A Novel Approach Covert Channel for Secret Communications
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 14, Issue 2
Abstract
This paper presents a novel covert channel for secret communications. It implements a new application layer covert channel, by applying multimedia steganography techniques to hide secret messages. This new channel method (called Under Your Radar (UYR)) provides a stealthiness method for the communication channel and an efficient method for hiding messages, as proved by our investigations. Such a covert channel will be used for transferring secret messages in two phases. In phase one, the message characters will be embedded randomly into the pixels of video frames. The choice of pixels is dependent on finding an identical value of the character ASCII representation from one of the pixel channels. The positions of pixels will form the steganography key, which will be used later to extract the message. Also, the steganography key will be embedded in an image using the LSB steganography technique. In phase two, the secret message will be exchanged between the sender and the receiver by sharing the video along with the steganography key over a public service (e.g. a social network), which serves as the new covert communication channel. The experiments outcomes have showed an improvement on the success of the proposed covert channel in exchanging secret messages without rising suspicion by observers or detection tools.
Authors and Affiliations
Ali Hussein Hadi
Issues and Emerging Trends in Identity Management
In todays digital age as companies are moving more and more amounts of important, sensitive data, information, applications, and infrastructure online there is a need toestablish and maintain credentials on all the conne...
Shape Matching and Recognition using Hybrid Features from Skeleton and Boundary
This paper presents a novel approach for effective matching of similar shapes from skeleton and boundary features. The features identified from the shape are the junction points, end points, and maximum length from singl...
Design and Implementation of Hybrid Algorithm for e-news Classification.
Data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. As the use of internet is increasing day by day and with the advancement of interne...
Simulation And Auditing Of Network Security Based On Probabilistic Neural Network Approach
: Probabilistic Neural Network approach used for mobile adhoc network is more efficient way to estimate the network security. In this paper, we are using an Adhoc On Demand Distance Vector (AODV) protocol based mobile ad...
The Effects of Various Frequency Scaling Algorithm on Embedded Linux CPU Power Consumption
In this paper we have tested various frequency scaling algorithm available in Linux and measured the effects of the different algorithms during operation in an actual system. We have tested all the default scaling algori...