Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-540-88961-8_20guidebooksArticle/Chapter ViewAbstractPublication PagesBookacm-pubtype
chapter

A Supraliminal Channel in a Videoconferencing Application

Published: 15 October 2008 Publication History

Abstract

Unlike subliminal or steganographic channels, a supraliminal channel encodes information in the semantic content of cover data, generating innocent communication in a manner similar to mimic functions. These low-bitrate channels are robust to active wardens, and can be used with subliminal channels to achieve steganographic public key exchange. Automated generation of innocent-looking content, however, remains a difficult problem.
Apple's iChat, a popular instant-messaging client and the default client on the Macintosh operating system, includes a video chat facility that allows the user to apply special effects such as replacing the user's background with a video file. We show how this can be used to implement a high-bitrate supraliminal channel, by embedding a computer animation engineered to communicate ciphertext by its pseudo-random behavior.

References

[1]
Craver, S.: On public-key steganography in the presence of an active warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 355-368. Springer, Heidelberg (1998).
[2]
Wayner, P.: Disappearing Cryptography: Information Hiding: Steganography & Watermarking, 2nd edn. Morgan Kaufmann, San Francisco (2002).
[3]
Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE Journal of Selected Areas in Communications 16(4), 474-481 (1998).
[4]
Giffin, J., Greenstadt, R., Litwack, P.: Covert messaging through TCP timestamps. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 194-208. Springer, Heidelberg (2003).
[5]
Inoue, D., Matsumoto, T.: Scheme of standard MIDI files steganography and its evaluation. In: SPIE Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 194-205 (2002).
[6]
Szopa, A.S.: New steganography innovation from ciphile software (August 2001) talk.politics.crypto, [email protected]
[7]
NetApplications.com: Operating system market share for January (2008), http://marketshare.hitslink.com/report.aspx?qprid=8
[8]
Mitnick, K., Simon, W.: The Art of Deception: Controlling the Human Element of Security. John Wiley & Sons, Chichester (2002).
[9]
Tcl programming, http://en.wikibooks.org/wiki/Tcl_Programming/Print version.

Cited By

View all
  • (2015)Capacity Limits of Pseudorandom Channels in Deception ProblemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.242365610:9(1824-1834)Online publication date: 1-Sep-2015
  • (2013)Moving steganography and steganalysis from the laboratory into the real worldProceedings of the first ACM workshop on Information hiding and multimedia security10.1145/2482513.2482965(45-58)Online publication date: 17-Jun-2013
  • (2013)Assured Supraliminal Steganography in Computer GamesRevised Selected Papers of the 14th International Workshop on Information Security Applications - Volume 826710.1007/978-3-319-05149-9_16(245-259)Online publication date: 19-Aug-2013
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide books
Information Hiding: 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers
October 2008
371 pages
ISBN:9783540889601
  • Editors:
  • Kaushal Solanki,
  • Kenneth Sullivan,
  • Upamanyu Madhow

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 15 October 2008

Qualifiers

  • Chapter

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2015)Capacity Limits of Pseudorandom Channels in Deception ProblemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.242365610:9(1824-1834)Online publication date: 1-Sep-2015
  • (2013)Moving steganography and steganalysis from the laboratory into the real worldProceedings of the first ACM workshop on Information hiding and multimedia security10.1145/2482513.2482965(45-58)Online publication date: 17-Jun-2013
  • (2013)Assured Supraliminal Steganography in Computer GamesRevised Selected Papers of the 14th International Workshop on Information Security Applications - Volume 826710.1007/978-3-319-05149-9_16(245-259)Online publication date: 19-Aug-2013
  • (2011)A square-root law for active wardensProceedings of the thirteenth ACM multimedia workshop on Multimedia and security10.1145/2037252.2037268(87-92)Online publication date: 29-Sep-2011
  • (2009)A supraliminal channel in a wireless phone applicationProceedings of the 11th ACM workshop on Multimedia and security10.1145/1597817.1597843(151-154)Online publication date: 7-Sep-2009

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media