of users per month. For this reason, it is a possible vector for steganographic messages. We investigate the feasibility of using Telegram as a messenger service for images with steganographic content, specifically we use F5 as a proof of concept. We evaluate the optimal resolution and quality settings to achieve the highest possible payload size. In order to support longer message transfers over Telegram, we design a cover channel with a regular schedule of images to have a high bandwidth. We found that the optimal resolution for message transfers is 2560x2560 at JPEG quality settings of 82. And that this configuration allows us to send an average of 81 kilobytes of data per image.

References

[1]
Cosimo Anglano, Massimo Canonico, and Marco Guazzone. 2017. Forensic analysis of Telegram Messenger on Android smartphones. Digital Investigation 23(2017), 31–49.
[2]
Abbas Cheddad, Joan Condell, Kevin Curran, and Paul Mc Kevitt. 2010. Digital image steganography: Survey and analysis of current methods. Signal Processing 90, 3 (2010), 727–752.
[3]
Rémi Cogranne, Vahid Sedighi, and Jessica J. Fridrich. 2017. Practical strategies for content-adaptive batch steganography and pooled steganalysis. In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2017, New Orleans, LA, USA, March 5-9, 2017. IEEE, 2122–2126.
[4]
Ron Crandall. 1998. Some notes on steganography. http://dde.binghamton.edu/download/Crandall_matrix.pdf., 6 pages. Posted on steganography mailing list. Last visited on May 11 2022.
[5]
Tomás Denemark and Jessica J. Fridrich. 2017. Steganography with two JPEGs of the same scene. In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2017, New Orleans, LA, USA, March 5-9, 2017. IEEE, 2117–2121.
[6]
Tomás Denemark, Vahid Sedighi, Vojtech Holub, Rémi Cogranne, and Jessica J. Fridrich. 2014. Selection-channel-aware rich model for Steganalysis of digital images. In 2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014, Atlanta, GA, USA, December 3-5, 2014. IEEE, 48–53.
[7]
Pierdomenico Fiadino, Mirko Schiavone, and Pedro Casas. 2014. Vivisecting whatsapp through large-scale measurements in mobile networks. In Proceedings of the 2014 ACM conference on SIGCOMM. 133–134.
[8]
Jiri Fridrich. 1999. A New Steganographic Method for Palette-Based Images. In PICS 1999: Proceedings of the Conference on Image Processing, Image Quality and Image Capture Systems (PICS-99), Savannah, Georgia, USA, April 25-28 1999. IS&T - The Society for Imaging Science and Technology, 285–289.
[9]
Jessica Fridrich, Miroslav Goljan, and Dorin Hogea. 2002. Steganalysis of JPEG images: Breaking the F5 algorithm. In International Workshop on Information Hiding. Springer, 310–323.
[10]
Telegram FZ-LLC. [n. d.]. Telegram APIs. https://core.telegram.org/. Last visited on May 11 2022.
[11]
Telegram FZ-LLC. 2020. Video calls and seven years of telegram. https://telegram.org/blog/video-calls. Last visited on Apr. 24 2022.
[12]
Telegram FZ-LLC. 2022. Storage.filetype. https://core.telegram.org/type/storage.FileType. Last visited on May 11 2022.
[13]
Pixabay GmbH. 2022. Editor’s Choice - Photos. https://pixabay.com/editors_choice/. Last visited on May 11 2022.
[14]
Pixabay GmbH. 2022. Pixabay. https://pixabay.com. Last visited on May 11 2022.
[15]
Statista GmbH. 2022. Most popular social networks worldwide as of January 2022, ranked by number of monthly active users. https://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/. Last visited on May 11 2022.
[16]
Gustavo Gonzalez. 2022. Whatsdesk. https://gitlab.com/zerkc/whatsdesk. Last visited on May 11 2022.
[17]
Vojtech Holub and Jessica J. Fridrich. 2012. Designing steganographic distortion using directional filters. In 2012 IEEE International Workshop on Information Forensics and Security, WIFS 2012, Costa Adeje, Tenerife, Spain, December 2-5, 2012. IEEE, 234–239.
[18]
Katharina Häringer and BR24 Redaktion. 2021. Passauer Studie: Telegram ist Kanal für Corona-Verschwörungen. https://www.br.de/nachrichten/bayern/passauer-studie-telegram-ist-kanal-fuer-corona-verschwoerungen,SaNtAyN. Last visited on May 11 2022.
[19]
Arash Jalali and Hassan Farsi. 2020. A new steganography algorithm based on video sparse representation. Multimedia Tools and Applications 79, 3 (2020), 1821–1846.
[20]
James C Judge. 2001. Steganography: past, present, future. SANS white paper 30(2001).
[21]
Tom Kellen. 2001. Hiding in plain view: Could steganography be a terrorist tool. SANS institute infosec reading room(2001).
[22]
Andrew D. Ker. 2006. Batch Steganography and Pooled Steganalysis. In Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers(Lecture Notes in Computer Science, Vol. 4437), Jan Camenisch, Christian S. Collberg, Neil F. Johnson, and Phil Sallee (Eds.). Springer, 265–281.
[23]
Andrew David Ker and Tomás Pevný. 2012. Batch steganography in the real world. In Multimedia and Security Workshop, MM&Sec 2012, Coventry, United Kingdom, September 6-7, 2012, Chang-Tsun Li, Jana Dittmann, Stefan Katzenbeisser, and Scott Craver (Eds.). ACM, 1–10.
[24]
Mehdi Kharrazi, Husrev Taha Sencar, and Nasir D Memon. 2006. Performance study of common image steganography and steganalysis techniques. Journal of Electronic Imaging 15, 4 (2006), 041104.
[25]
Elias Kougianos, Saraju P Mohanty, Gavin Coelho, Umar Albalawi, and Prabha Sundaravadivel. 2016. Design of a high-performance system for secure image communication in the internet of things. IEEE Access 4(2016), 1222–1242.
[26]
Li Li, Weiming Zhang, Kejiang Chen, and Nenghai Yu. 2020. Steganographic Security Analysis From Side Channel Steganalysis and Its Complementary Attacks. IEEE Transactions on Multimedia 22, 10 (2020), 2526–2536.
[27]
Ramadhan J. Mstafa, Younis Mohammed Younis, Haval Ismael Hussein, and Muhsin Atto. 2020. A New Video Steganography Scheme Based on Shi-Tomasi Corner Detector. IEEE Access 8(2020), 161825–161837. https://doi.org/10.1109/ACCESS.2020.3021356
[28]
Stas Parshin. 2022. java-telegram-bot-api. https://github.com/pengrad/java-telegram-bot-api. Last visited on May 11 2022.
[29]
Tomas Pevny and Jessica Fridrich. 2008. Multiclass Detector of Current Steganographic Methods for JPEG Format. IEEE Transactions on Information Forensics and Security 3, 4(2008), 635–650.
[30]
Tomáš Pevný and Ivan Nikolaev. 2015. Optimizing pooling function for pooled steganalysis. In 2015 IEEE International Workshop on Information Forensics and Security (WIFS). 1–6.
[31]
Niels Provos and Peter Honeyman. 2003. Hide and seek: An introduction to steganography. IEEE security & privacy 1, 3 (2003), 32–44.
[32]
python-telegram bot. 2022. Python Telegram Bot 13.11 documentation. https://python-telegram-bot.readthedocs.io/en/stable/. Last visited on May 11 2022.
[33]
Alexandre Rose. 2021. fb-messenger-cli. https://github.com/Alex-Rose/fb-messenger-cli. Last visited on May 11 2022.
[34]
MA Rosid, A Rachmadany, MT Multazam, ABD Nandiyanto, AG Abdullah, and I Widiaty. 2018. Integration telegram bot on e-complaint applications in college. In IOP Conference Series: Materials Science and Engineering, Vol. 288. IOP Publishing, 012159.
[35]
Kostya Rubtsov. 2022. Best online chat bots and assistants. https://botostore.com/. Last visited on May 11 2022.
[36]
Gandeva Bayu Satrya, Philip Tobianto Daely, and Muhammad Arif Nugroho. 2016. Digital forensic analysis of Telegram Messenger on Android devices. In 2016 International Conference on Information Communication Technology and Systems (ICTS). 1–7.
[37]
Miriam Schröder and Sebastian Christ. 2020. Rechtsextreme Chatgruppe von Polizisten: Messengerdienste als Rückzugsraum für Extremisten. https://www.tagesspiegel.de/politik/rechtsextreme-chatgruppe-von-polizisten-messengerdienste-als-rueckzugsraum-fuer-extremisten/26193324.html. Last visited on May 11 2022.
[38]
Hari Setiaji and Irving V Paputungan. 2018. Design of telegram bots for campus information sharing. In IOP Conference Series: Materials Science and Engineering, Vol. 325. IOP Publishing, 012005.
[39]
SolarWinds. 2022. New facts and figures about images format use on websites. www.pingdom.com/blog/new-facts-and-figures-about-image-format-use-on-websites/. Last visited on May 11 2022.
[40]
Martin Steinebach, Andre Ester, and Huajian Liu. 2018. Channel Steganalysis. In Proceedings of the 13th International Conference on Availability, Reliability and Security(ARES 2018). Association for Computing Machinery, Article 9, 8 pages.
[41]
Martin Steinebach, Huajian Liu, and Andre Ester. 2019. The need for steganalysis in image distribution channels. Journal of Cyber Security and Mobility(2019), 365–392.
[42]
Théo Taburet, Patrick Bas, Wadih Sawaya, and Jessica J. Fridrich. 2019. A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain. In Media Watermarking, Security, and Forensics 2019, Burlingame, CA, USA, 13-17 January 2019, Adnan M. Alattar, Nasir D. Memon, and Gaurav Sharma (Eds.). Ingenta.
[43]
Moritz Tremmel. 2020. Kriminalität: Polizei übernimmt illegale Marktplätze auf Telegram. https://www.golem.de/news/kriminalitaet-polizei-uebernimmt-illegale-marktplaetze-auf-telegram-2010-151831.html. Last visited on May 11 2022.
[44]
Andreas Westfeld. 2001. F5—a steganographic algorithm. In International workshop on information hiding. Springer, 289–302.
[45]
Yassine Yousfi, Jan Butora, Jessica Fridrich, and Clément Fuji Tsang. 2021. Improving EfficientNet for JPEG Steganalysis. In Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security(IH&MMSec ’21). Association for Computing Machinery, 149–157.
[46]
Ahmad ZAKARIA, Marc CHAUMONT, and Gérard SUBSOL. 2019. Pooled Steganalysis in JPEG: how to deal with the spreading strategy?. In 2019 IEEE International Workshop on Information Forensics and Security (WIFS). 1–6.

Cited By

View all
  • (2024)Enhancing Communication Security with a Telegram Bot for Encrypted Image Communication Using F5-LSB Steganography2024 International Conference on Expert Clouds and Applications (ICOECA)10.1109/ICOECA62351.2024.00037(137-143)Online publication date: 18-Apr-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security
August 2022
1371 pages
ISBN:9781450396707
DOI:10.1145/3538969
This work is licensed under a Creative Commons Attribution-NoDerivatives International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 August 2022

Check for updates

Author Tags

  1. API analysis
  2. F5
  3. Steganography
  4. Telegram

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ARES 2022

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)345
  • Downloads (Last 6 weeks)66
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Enhancing Communication Security with a Telegram Bot for Encrypted Image Communication Using F5-LSB Steganography2024 International Conference on Expert Clouds and Applications (ICOECA)10.1109/ICOECA62351.2024.00037(137-143)Online publication date: 18-Apr-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media