STEGANOGRAPHY METHODS USED IN ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS

Anna Romanova

anitraromanova@gmail.com
Taras Shevchenko University of Kyiv, Faculty of Information Technologies (Ukraine)
http://orcid.org/0000-0003-1403-6322

Sergiy Toliupa


Taras Shevchenko University of Kyiv, Faculty of Information Technologies (Ukraine)
http://orcid.org/0000-0002-1919-9174

Abstract

An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented.


Keywords:

steganography, TEMPEST, covert channel, information protection

Agranovskiy A. V., Balakin A. V., Gribunin V. G., Sapozhnikov S. A.: Steganografiya, tsifrovyye vodyanyye znaki i steganoanaliz. Vuzovskaya kniga, Moscow 2009.
  Google Scholar

Ali A. E.: A New Text Steganography Method by Using Non-Printing Unicode Characters. Eng& Tech. Journal 28 (1), 2010, 72–83.
  Google Scholar

Chekhovskyy S.: Sovremennye metody skrytoy peredachy ynformatsyy putem prohrammnoho upravlenyya yzluchenyem kompʹyutery. Pravove, normatyvne ta metrolohichne zabezpechennya systemy zakhystu informatsiyi v Ukrayini. 2003.
  Google Scholar

Echo Data Hiding (html): http://www.slidefinder.net/a/audio_steganography_echo_data_hiding/24367218.
  Google Scholar

Ferreira A. M.: An Overview on Hiding and Detecting Stego-data in Video Streams. University of Amsterdam. System & Network Engineering – Research Project II, 2015.
  Google Scholar

Fridrich J., Goljan M., Soukal D.: Searching for the Stego Key. Proc. SPIE 5306, 2004 [doi: 10.1117/12.521353].
  Google Scholar

Genkin D., Shamir A., Tromer E.: RSA key extraction via low-bandwidth acoustic cryptoanalysis. Tel Aviv University. 2013.
  Google Scholar

Konakhovich G. F., Puzyrenko A. Yu.: Computer steganography. Theory and practice with Mathcad. MK-Press, Kyiv 2006.
  Google Scholar

Kuhn M. G., Anderson R.: Soft Tempest: Hidden data transmission using electromagnetic emanations. University of Cambridge, Computer Laboratory, New Museum Site, 1998.
  Google Scholar

League C.: An overview of digital steganography, particularly within images, for the computationally curious. Long Island University 2015: https://www.youtube.com/watch?v=-7FBPgQDX5o.
  Google Scholar

Romanova A., Toliupa S.: Perspective steganographic solutions and their application. Proceedings of the VII Inter University Conference Engineer of XXI Century, volume 2, 2017, 269–278.
  Google Scholar

Secret Code in Color Printers Lets Government Track You; Tiny Dots Show Where and When You Made Your Print. Electronic Frontier Foundation October 2005: https://www.eff.org/press/archives/2005/10/16.
  Google Scholar

Zorin Ye.Ye., Chichvarin N.V.: Steganografiya v SAPR. Uchebnoye posobiye. MGTU im. N.E. Baumana. Moscow.
  Google Scholar

Download


Published
2018-12-16

Cited by

Romanova, A., & Toliupa, S. (2018). STEGANOGRAPHY METHODS USED IN ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 8(4), 24–27. https://doi.org/10.5604/01.3001.0012.8021

Authors

Anna Romanova 
anitraromanova@gmail.com
Taras Shevchenko University of Kyiv, Faculty of Information Technologies Ukraine
http://orcid.org/0000-0003-1403-6322

Authors

Sergiy Toliupa 

Taras Shevchenko University of Kyiv, Faculty of Information Technologies Ukraine
http://orcid.org/0000-0002-1919-9174

Statistics

Abstract views: 177
PDF downloads: 133