Abstract
This paper presents a novel covert channel for secret communications. It implements a new application layer covert channel, by applying multimedia steganography techniques to hide secret messages. This new channel method (called Under Your Radar (UYR)) provides a stealthiness method for the communication channel and an efficient method for hiding messages, as proved by our investigations. Such a covert channel will be used for transferring secret messages in two phases. In phase one, the message characters will be embedded randomly into the pixels of video frames. The choice of pixels is dependent on finding an identical value of the character ASCII representation from one of the pixel channels. The positions of pixels will form the steganography key, which will be used later to extract the message. Also, the steganography key will be embedded in an image using the LSB steganography technique. In phase two, the secret message will be exchanged between the sender and the receiver by sharing the video along with the steganography key over a public service (e.g. a social network), which serves as the new covert communication channel. The experiments outcomes have showed an improvement on the success of the proposed covert channel in exchanging secret messages without rising suspicion by observers or detection tools.
Highlights
The Life now is easier than before; the entire world is connected together through the magnificent world of the Internet
In order to evaluate the proposed covert channel, first we need to consider the basic criteria that any covert channel is built on it; this includes plausibility of the channel, which could be proven by evading detection mechanisms
For any detection system and observer of the traffic, there should be a pattern in behavior or anomaly that is generated from the traffic on the covert channel to detect its existence, wherease, the proposed covert channel depends on its operation on the regular and legitimate traffic data
Summary
The Life now is easier than before; the entire world is connected together through the magnificent world of the Internet. People are becoming more reliant on this world, where a tremendous number of applications and huge data travel over the Internet This huge connectivity is governing people purchases, bank transfers, communications and many other needs, that are done in such a sophisticated digital world. In spite of its magnificent, the Internet world has an opposite face of its magnificence, which is the risk of increasing of espionages and data thefts. Such attacks that are developed with more intelligence and advanced techniques. This has called for the necessity for data hiding and developing new methods for secret communications. These methods have been used either for protecting data or by criminals to hide their communications [1]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.