Covert Channel Communication by Betterment Steganography
نویسندگان
چکیده
This paper is presenting a betterment steganographic method for covert channel communication. Two distinct methods are combined to achieve possibly high data hiding capability with high visual quality. The proposed method shifts the last n nonzero AC coefficients from S JPEG block, and changes the magnitude values of the first n nonzero AC coefficients from T JPEG blocks. S and T blocks are determined by the number of nonzero JPEG coefficients in the block. Zero run-length modification method improves the robustness against statistical attack based on magnitude histogram. Magnitude modification method improves the visual quality. This combination complements each other.
منابع مشابه
Detection And Elimination Of Covert Communication In Transport And Internet Layer – A Survey
Covert channels use stealth communications to compromise the security policies of systems. They constitute an important security threat since they can be used to exfiltrate confidential data from networks. TCP/IP protocols are used everyday and are subject to covert channels problems. Covert channels are used for the secret transfer of information. Encryption only protects communication from be...
متن کاملA Review on Covert Timing Channels & their Applications
Covert network timing channels control time between transmissions of packets in overt network communication and transmits hidden messages. This paper presents an overview of different concepts of covert timing channels such as types, features and properties. There is range of terms used for security of information such as encryption, covert channels, network steganography or information hiding ...
متن کاملDigital Image Steganalysis Schemes for Breaking Steganography
Steganography is the art and science of secret communication, aiming to conceal the existence of a communication. Steganography in the modern day sense of the word usually refers to information or a file that has been concealed inside a digital Image, Audio/Video file. Information Security is becoming an inseparable part of Data Communication through Internet. In order to address this Informati...
متن کاملSteganography harnesses VoIP networks
Covert channels may be dangerous to company networks as they can lead to the leakage of confidential information. However, it is hard to assess what bandwidth of a covert channel poses a serious threat. Generally, it depends on the security policy that is implemented by the organisation concerned. The ideal case will be to eliminate all possibilities of hidden communication, but practically it ...
متن کاملAndroid-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss
Information hiding techniques, specifically steganography, have been extensively researched for over two decades. However, steganography on smartphones over cellular carrier networks is yet to be fully explored. Today, smartphones which are at the epitome of ubiquitous and pervasive computing, make steganography an easily accessible covert communication channel. In this paper, we propose Androi...
متن کامل