Skip to main content

Steganography for Radio Amateurs— A DSSS Based Approach for Slow Scan Television

  • Conference paper
Information Hiding (IH 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4437))

Included in the following conference series:

Abstract

In 2005, Germany introduced a new Amateur Radio Ordinance prohibiting encrypted radio traffic at home. Crypto-bans can be circumvented using steganography. However, present steganographic methods are not eligible because the embedded message will not survive the usual distortions in a radio transmission. Robust as current watermarking methods are, they leave clearly detectable traces and have a smaller capacity.

This paper presents measures that improve the robustness of steganographic communication with respect to non-intentional, random channel errors and validates their effectiveness by simulation. For the scenario of a radio communication, we determine practicable parameters for least detectability under six different short wave conditions. The resulting method embeds messages with a length of up to 118 bytes in a narrow-band Slow Scan Television connection in Martin-M1 mode.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. International Telephone and Telegraph Consultative Committee (CCITT): Implementing order for the radio regulations (German designation: VO Funk) (1982)

    Google Scholar 

  2. German Federal Ministry of Economics and Labour: Ordinance concerning the Amateur Radio Act (German designation: AFuV) (2005), Online available at http://bundesrecht.juris.de/bundesrecht/afuv_2005/gesamt.pdf

  3. Tachibana, R., Shimizu, S., Nakamura, T., Kobayashi, S.: An audio watermarking method robust against time- and frequency-fluctuation. In: Delp, E.J., Wong, P.W., (eds.) Security, Steganography and Watermarking of Multimedia Contents III (Proc. of SPIE), San Jose, CA, pp. 104–115 (2001)

    Google Scholar 

  4. van der Veen, M., Bruekers, F., Haitsma, J., Klaker, T., Lemma, A.N., Oomen, W.: Robust multi-functional and high-quality audio watermarking technology. In: 110th Audio Engineering Society Convention. Volume Convention Paper 5345 (2001)

    Google Scholar 

  5. Kirovski, D., Malvar, H.S.: Spread-spectrum watermarking of audio signals. IEEE Trans. on Signal Processing 51, 1020–1033 (2003)

    Article  MathSciNet  Google Scholar 

  6. Steinebach, M., Petitcolas, F., Raynal, F., Dittmann, J., Fontaine, C., Seibel, S., Fates, N., Ferri, L.: StirMark benchmark: audio watermarking attacks. In: International Conference on Information Technology: Coding and Computing, pp.49–54 (2001)

    Google Scholar 

  7. Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Transactions on Image Processing 8, 1075–1083 (1999)

    Article  Google Scholar 

  8. Pickholtz, R.L., Schilling, D.L., Milstein, L.B.: Theory of spread-spectrum communications—a tutorial. IEEE Transactions on Communications 30, 855–884 (1982)

    Article  Google Scholar 

  9. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 219–239. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  10. R Development Core Team: R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria (2005), Online available at http://www.R-project.org ISBN 3-900051-07-0

  11. CCIR: Recommendation 520-1, Use of high frequency ionospheric channel simulators. Recommendations of the CCIR III, pp. 57–58 (1990)

    Google Scholar 

  12. Watterson, C.C., Juroshek, J.R., Bensema, W.D.: Experimental confirmation of an HF channel model. IEEE Transactions on Communication Technology 18, 792–803 (1970)

    Article  Google Scholar 

  13. Forrer, J.B.: A low-cost HF channel simulator for testing and evaluating HF digital systems. In: Proceedings of the 18th ARRL and TAPR. Digital Communications Conference, Phoenix, Arizona (1999), http://www.tapr.org/pub_dcc18.html

    Google Scholar 

  14. Eleftheriou, E., Falconer, D.D.: Adaptive equalization techniques for HF channels. IEEE Journal on Selected Areas in Communications 5, 238–247 (1987)

    Article  Google Scholar 

  15. Furman, W.N., Nieto, J.W.: Understanding HF channel simulator requirements in order to reduce HF modem performance measurement variability. In: Proceedings of HF01, the Nordic HF Conference, Fårö, Sweden (2001), Online available at http://www.nordichf.org/index.htm?forms/cdrom.htm&2

  16. Wumpus: Einige SSTV-Modi (1997), Online available at http://home.snafu.de/wumpus/sstvmod.htm

  17. Maes, J.: QSSTV (2005), Online available at http://users.telenet.be/on4qz/qsstv/

  18. Rappaport, T.S.: Wireless Communications: Principles and Practice. IEEE Press, Piscataway (1996)

    Google Scholar 

  19. Couch II, L.W.: Digital and Analog Communication Systems. Prentice Hall, Upper Saddle River (2001)

    Google Scholar 

  20. Walma, M.: BCJR turbo code encoder/decoder (1998), Online available at http://cvs.berlios.de/cgi-bin/viewcvs.cgi/ofdm/soundmodem/newqpsk/turbo.c?rev=HEAD

  21. Saucedo, R., Schiring, E.E.: Introduction to Continuous and Digital Control Systems. Macmillan, New York (1968)

    Google Scholar 

  22. Lee, E.A., Messerschmitt, D.G.: Digital Communications. Kluwer Academic Publishers, Boston (1994)

    Google Scholar 

  23. Maes, M.: Twin Peaks: The histogram attack to fixed depth image watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 290–305. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jan L. Camenisch Christian S. Collberg Neil F. Johnson Phil Sallee

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Westfeld, A. (2007). Steganography for Radio Amateurs— A DSSS Based Approach for Slow Scan Television. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds) Information Hiding. IH 2006. Lecture Notes in Computer Science, vol 4437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74124-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74124-4_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74123-7

  • Online ISBN: 978-3-540-74124-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics