STEGANOGRAPHY METHODS USED IN ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS
Anna Romanova
anitraromanova@gmail.comTaras Shevchenko University of Kyiv, Faculty of Information Technologies (Ukraine)
http://orcid.org/0000-0003-1403-6322
Sergiy Toliupa
Taras Shevchenko University of Kyiv, Faculty of Information Technologies (Ukraine)
http://orcid.org/0000-0002-1919-9174
Abstract
An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented.
Keywords:
steganography, TEMPEST, covert channel, information protectionReferences
Agranovskiy A. V., Balakin A. V., Gribunin V. G., Sapozhnikov S. A.: Steganografiya, tsifrovyye vodyanyye znaki i steganoanaliz. Vuzovskaya kniga, Moscow 2009.
Google Scholar
Ali A. E.: A New Text Steganography Method by Using Non-Printing Unicode Characters. Eng& Tech. Journal 28 (1), 2010, 72–83.
Google Scholar
Chekhovskyy S.: Sovremennye metody skrytoy peredachy ynformatsyy putem prohrammnoho upravlenyya yzluchenyem kompʹyutery. Pravove, normatyvne ta metrolohichne zabezpechennya systemy zakhystu informatsiyi v Ukrayini. 2003.
Google Scholar
Echo Data Hiding (html): http://www.slidefinder.net/a/audio_steganography_echo_data_hiding/24367218.
Google Scholar
Ferreira A. M.: An Overview on Hiding and Detecting Stego-data in Video Streams. University of Amsterdam. System & Network Engineering – Research Project II, 2015.
Google Scholar
Fridrich J., Goljan M., Soukal D.: Searching for the Stego Key. Proc. SPIE 5306, 2004 [doi: 10.1117/12.521353].
Google Scholar
Genkin D., Shamir A., Tromer E.: RSA key extraction via low-bandwidth acoustic cryptoanalysis. Tel Aviv University. 2013.
Google Scholar
Konakhovich G. F., Puzyrenko A. Yu.: Computer steganography. Theory and practice with Mathcad. MK-Press, Kyiv 2006.
Google Scholar
Kuhn M. G., Anderson R.: Soft Tempest: Hidden data transmission using electromagnetic emanations. University of Cambridge, Computer Laboratory, New Museum Site, 1998.
Google Scholar
League C.: An overview of digital steganography, particularly within images, for the computationally curious. Long Island University 2015: https://www.youtube.com/watch?v=-7FBPgQDX5o.
Google Scholar
Romanova A., Toliupa S.: Perspective steganographic solutions and their application. Proceedings of the VII Inter University Conference Engineer of XXI Century, volume 2, 2017, 269–278.
Google Scholar
Secret Code in Color Printers Lets Government Track You; Tiny Dots Show Where and When You Made Your Print. Electronic Frontier Foundation October 2005: https://www.eff.org/press/archives/2005/10/16.
Google Scholar
Zorin Ye.Ye., Chichvarin N.V.: Steganografiya v SAPR. Uchebnoye posobiye. MGTU im. N.E. Baumana. Moscow.
Google Scholar
Authors
Anna Romanovaanitraromanova@gmail.com
Taras Shevchenko University of Kyiv, Faculty of Information Technologies Ukraine
http://orcid.org/0000-0003-1403-6322
Authors
Sergiy ToliupaTaras Shevchenko University of Kyiv, Faculty of Information Technologies Ukraine
http://orcid.org/0000-0002-1919-9174
Statistics
Abstract views: 206PDF downloads: 158
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.