A Revised Taxonomy of Steganography Embedding Patterns

Steganography embraces several hiding techniques which spawn across multiple domains. However, the related terminology is not unified among the different domains, such as digital media steganography, text steganography, cyber-physical systems steganography, network steganography (network covert channels), local covert channels, and out-of-band covert channels. To cope with this, a prime attempt has been done in 2015, with the introduction of the so-called hiding patterns, which allow to describe hiding techniques in a more abstract manner. Despite significant enhancements, the main limitation of such a taxonomy is that it only considers the case of network steganography. Therefore, this paper reviews both the terminology and the taxonomy of hiding patterns as to make them more general. Specifically, hiding patterns are split into those that describe the embedding and the representation of hidden data within the cover object. As a first research action, we focus on embedding hiding patterns and we show how they can be applied to multiple domains of steganography instead of being limited to the network scenario. Additionally, we exemplify representation patterns using network steganography. Our pattern collection is available under https://patterns.ztt.hs-worms.de.

[1]  Wojciech Mazurczyk,et al.  Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels , 2021, Comput. Secur..

[2]  Gabriele Tolomei,et al.  Turning Federated Learning Systems Into Covert Channels , 2021, IEEE Access.

[3]  Luca Caviglione,et al.  Trends and Challenges in Network Covert Channels Countermeasures , 2021, Applied Sciences.

[4]  David Hutchison,et al.  Internet Evolution: Critical Issues , 2020, IEEE Internet Computing.

[5]  Richie Bonett,et al.  The Top 10 Risks of Machine Learning Security , 2020, Computer.

[6]  W. Mazurczyk,et al.  Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks , 2019, ARES.

[7]  Wojciech Mazurczyk,et al.  Countering adaptive network covert communication with dynamic wardens , 2019, Future Gener. Comput. Syst..

[8]  Ahmed Raza Rajput,et al.  Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis , 2019, Entropy.

[9]  Otto-von,et al.  THREAT ANALYSIS OF STEGANOGRAPHIC AND COVERT COMMUNICATION IN NUCLEAR I&C SYSTEMS , 2019 .

[10]  Christian Steger,et al.  Sensing Danger: Exploiting Sensors to Build Covert Channels , 2019, ICISSP.

[11]  Wojciech Mazurczyk,et al.  Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach , 2018, ARES.

[12]  Martin Steinebach,et al.  Channel Steganalysis , 2018, ARES.

[13]  Ramesh Karri,et al.  Process-Aware Covert Channels Using Physical Instrumentation in Cyber-Physical Systems , 2018, IEEE Transactions on Information Forensics and Security.

[14]  Wojciech Mazurczyk,et al.  Don’t You Touch My Nuts: Information Hiding in Cyber Physical Systems , 2017, 2017 IEEE Security and Privacy Workshops (SPW).

[15]  Steffen Wendzel,et al.  Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research , 2015, J. Univers. Comput. Sci..

[16]  Wojciech Mazurczyk,et al.  Steganography in Modern Smartphones and Mitigation Techniques , 2014, IEEE Communications Surveys & Tutorials.

[17]  Sebastian Zander,et al.  Pattern-Based Survey and Categorization of Network Covert Channel Techniques , 2014, ACM Comput. Surv..

[18]  Steffen Wendzel,et al.  Systematic Engineering of Control Protocols for Covert Channels , 2012, Communications and Multimedia Security.

[19]  Wojciech Mazurczyk,et al.  Using transcoding for hidden communication in IP telephony , 2011, Multimedia Tools and Applications.

[20]  Fauzan Mirza,et al.  Designing a cluster-based covert channel to evade disk investigation and forensics , 2011, Comput. Secur..

[21]  Chuan Ma,et al.  Covert channel for local area network , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[22]  Wojciech Mazurczyk,et al.  LACK—a VoIP steganographic method , 2008, Telecommun. Syst..

[23]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[24]  Sebastian Zander,et al.  Covert channels in multiplayer first person shooter online games , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).

[25]  Sebastian Zander,et al.  A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.

[26]  Grzegorz Lewandowski,et al.  Covert Channels in IPv6 , 2005, Privacy Enhancing Technologies.

[27]  Marko Jahnke,et al.  Data Hiding in Journaling File Systems , 2005, DFRWS.

[28]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[29]  J. van Leeuwen,et al.  Information Hiding , 1999, Lecture Notes in Computer Science.

[30]  Theodore G. Handel,et al.  Hiding Data in the OSI Network Model , 1996, Information Hiding.

[31]  Ross Anderson,et al.  Information hiding terminology , 1996 .

[32]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.