“The Good, The Bad and The Ugly”: Evaluation of Wi-Fi Steganography
JCM (Journal of Communications). Bd. 10. H. 10. Engineering and Technology Publishing 2015 S. 747 - 752
Erscheinungsjahr: 2015
ISBN/ISSN: 1796-2021
Publikationstyp: Zeitschriftenaufsatz
Sprache: Englisch
Doi/URN: 10.12720/jcm.10.10.747-752
Geprüft | Bibliothek |
Inhaltszusammenfassung
n this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of “the moving observer”. We considered three levels of undetectability named: “good”, “bad”, and “ugly”. To illustrate this method we chose Wi-Fi steganography as a solidfamily of information hiding protocols. We present the state of the art in this area covering well-known hiding techniques for 802.11 networks. “The moving observer” approach could help not only in the evaluat...n this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of “the moving observer”. We considered three levels of undetectability named: “good”, “bad”, and “ugly”. To illustrate this method we chose Wi-Fi steganography as a solidfamily of information hiding protocols. We present the state of the art in this area covering well-known hiding techniques for 802.11 networks. “The moving observer” approach could help not only in the evaluation of steganographic algorithms, but also might be a starting point fora new detection system of network steganography. The concept of a new detection system, called MoveSteg, is explained in detail.» weiterlesen» einklappen
Klassifikation
DFG Fachgebiet:
Informatik
DDC Sachgruppe:
Informatik