Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions

作者: Matthias Naumann , Steffen Wendzel , Wojciech Mazurczyk , Joerg Keller

DOI: 10.1002/SEC.1500

关键词:

摘要: Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication placed payload a network steganographic transfer. They enrich this with features such as reliability, dynamic overlay routing, or performance optimization - just to mention few. We present different design approaches for embedding hidden channels digitized audio signals under consideration requirements. On basis experimental results, our compared and introduced into protocol engineering approach protocols. Copyright © 2016 John Wiley & Sons, Ltd.

参考文章(32)
Steffen Wendzel, Jörg Keller, Hidden and Under Control A Survey and Outlook on Covert Channel-internal Control Protocols Annales Des Télécommunications. ,vol. 69, pp. 417- 430 ,(2014) , 10.1007/S12243-014-0423-X
Steffen Wendzel, Jörg Keller, Systematic engineering of control protocols for covert channels international conference on communications. pp. 131- 144 ,(2012) , 10.1007/978-3-642-32805-3_11
Wojciech Mazurczyk, Zbigniew Kotulski, New security and control protocol for VoIP based on steganography and digital watermarking Annales Umcs, Informatica. ,vol. 5, pp. 417- 426 ,(2006) , 10.17951/AI.2006.5.1.417-426
Zhijun Wu, Wei Yang, G.711-Based Adaptive Speech Information Hiding Approach Lecture Notes in Computer Science. pp. 1139- 1144 ,(2006) , 10.1007/11816157_141
Jaspreet Kaur, Steffen Wendzel, Michael Meier, Countermeasures for Covert Channel-Internal Control Protocols availability, reliability and security. pp. 422- 428 ,(2015) , 10.1109/ARES.2015.88
Takehiro Takahashi, Wenke Lee, An assessment of VoIP covert channel threats 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007. pp. 371- 380 ,(2007) , 10.1109/SECCOM.2007.4550357
Chungyi Wang, Quincy Wu, Information Hiding in Real-Time VoIP Streams international symposium on multimedia. pp. 255- 262 ,(2007) , 10.1109/ISM.2007.4412381
Wojciech Mazurczyk, Paweł Szaga, Krzysztof Szczypiorski, Using transcoding for hidden communication in IP telephony Multimedia Tools and Applications. ,vol. 70, pp. 2139- 2165 ,(2014) , 10.1007/S11042-012-1224-8
Sebastian Zander, Grenville Armitage, Philip Branch, A survey of covert channels and countermeasures in computer network protocols IEEE Communications Surveys and Tutorials. ,vol. 9, pp. 44- 57 ,(2007) , 10.1109/COMST.2007.4317620