A Novel Approach Covert Channel for Secret Communications

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 14, Issue 2

Abstract

This paper presents a novel covert channel for secret communications. It implements a new application layer covert channel, by applying multimedia steganography techniques to hide secret messages. This new channel method (called Under Your Radar (UYR)) provides a stealthiness method for the communication channel and an efficient method for hiding messages, as proved by our investigations. Such a covert channel will be used for transferring secret messages in two phases. In phase one, the message characters will be embedded randomly into the pixels of video frames. The choice of pixels is dependent on finding an identical value of the character ASCII representation from one of the pixel channels. The positions of pixels will form the steganography key, which will be used later to extract the message. Also, the steganography key will be embedded in an image using the LSB steganography technique. In phase two, the secret message will be exchanged between the sender and the receiver by sharing the video along with the steganography key over a public service (e.g.  a social network), which serves as the new covert communication channel. The experiments outcomes have showed an improvement on the success of the proposed covert channel in exchanging secret messages without rising suspicion by observers or detection tools.

Authors and Affiliations

Ali Hussein Hadi

Keywords

Related Articles

The Usage of CIDOS and Social Network Sites in Teaching and Learning Processes at Malaysian Polytechnics

In 21st century learning, students use educational technologies to apply knowledge to new situations, analyse information, collaborate, solve problems, and make decisions. Utilising emerging technologies, to provide ex...

Two Modified Hager and Zhang's Conjugate Gradient Algorithms For Solving Large-Scale Optimization Problems

At present, the conjugate gradient (CG) method of Hager and Zhang (Hager and Zhang, SIAM Journal on Optimization, 16(2005)) is regarded as one of the most effective CG methods for optimization problems. In order to furth...

Free convection between vertical concentric annuli with induced magnetic field when inner cylinder is electrically conducting

An analysis is made for the fully developed laminar free convective flow in an open ended vertical concentric annuli with constant heat flux and constant temperature on the inner and outer walls, in the presence of a rad...

Backstepping Adaptive Control of DFIG-Generators for Variable-Speed Wind Turbines

In this paper, we present a nonlinear robust control of active and reactive power by the use of the technique Backstepping a double-fed asynchronous generator (DFIG) system incorporated in a wind. The power transfer betw...

Advanced IT Outsourcing By Using Cloud Computing Model

In this paper we will discuss Outsourcing is the commissioning of a third party (or a number of third parties) to manage a client organization.s IT assets, people and/ or activities to required results. Business process...

Download PDF file
  • EP ID EP650632
  • DOI 10.24297/ijct.v14i2.2084
  • Views 78
  • Downloads 0

How To Cite

Ali Hussein Hadi (2014). A Novel Approach Covert Channel for Secret Communications. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 14(2), 5479-5486. https://europub.co.uk./articles/-A-650632