Skip to Main Content
 

Global Search Box

 
 
 
 

ETD Abstract Container

Abstract Header

STEGANOGRAPHIC COVERT COMMUNICATION CHANNELS AND THEIR DETECTION

Abstract Details

2011, MS, Kent State University, College of Arts and Sciences / Department of Computer Science.
Covert channels facilitate the capability to transfer secret information between processes without being detected. They are used for good intentions as well as bad intentions. The latter is used in computer security attacks. The former is used to transport secret data over a covert channel. Once a covert channel is established, it is important to protect it from intruders who intend to discover its transportation mechanisms. While cryptography allows plain visibility of encrypted data, steganography hides the existence of the data and the underlying communication channel. Statistical analysis of network packets (headers or payload) as well as communication channel characteristics can be used to reveal the existence of covert activities. For example, first-order statistical analysis can be used to detect the basic properties of certain covert channels. While there exist some level of protection against establishing a cover channel at lower layers, top layers and network applications are more vulnerable to be used to establish a cover channel. There are several applications that can be used to establish a covert channel. Among them JPEG images, commonly used across the Internet, are often utilized to establish a covert channel and transport hidden data. In this thesis, first, we provide a survey of the major steganographic algorithms and we introduce a new technique in which a set of concurrent covert channels can be established between a sender and multiple receivers. Each channel is protected by a separate key. Second, we introduce a new steganographic detection technique, based on statistical sequential analysis and process control, that detects a group of covert channels established over transmission of JPEG images. The technique performs better in terms of average run length when compared to the existing detection techniques.
Hassan Peyravi, PhD (Advisor)
Feodor Dragan, PhD (Committee Member)
Mikhail Nesterenko, PhD (Committee Member)
70 p.

Recommended Citations

Citations

  • Amiruzzaman, M. (2011). STEGANOGRAPHIC COVERT COMMUNICATION CHANNELS AND THEIR DETECTION [Master's thesis, Kent State University]. OhioLINK Electronic Theses and Dissertations Center. http://rave.ohiolink.edu/etdc/view?acc_num=kent1310505218

    APA Style (7th edition)

  • Amiruzzaman, Md. STEGANOGRAPHIC COVERT COMMUNICATION CHANNELS AND THEIR DETECTION. 2011. Kent State University, Master's thesis. OhioLINK Electronic Theses and Dissertations Center, http://rave.ohiolink.edu/etdc/view?acc_num=kent1310505218.

    MLA Style (8th edition)

  • Amiruzzaman, Md. "STEGANOGRAPHIC COVERT COMMUNICATION CHANNELS AND THEIR DETECTION." Master's thesis, Kent State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=kent1310505218

    Chicago Manual of Style (17th edition)