TY - JOUR
T1 - Covert channel forensics on the internet
T2 - Issues, approaches, and experiences
AU - Patel, Ashish
AU - Shah, M.
AU - Chandramouli, Rajarathnam
AU - Subbalakshmi, Koduvayur P.
PY - 2007
Y1 - 2007
N2 - The exponential growth of the Internet (WWW in particular) has openedup several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding secret messages in digital data such as images using steganographic software tools is becoming easier. These digital images posted in publicWeb sites can then be downloaded at the receiver and the hidden messages may be extracted securely. To thwart covert channels on the Internet new types of search engines that can identify, detect and track these channels are necessary. Traditional search algorithms will fail to identify these channels. In this paper, we discuss various key issues involved in developing a stego (forensic)Web search engine. We also propose approaches to address some of these is-sues. Finally, we discuss a prototype forensic search engine that we developed called STEALTH and discuss in detail its architecture. Some experimental results are also reported.
AB - The exponential growth of the Internet (WWW in particular) has openedup several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding secret messages in digital data such as images using steganographic software tools is becoming easier. These digital images posted in publicWeb sites can then be downloaded at the receiver and the hidden messages may be extracted securely. To thwart covert channels on the Internet new types of search engines that can identify, detect and track these channels are necessary. Traditional search algorithms will fail to identify these channels. In this paper, we discuss various key issues involved in developing a stego (forensic)Web search engine. We also propose approaches to address some of these is-sues. Finally, we discuss a prototype forensic search engine that we developed called STEALTH and discuss in detail its architecture. Some experimental results are also reported.
KW - Forensics
KW - Multimedia
KW - Security
KW - Steganalysis
KW - Steganography
KW - Web search
UR - http://www.scopus.com/inward/record.url?scp=77955414848&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77955414848&partnerID=8YFLogxK
M3 - Article
AN - SCOPUS:77955414848
SN - 1816-353X
VL - 5
SP - 41
EP - 50
JO - International Journal of Network Security
JF - International Journal of Network Security
IS - 1
ER -