Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

A Revised Taxonomy of Steganography Embedding Patterns

ARES 2021: The 16th International Conference on Availability, Reliability and Security. New York: ACM 2021 S. 1 - 12

Erscheinungsjahr: 2021

Publikationstyp: Buchbeitrag (Konferenzbeitrag)

Sprache: Englisch

Doi/URN: 10.1145/3465481.3470069

Volltext über DOI/URN

GeprüftBibliothek

Inhaltszusammenfassung


Steganography embraces several hiding techniques which spawn across multiple domains. However, the related terminology is not unified among the different domains, such as digital media steganography, text steganography, cyber-physical systems steganography, network steganography (network covert channels), local covert channels, and out-of-band covert channels. To cope with this, a prime attempt has been done in 2015, with the introduction of the so-called hiding patterns, which allow to descr...Steganography embraces several hiding techniques which spawn across multiple domains. However, the related terminology is not unified among the different domains, such as digital media steganography, text steganography, cyber-physical systems steganography, network steganography (network covert channels), local covert channels, and out-of-band covert channels. To cope with this, a prime attempt has been done in 2015, with the introduction of the so-called hiding patterns, which allow to describe hiding techniques in a more abstract manner. Despite significant enhancements, the main limitation of such a taxonomy is that it only considers the case of network steganography. Therefore, this paper reviews both the terminology and the taxonomy of hiding patterns as to make them more general. Specifically, hiding patterns are split into those that describe the embedding and the representation of hidden data within the cover object. As a first research action, we focus on embedding hiding patterns and we show how they can be applied to multiple domains of steganography instead of being limited to the network scenario. Additionally, we exemplify representation patterns using network steganography. Our pattern collection is available under https://patterns.ztt.hs-worms.de.» weiterlesen» einklappen

  • Network Steganography Covert Channels Terminology Taxonomy Information Hiding Science of Security Information Security Patterns PLML Cyber Security

Autoren


Caviglione, Luca (Autor)
Mazurczyk, Wojciech (Autor)
Mileva, Aleksandra (Autor)
Dittmann, Jana (Autor)
Krätzer, Christian (Autor)
Lamshöft, Kevin (Autor)
Vielhauer, Claus (Autor)
Keller, Jörg (Autor)
Neubert, Tom (Autor)

Klassifikation


DFG Fachgebiet:
Informatik

DDC Sachgruppe:
Informatik

Verbundene Forschungsprojekte


Verknüpfte Personen


Steffen Wendzel

Laura Hartmann