Skip to Main Content
Frequently Asked Questions
Submit an ETD
Global Search Box
Need Help?
Keyword Search
Participating Institutions
Advanced Search
School Logo
Files
File List
kent1310505218.pdf (597.66 KB)
ETD Abstract Container
Abstract Header
STEGANOGRAPHIC COVERT COMMUNICATION CHANNELS AND THEIR DETECTION
Author Info
Amiruzzaman, Md
ORCID® Identifier
http://orcid.org/0000-0002-2292-5798
Permalink:
http://rave.ohiolink.edu/etdc/view?acc_num=kent1310505218
Abstract Details
Year and Degree
2011, MS, Kent State University, College of Arts and Sciences / Department of Computer Science.
Abstract
Covert channels facilitate the capability to transfer secret information between processes without being detected. They are used for good intentions as well as bad intentions. The latter is used in computer security attacks. The former is used to transport secret data over a covert channel. Once a covert channel is established, it is important to protect it from intruders who intend to discover its transportation mechanisms. While cryptography allows plain visibility of encrypted data, steganography hides the existence of the data and the underlying communication channel. Statistical analysis of network packets (headers or payload) as well as communication channel characteristics can be used to reveal the existence of covert activities. For example, first-order statistical analysis can be used to detect the basic properties of certain covert channels. While there exist some level of protection against establishing a cover channel at lower layers, top layers and network applications are more vulnerable to be used to establish a cover channel. There are several applications that can be used to establish a covert channel. Among them JPEG images, commonly used across the Internet, are often utilized to establish a covert channel and transport hidden data. In this thesis, first, we provide a survey of the major steganographic algorithms and we introduce a new technique in which a set of concurrent covert channels can be established between a sender and multiple receivers. Each channel is protected by a separate key. Second, we introduce a new steganographic detection technique, based on statistical sequential analysis and process control, that detects a group of covert channels established over transmission of JPEG images. The technique performs better in terms of average run length when compared to the existing detection techniques.
Committee
Hassan Peyravi, PhD (Advisor)
Feodor Dragan, PhD (Committee Member)
Mikhail Nesterenko, PhD (Committee Member)
Pages
70 p.
Subject Headings
Computer Science
Keywords
covert channel
;
steganography
;
detection
Recommended Citations
Refworks
EndNote
RIS
Mendeley
Citations
Amiruzzaman, M. (2011).
STEGANOGRAPHIC COVERT COMMUNICATION CHANNELS AND THEIR DETECTION
[Master's thesis, Kent State University]. OhioLINK Electronic Theses and Dissertations Center. http://rave.ohiolink.edu/etdc/view?acc_num=kent1310505218
APA Style (7th edition)
Amiruzzaman, Md.
STEGANOGRAPHIC COVERT COMMUNICATION CHANNELS AND THEIR DETECTION.
2011. Kent State University, Master's thesis.
OhioLINK Electronic Theses and Dissertations Center
, http://rave.ohiolink.edu/etdc/view?acc_num=kent1310505218.
MLA Style (8th edition)
Amiruzzaman, Md. "STEGANOGRAPHIC COVERT COMMUNICATION CHANNELS AND THEIR DETECTION." Master's thesis, Kent State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=kent1310505218
Chicago Manual of Style (17th edition)
Abstract Footer
Document number:
kent1310505218
Download Count:
1,613
Copyright Info
© 2011, all rights reserved.
This open access ETD is published by Kent State University and OhioLINK.