Multilevel Steganography: Improving Hidden Communication in Networks

The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the upper-level) serves as a carrier for the second one (called the lower-level). Such a relationship between two (or more) information hiding solutions has several potential benefits. The most important is that the lower-level method steganographic bandwidth can be utilised to make the steganogram unreadable even after the detection of the upper-level method: e.g., it can carry a cryptographic key that deciphers the steganogram carried by the upper-level one. It can also be used to provide the steganogram with integrity. Another important benefit is that the lower-layer method may be used as a signalling channel in which to exchange information that affects the way that the upper-level method functions, thus possibly making the steganographic communication harder to detect. The prototype of MLS for IP networks was also developed, and the experimental results are included in this paper.

[1]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[2]  Wojciech Mazurczyk,et al.  Information Hiding Using Improper frame padding , 2010, 2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS).

[3]  Wojciech Mazurczyk,et al.  Steganography of VoIP Streams , 2008, OTM Conferences.

[4]  Methods for objective and subjective assessment of quality Perceptual evaluation of speech quality ( PESQ ) : An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs , 2002 .

[5]  Santosh S. Vempala,et al.  Chipping Away at Censorship Firewalls with User-Generated Content , 2010, USENIX Security Symposium.

[6]  Xiapu Luo,et al.  Cloak: A Ten-Fold Way for Reliable Covert Communications , 2007, ESORICS.

[7]  Wojciech Mazurczyk,et al.  Retransmission steganography and its detection , 2011, Soft Comput..

[8]  Eric Rescorla,et al.  Diffie-Hellman Key Agreement Method , 1999, RFC.

[9]  Ravi Jain,et al.  An Experimental Study of the Skype Peer-to-Peer VoIP System , 2005, IPTPS.

[10]  Seungwha Yoo,et al.  Allowable Propagation Delay for VoIP Calls of Acceptable Quality , 2002, AISA.

[11]  Sebastian Zander,et al.  A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.

[12]  Atef J. Al-Najjar The decoy: multi-level digital multimedia steganography model , 2008, ICC 2008.

[13]  Wojciech Mazurczyk,et al.  Stream Control Transmission Protocol Steganography , 2010, 2010 International Conference on Multimedia Information Networking and Security.