Abstract
In 2005, Germany introduced a new Amateur Radio Ordinance prohibiting encrypted radio traffic at home. Crypto-bans can be circumvented using steganography. However, present steganographic methods are not eligible because the embedded message will not survive the usual distortions in a radio transmission. Robust as current watermarking methods are, they leave clearly detectable traces and have a smaller capacity.
This paper presents measures that improve the robustness of steganographic communication with respect to non-intentional, random channel errors and validates their effectiveness by simulation. For the scenario of a radio communication, we determine practicable parameters for least detectability under six different short wave conditions. The resulting method embeds messages with a length of up to 118 bytes in a narrow-band Slow Scan Television connection in Martin-M1 mode.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
International Telephone and Telegraph Consultative Committee (CCITT): Implementing order for the radio regulations (German designation: VO Funk) (1982)
German Federal Ministry of Economics and Labour: Ordinance concerning the Amateur Radio Act (German designation: AFuV) (2005), Online available at http://bundesrecht.juris.de/bundesrecht/afuv_2005/gesamt.pdf
Tachibana, R., Shimizu, S., Nakamura, T., Kobayashi, S.: An audio watermarking method robust against time- and frequency-fluctuation. In: Delp, E.J., Wong, P.W., (eds.) Security, Steganography and Watermarking of Multimedia Contents III (Proc. of SPIE), San Jose, CA, pp. 104–115 (2001)
van der Veen, M., Bruekers, F., Haitsma, J., Klaker, T., Lemma, A.N., Oomen, W.: Robust multi-functional and high-quality audio watermarking technology. In: 110th Audio Engineering Society Convention. Volume Convention Paper 5345 (2001)
Kirovski, D., Malvar, H.S.: Spread-spectrum watermarking of audio signals. IEEE Trans. on Signal Processing 51, 1020–1033 (2003)
Steinebach, M., Petitcolas, F., Raynal, F., Dittmann, J., Fontaine, C., Seibel, S., Fates, N., Ferri, L.: StirMark benchmark: audio watermarking attacks. In: International Conference on Information Technology: Coding and Computing, pp.49–54 (2001)
Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Transactions on Image Processing 8, 1075–1083 (1999)
Pickholtz, R.L., Schilling, D.L., Milstein, L.B.: Theory of spread-spectrum communications—a tutorial. IEEE Transactions on Communications 30, 855–884 (1982)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 219–239. Springer, Heidelberg (1998)
R Development Core Team: R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria (2005), Online available at http://www.R-project.org ISBN 3-900051-07-0
CCIR: Recommendation 520-1, Use of high frequency ionospheric channel simulators. Recommendations of the CCIR III, pp. 57–58 (1990)
Watterson, C.C., Juroshek, J.R., Bensema, W.D.: Experimental confirmation of an HF channel model. IEEE Transactions on Communication Technology 18, 792–803 (1970)
Forrer, J.B.: A low-cost HF channel simulator for testing and evaluating HF digital systems. In: Proceedings of the 18th ARRL and TAPR. Digital Communications Conference, Phoenix, Arizona (1999), http://www.tapr.org/pub_dcc18.html
Eleftheriou, E., Falconer, D.D.: Adaptive equalization techniques for HF channels. IEEE Journal on Selected Areas in Communications 5, 238–247 (1987)
Furman, W.N., Nieto, J.W.: Understanding HF channel simulator requirements in order to reduce HF modem performance measurement variability. In: Proceedings of HF01, the Nordic HF Conference, Fårö, Sweden (2001), Online available at http://www.nordichf.org/index.htm?forms/cdrom.htm&2
Wumpus: Einige SSTV-Modi (1997), Online available at http://home.snafu.de/wumpus/sstvmod.htm
Maes, J.: QSSTV (2005), Online available at http://users.telenet.be/on4qz/qsstv/
Rappaport, T.S.: Wireless Communications: Principles and Practice. IEEE Press, Piscataway (1996)
Couch II, L.W.: Digital and Analog Communication Systems. Prentice Hall, Upper Saddle River (2001)
Walma, M.: BCJR turbo code encoder/decoder (1998), Online available at http://cvs.berlios.de/cgi-bin/viewcvs.cgi/ofdm/soundmodem/newqpsk/turbo.c?rev=HEAD
Saucedo, R., Schiring, E.E.: Introduction to Continuous and Digital Control Systems. Macmillan, New York (1968)
Lee, E.A., Messerschmitt, D.G.: Digital Communications. Kluwer Academic Publishers, Boston (1994)
Maes, M.: Twin Peaks: The histogram attack to fixed depth image watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 290–305. Springer, Heidelberg (1998)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Westfeld, A. (2007). Steganography for Radio Amateurs— A DSSS Based Approach for Slow Scan Television. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds) Information Hiding. IH 2006. Lecture Notes in Computer Science, vol 4437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74124-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-540-74124-4_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74123-7
Online ISBN: 978-3-540-74124-4
eBook Packages: Computer ScienceComputer Science (R0)