Hacking Anti-Shoplifting System to Hide Data within Clothes

Steganography has been used to prevent unauthorized access to private information during transmission. It is the scheme of securing sensitive information by concealing it within carriers such as digital images, videos, audio, or text. Current steganography methods are working by assigning a cover fi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers, materials & continua materials & continua, 2021, Vol.67 (1), p.659-674
Hauptverfasser: Hussien Seddik Saad, Al, H. Hafez, E., Ahmad, Zubair
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 674
container_issue 1
container_start_page 659
container_title Computers, materials & continua
container_volume 67
creator Hussien Seddik Saad, Al
H. Hafez, E.
Ahmad, Zubair
description Steganography has been used to prevent unauthorized access to private information during transmission. It is the scheme of securing sensitive information by concealing it within carriers such as digital images, videos, audio, or text. Current steganography methods are working by assigning a cover file then embed the payload within it by making some modifications, creating the stego-file. However, the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload. Aiming to solve this issue, a novel, highly robust steganography method based on hacking anti-shoplifting systems has proposed to hide data within clothes. The anti-Shoplifting system is an anti-theft security system that protects goods and products, leaving the store in an illegal way (i.e., without paying for them). The proposed method works by modifying the default anti-shoplifting system by changing its built-in soft RFID (radio-frequency identification) tags sewn in clothes into NFC (Near Field Communication) tags. These NFC tags are smart tags that can communicate with NFC-Enabled smart-phones using NDEF (NFC Data Exchange Format). NDEF is one of the advancements added to RFID technology by NFC, which allows the data exchange. Every NDEF message has one/more NDEF records that contain record type, a unique ID, a length, and a payload of data that contains the secret message content that can be any type of data that fits in a byte stream. Based on NDEF and NFC-enabled smart-phones, the proposed method will take the secret message from the sender, make use of his NFC-enabled smart-phone to communicate with the NFC tag, then hide the secret message within the NDEF’s payload of the NFC tag stuck in clothes. Finally, to evaluate the proposed method, it has been compared with default (digital) steganography weak points. Such as time, lockable, robustness, attacks, capacity, and a few more points. The results and comparisons showed that the proposed method is more efficient than default (digital) steganography and has many advantages.
doi_str_mv 10.32604/cmc.2021.014758
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2484420259</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2484420259</sourcerecordid><originalsourceid>FETCH-LOGICAL-c196t-dde348bfe89fdc91dafd10ad752e098aa03b01227c5d6305f8770144d8ed0b3e3</originalsourceid><addsrcrecordid>eNpNkEtLw0AUhQdRsFb3LgOuE-88kkxwVao1QsFFdT1M5mGm5mVmivTfmxoXru7hcjiH8yF0iyGhJAN2r1qVECA4AczylJ-hBU5ZFhNCsvN_-hJdeb8HoBktYIEeSqk-XfcRrbrg4l3dD42z4fTYHX0wbRT6qHTaRI8yyOjbhdp10brpQ238NbqwsvHm5u8u0fvm6W1dxtvX55f1ahsrXGQh1tpQxitreGG1KrCWVmOQOk-JgYJLCbQCTEiuUp1RSC3P82kD09xoqKihS3Q35w5j_3UwPoh9fxi7qVIQxhmbVqfF5ILZpcbe-9FYMYyuleNRYBC_iMSESJwQiRkR_QG0eVjS</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2484420259</pqid></control><display><type>article</type><title>Hacking Anti-Shoplifting System to Hide Data within Clothes</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Hussien Seddik Saad, Al ; H. Hafez, E. ; Ahmad, Zubair</creator><creatorcontrib>Hussien Seddik Saad, Al ; H. Hafez, E. ; Ahmad, Zubair</creatorcontrib><description>Steganography has been used to prevent unauthorized access to private information during transmission. It is the scheme of securing sensitive information by concealing it within carriers such as digital images, videos, audio, or text. Current steganography methods are working by assigning a cover file then embed the payload within it by making some modifications, creating the stego-file. However, the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload. Aiming to solve this issue, a novel, highly robust steganography method based on hacking anti-shoplifting systems has proposed to hide data within clothes. The anti-Shoplifting system is an anti-theft security system that protects goods and products, leaving the store in an illegal way (i.e., without paying for them). The proposed method works by modifying the default anti-shoplifting system by changing its built-in soft RFID (radio-frequency identification) tags sewn in clothes into NFC (Near Field Communication) tags. These NFC tags are smart tags that can communicate with NFC-Enabled smart-phones using NDEF (NFC Data Exchange Format). NDEF is one of the advancements added to RFID technology by NFC, which allows the data exchange. Every NDEF message has one/more NDEF records that contain record type, a unique ID, a length, and a payload of data that contains the secret message content that can be any type of data that fits in a byte stream. Based on NDEF and NFC-enabled smart-phones, the proposed method will take the secret message from the sender, make use of his NFC-enabled smart-phone to communicate with the NFC tag, then hide the secret message within the NDEF’s payload of the NFC tag stuck in clothes. Finally, to evaluate the proposed method, it has been compared with default (digital) steganography weak points. Such as time, lockable, robustness, attacks, capacity, and a few more points. The results and comparisons showed that the proposed method is more efficient than default (digital) steganography and has many advantages.</description><identifier>ISSN: 1546-2226</identifier><identifier>ISSN: 1546-2218</identifier><identifier>EISSN: 1546-2226</identifier><identifier>DOI: 10.32604/cmc.2021.014758</identifier><language>eng</language><publisher>Henderson: Tech Science Press</publisher><subject>Algorithms ; Audio data ; Data exchange ; Digital imaging ; Near field communication ; Protective clothing ; Radio frequency identification ; Security systems ; Shoplifting ; Smartphones ; Steganography ; Tags ; Theft ; Theft prevention</subject><ispartof>Computers, materials &amp; continua, 2021, Vol.67 (1), p.659-674</ispartof><rights>2021. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c196t-dde348bfe89fdc91dafd10ad752e098aa03b01227c5d6305f8770144d8ed0b3e3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,777,781,4010,27904,27905,27906</link.rule.ids></links><search><creatorcontrib>Hussien Seddik Saad, Al</creatorcontrib><creatorcontrib>H. Hafez, E.</creatorcontrib><creatorcontrib>Ahmad, Zubair</creatorcontrib><title>Hacking Anti-Shoplifting System to Hide Data within Clothes</title><title>Computers, materials &amp; continua</title><description>Steganography has been used to prevent unauthorized access to private information during transmission. It is the scheme of securing sensitive information by concealing it within carriers such as digital images, videos, audio, or text. Current steganography methods are working by assigning a cover file then embed the payload within it by making some modifications, creating the stego-file. However, the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload. Aiming to solve this issue, a novel, highly robust steganography method based on hacking anti-shoplifting systems has proposed to hide data within clothes. The anti-Shoplifting system is an anti-theft security system that protects goods and products, leaving the store in an illegal way (i.e., without paying for them). The proposed method works by modifying the default anti-shoplifting system by changing its built-in soft RFID (radio-frequency identification) tags sewn in clothes into NFC (Near Field Communication) tags. These NFC tags are smart tags that can communicate with NFC-Enabled smart-phones using NDEF (NFC Data Exchange Format). NDEF is one of the advancements added to RFID technology by NFC, which allows the data exchange. Every NDEF message has one/more NDEF records that contain record type, a unique ID, a length, and a payload of data that contains the secret message content that can be any type of data that fits in a byte stream. Based on NDEF and NFC-enabled smart-phones, the proposed method will take the secret message from the sender, make use of his NFC-enabled smart-phone to communicate with the NFC tag, then hide the secret message within the NDEF’s payload of the NFC tag stuck in clothes. Finally, to evaluate the proposed method, it has been compared with default (digital) steganography weak points. Such as time, lockable, robustness, attacks, capacity, and a few more points. The results and comparisons showed that the proposed method is more efficient than default (digital) steganography and has many advantages.</description><subject>Algorithms</subject><subject>Audio data</subject><subject>Data exchange</subject><subject>Digital imaging</subject><subject>Near field communication</subject><subject>Protective clothing</subject><subject>Radio frequency identification</subject><subject>Security systems</subject><subject>Shoplifting</subject><subject>Smartphones</subject><subject>Steganography</subject><subject>Tags</subject><subject>Theft</subject><subject>Theft prevention</subject><issn>1546-2226</issn><issn>1546-2218</issn><issn>1546-2226</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpNkEtLw0AUhQdRsFb3LgOuE-88kkxwVao1QsFFdT1M5mGm5mVmivTfmxoXru7hcjiH8yF0iyGhJAN2r1qVECA4AczylJ-hBU5ZFhNCsvN_-hJdeb8HoBktYIEeSqk-XfcRrbrg4l3dD42z4fTYHX0wbRT6qHTaRI8yyOjbhdp10brpQ238NbqwsvHm5u8u0fvm6W1dxtvX55f1ahsrXGQh1tpQxitreGG1KrCWVmOQOk-JgYJLCbQCTEiuUp1RSC3P82kD09xoqKihS3Q35w5j_3UwPoh9fxi7qVIQxhmbVqfF5ILZpcbe-9FYMYyuleNRYBC_iMSESJwQiRkR_QG0eVjS</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Hussien Seddik Saad, Al</creator><creator>H. Hafez, E.</creator><creator>Ahmad, Zubair</creator><general>Tech Science Press</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>2021</creationdate><title>Hacking Anti-Shoplifting System to Hide Data within Clothes</title><author>Hussien Seddik Saad, Al ; H. Hafez, E. ; Ahmad, Zubair</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c196t-dde348bfe89fdc91dafd10ad752e098aa03b01227c5d6305f8770144d8ed0b3e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Audio data</topic><topic>Data exchange</topic><topic>Digital imaging</topic><topic>Near field communication</topic><topic>Protective clothing</topic><topic>Radio frequency identification</topic><topic>Security systems</topic><topic>Shoplifting</topic><topic>Smartphones</topic><topic>Steganography</topic><topic>Tags</topic><topic>Theft</topic><topic>Theft prevention</topic><toplevel>online_resources</toplevel><creatorcontrib>Hussien Seddik Saad, Al</creatorcontrib><creatorcontrib>H. Hafez, E.</creatorcontrib><creatorcontrib>Ahmad, Zubair</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Computers, materials &amp; continua</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hussien Seddik Saad, Al</au><au>H. Hafez, E.</au><au>Ahmad, Zubair</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Hacking Anti-Shoplifting System to Hide Data within Clothes</atitle><jtitle>Computers, materials &amp; continua</jtitle><date>2021</date><risdate>2021</risdate><volume>67</volume><issue>1</issue><spage>659</spage><epage>674</epage><pages>659-674</pages><issn>1546-2226</issn><issn>1546-2218</issn><eissn>1546-2226</eissn><abstract>Steganography has been used to prevent unauthorized access to private information during transmission. It is the scheme of securing sensitive information by concealing it within carriers such as digital images, videos, audio, or text. Current steganography methods are working by assigning a cover file then embed the payload within it by making some modifications, creating the stego-file. However, the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload. Aiming to solve this issue, a novel, highly robust steganography method based on hacking anti-shoplifting systems has proposed to hide data within clothes. The anti-Shoplifting system is an anti-theft security system that protects goods and products, leaving the store in an illegal way (i.e., without paying for them). The proposed method works by modifying the default anti-shoplifting system by changing its built-in soft RFID (radio-frequency identification) tags sewn in clothes into NFC (Near Field Communication) tags. These NFC tags are smart tags that can communicate with NFC-Enabled smart-phones using NDEF (NFC Data Exchange Format). NDEF is one of the advancements added to RFID technology by NFC, which allows the data exchange. Every NDEF message has one/more NDEF records that contain record type, a unique ID, a length, and a payload of data that contains the secret message content that can be any type of data that fits in a byte stream. Based on NDEF and NFC-enabled smart-phones, the proposed method will take the secret message from the sender, make use of his NFC-enabled smart-phone to communicate with the NFC tag, then hide the secret message within the NDEF’s payload of the NFC tag stuck in clothes. Finally, to evaluate the proposed method, it has been compared with default (digital) steganography weak points. Such as time, lockable, robustness, attacks, capacity, and a few more points. The results and comparisons showed that the proposed method is more efficient than default (digital) steganography and has many advantages.</abstract><cop>Henderson</cop><pub>Tech Science Press</pub><doi>10.32604/cmc.2021.014758</doi><tpages>16</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1546-2226
ispartof Computers, materials & continua, 2021, Vol.67 (1), p.659-674
issn 1546-2226
1546-2218
1546-2226
language eng
recordid cdi_proquest_journals_2484420259
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Algorithms
Audio data
Data exchange
Digital imaging
Near field communication
Protective clothing
Radio frequency identification
Security systems
Shoplifting
Smartphones
Steganography
Tags
Theft
Theft prevention
title Hacking Anti-Shoplifting System to Hide Data within Clothes
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T05%3A34%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Hacking%20Anti-Shoplifting%20System%20to%20Hide%20Data%20within%20Clothes&rft.jtitle=Computers,%20materials%20&%20continua&rft.au=Hussien%20Seddik%20Saad,%20Al&rft.date=2021&rft.volume=67&rft.issue=1&rft.spage=659&rft.epage=674&rft.pages=659-674&rft.issn=1546-2226&rft.eissn=1546-2226&rft_id=info:doi/10.32604/cmc.2021.014758&rft_dat=%3Cproquest_cross%3E2484420259%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2484420259&rft_id=info:pmid/&rfr_iscdi=true