Abstract
The complexity of covert communication management is the main barrier towards the massive application of covert communication. In this paper, a protocol for autonomic covert communication is proposed to deal with the management complexity of covert communication system, and the environmental changes in the course of covert communication. Simulation results are provided to illustrate the self-star properties of the proposed scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Fridrich, J., Pevný, T., Kodovský, J.: Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: MM&Sec, pp. 3–14 (2007)
Fridrich, J., Kodovsk, J., Goljan, M., Holub, V.: Breaking HUGO: the Process Discovery. In: Information Hiding (to appear, 2011)
Fridrich, J., Kodovsk, V., Holub, M.: Steganalysis of content-adaptive steganography in spatial domain. In: 13th Information Hiding Conference, Prague, Czech Republic, May 18-20 (2011)
Provos, N., Honeyman, P.: Hide and Seek: An Introduction to Steganography. IEEE Security & Privacy, 32–44 (2003)
Ker, A.D.: Steganalysis of LSB Matching in Grayscale Images. IEEE Signal Processing Letters 12(6), 441–444 (2005)
Ker, A.D.: Resampling and the Detection of LSB Matching in Color Bitmaps. In: Security, Steganography, and Watermarking of Multimedia Contents, pp. 1–15 (2005)
Harmsen, J.J., Bowers, K.D., Pearlman, W.A.: Fast Additive Noise Steganalysis. In: Security, Steganography, and Watermarking of Multimedia Contents, pp. 489–495 (2004)
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003)
Ker, A.D.: Batch steganography and pooled steganalysis. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 265–281. Springer, Heidelberg (2007)
Trivedi, S., Chandramouli, R.: Active steganalysis of sequential steganography. In: Delp III, E.J., Wong, P.W. (eds.) Proc. of SPIE Security and Watermarking of Multimedia Contents, vol. 5020, pp. 123–130 (2003)
Ker, A.D., Pevný, T.: A new paradigm for steganalysis via clustering. In: Proc. SPIE Media Watermarking, Security, and Forensics XIII, vol. 7880, pp. 0U01-0U13. SPIE, CA (2011)
Wu, S.-Z., Zhang, X.P., Wei-Ming, Z.: Recent Advances in Image-Based Steganalysis Research. Chinese Journal of Computers 32(7), 1247–1263 (2009)
Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010)
Fridrich, J., Filler, T.: Practical Methods for Minimizing Embedding Impact Steganography. In: Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, vol. 6505, pp. 2–3 (2007)
Fridrich, J., Goljan, M., Soukal, D.: Wet paper codes with improved embedding efficiency. IEEE Transactions on Information Forensics and Security, 102–110 (2006)
Fridrich, J., Goljan, M., Lisonek, P., Soukal, D.: Writing on wet paper. In: Security, Steganography, and Watermarking of Multimedia Contents, pp. 328–340 (2005)
Filler, T., Judas, J., Fridrich, J.: Minimizing embedding impact in steganography using trellis-coded quantization. In: Media Forensics and Security (2010)
Filler, T., Fridrich, J.: Gibbs Construction in Steganography. IEEE Trans. on Info. Forensics and Security 5(4), 705–720 (2010)
Filler, T., Judas, J., Fridrich, J.: Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes. In: Media Forensics and Security (to appear, 2011)
Simmons, G.J.: The Prisoners’ Problem and the Subliminal Channel. In: CRYPTO 1983, pp. 51–67 (1983)
Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)
Chandramouli, R., Memon, N.: Steganography Capacity: A Steganalysis Perspective. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, Santa Clara, CA, USA, vol. 5020, pp. 173–177 (2003)
Tizghadam, A., Leon-Garcia, A.: AORTA: Autonomic Network Control and Management System. In: IEEE Conference on Computer Communications Workshops, INFOCOM, pp. 1–4 (2008)
Kephart, J.O., Chess, D.M.: The Vision of Autonomic Computing. IEEE Computer, 41–50 (2003)
Morkel, T., Eloff, J., Olivier, M.: An Overview of Image Steganography. In: Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA 2005), Sandton, South Africa (2005)
Westfeld, A.: F5-A steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Filler, T.: Pevný, T, Bas, P.: BOSS (July 2010), http://boss.gipsa-lab.grenobleinp.fr/BOSSRank/
Jelger, C., Tschudin, C.F., Schmid, S., Leduc, G.: Basic Abstractions for an Autonomic Network Architecture. In: WOWMOM, pp. 1–6 (2007)
Mortier, R., Kiciman, E.: Autonomic network management: some pragmatic considerations. In: Proceedings of the 2006 SIGCOMM Workshop on internet Network Management, INM 2006, Pisa, Italy, September 11 - 15, pp. 89–93. ACM Press, New York (2006)
Kurose, J., Ross, K.: Computer Networking: A top-down approach 4e. Addison-Wesley, Reading (2007)
Waldspurger, C.A., Weihl, W.E.: Lottery Scheduling: Flexible Proportional-Share Resource Management. In: Proc. OSDI, pp. 1–11 (1994)
Wanqi, L.: A Network-Flow-Based Method for Embedding Rectification (to appear)
Wanqi, L.: Defensive Steganography: A Novel Way against Steganalysis (to appear)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, W., He, G. (2011). Towards a Protocol for Autonomic Covert Communication. In: Calero, J.M.A., Yang, L.T., Mármol, F.G., GarcÃa Villalba, L.J., Li, A.X., Wang, Y. (eds) Autonomic and Trusted Computing. ATC 2011. Lecture Notes in Computer Science, vol 6906. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23496-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-23496-5_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23495-8
Online ISBN: 978-3-642-23496-5
eBook Packages: Computer ScienceComputer Science (R0)