243 research outputs found
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent
network transmissions. Recent findings indicate that novel malware is
increasingly using network steganography. Similarly, other malicious activities
can profit from network steganography, such as data leakage or the exchange of
pedophile data. This paper provides an introduction to network steganography
and highlights its potential application for harmful purposes. We discuss the
issues related to countering network steganography in practice and provide an
outlook on further research directions and problems.Comment: 11 page
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper
shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the
Internet. In this study an Active Voice Period Detection algorithm is devised for PCM codec to detect whether a VoIP packet
carries active or inactive voice data, and the data embedding location in a VoIP stream is chosen randomly according to random
sequences generated from a logistic chaotic map. The initial parameters of the chaotic map and the selection of where to
embed the message are negotiated between the communicating parties. Steganography experiments on active and inactive
voice periods were carried out using a VoIP communications system. Performance evaluation and security analysis indicates
that the proposed VoIP steganographic scheme can withstand statistical detection, and achieve secure real-time covert
communications with high speech quality and negligible signal distortion
Steganography: a class of secure and robust algorithms
This research work presents a new class of non-blind information hiding
algorithms that are stego-secure and robust. They are based on some finite
domains iterations having the Devaney's topological chaos property. Thanks to a
complete formalization of the approach we prove security against watermark-only
attacks of a large class of steganographic algorithms. Finally a complete study
of robustness is given in frequency DWT and DCT domains.Comment: Published in The Computer Journal special issue about steganograph
- …