Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1597817.1597843acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

A supraliminal channel in a wireless phone application

Published: 07 September 2009 Publication History

Abstract

Supraliminal channels are robust public channels based on multimedia content, allowing innocuous key exchange in the presence of an active warden. One approach to supraliminal communication embeds bits in the pseudo-random state used to produce computer-generated special effects in hybrid media such as a videoconferencing session.
In this paper we describe an application for wireless phones whose audio effects betray pseudo-random state and hence potential key information for an innocuous exchange protocol. Implementation of a walkie-talkie application for the Apple iPhone shows that hundreds of bits can be reliably transmitted per effect.

References

[1]
S. Craver. On public-key steganography in the presence of an active warden. In Information Hiding, Second International Workshop, pages 355--368. Springer, 1998.
[2]
S. Craver, E. Li, and J. Yu. Protocols for data hiding in pseudo-random state. In Proceedings of the SPIE, Multimedia Forensics and Security XI, volume 7254, 2008.
[3]
S. Craver, E. Li, J. Yu, and I. Atakli. A supraliminal channel in a videoconferencing application. In Information Hiding: 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, pages 283--293, Berlin, Heidelberg, 2008. Springer-Verlag.
[4]
P. Wayner. Disappearing cryptography: information hiding : steganography and watermarking (Second Edition). Morgan Kaufmann, 2002.

Cited By

View all
  • (2015)Capacity Limits of Pseudorandom Channels in Deception ProblemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.242365610:9(1824-1834)Online publication date: Sep-2015
  • (2013)Assured Supraliminal Steganography in Computer GamesRevised Selected Papers of the 14th International Workshop on Information Security Applications - Volume 826710.1007/978-3-319-05149-9_16(245-259)Online publication date: 19-Aug-2013
  • (2011)A square-root law for active wardensProceedings of the thirteenth ACM multimedia workshop on Multimedia and security10.1145/2037252.2037268(87-92)Online publication date: 29-Sep-2011
  • Show More Cited By

Index Terms

  1. A supraliminal channel in a wireless phone application

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MM&Sec '09: Proceedings of the 11th ACM workshop on Multimedia and security
      September 2009
      186 pages
      ISBN:9781605584928
      DOI:10.1145/1597817
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 September 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. audio
      2. steganography

      Qualifiers

      • Research-article

      Conference

      MM&Sec '09
      Sponsor:
      MM&Sec '09: Multimedia and Security Workshop
      September 7 - 8, 2009
      New Jersey, Princeton, USA

      Acceptance Rates

      Overall Acceptance Rate 128 of 318 submissions, 40%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 23 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2015)Capacity Limits of Pseudorandom Channels in Deception ProblemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.242365610:9(1824-1834)Online publication date: Sep-2015
      • (2013)Assured Supraliminal Steganography in Computer GamesRevised Selected Papers of the 14th International Workshop on Information Security Applications - Volume 826710.1007/978-3-319-05149-9_16(245-259)Online publication date: 19-Aug-2013
      • (2011)A square-root law for active wardensProceedings of the thirteenth ACM multimedia workshop on Multimedia and security10.1145/2037252.2037268(87-92)Online publication date: 29-Sep-2011
      • (2011)Effective detection mechanism for TCP based hybrid covert channels in secure communication2011 International Conference on Emerging Trends in Electrical and Computer Technology10.1109/ICETECT.2011.5760288(1123-1128)Online publication date: Mar-2011
      • (2011)Covertness analysis of subliminal channels in legitimate communicationProceedings of the 2011 international conference on Advanced Computing, Networking and Security10.1007/978-3-642-29280-4_68(583-592)Online publication date: 16-Dec-2011

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media