Initial publication | W. Mazurczyk, S. Wendzel, K. Cabaj in [3]. However, this pattern is based on the original PS11 Value Modulation and PS12 Rserved/Unused Patterns, which were introduced by S. Wendzel, S. Zander, B. Fechner, C. Herdin in [1]. |
Illustration | Characteristic features of user-data can be utilized to store secret information. This includes applying methods like LSB modification to speech samples or digital images carried within the payload field. Compared with previous patterns this is a targeted modification. This pattern is analogous to the combination of the patterns. |
Context | Network Covert Channel Patterns → Covert Storage Channel Patterns → Modification of Payload → User-data Aware |
Evidence | See [3] for references. At least the following ideas were published that belong to this pattern: 1. Encode a stream of information by spreading the encoded data across as much of the frequency spectrum as feasible (e.g. DSSS). 2. Embeds secret data into a carrier audio signal by introducing an echo (a.k.a. echo hiding). 3. Replacing the least significant bit of e.g. each voice sample with secret data (LSB). |
Implementation |
References:
[1] S. Wendzel, S. Zander, B. Fechner, C. Herdin: Pattern-based Survey and Categorization of Network Covert Channel Techniques, ACM Computing Surveys, Vol. 47, Issue 3, pp. 50:1-26, ACM, 2015.
An early version of the article is available here: download.
[2] W. Mazurczyk, S. Wendzel, S. Zander, A. Houmansadr, K. Szczypiorski: Information Hiding in Communication Networks, Wiley, 2016. Chapters 3 and 8 contain discussions on hiding patterns, basically on the basis of [1] but with an extension of timing-based patterns.
[3] W. Mazurczyk, S. Wendzel, K. Cabaj: Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach, in Proc. Second International Workshop on Criminal Use of Information Hiding (CUING 2018) at ARES, pp. 10:1-10:10, ACM, 2018.
Keine Kommentare:
Kommentar veröffentlichen