2015
DOI: 10.12720/jcm.10.10.747-752
|View full text |Cite
|
Sign up to set email alerts
|

“The Good, The Bad and The Ugly”: Evaluation of Wi-Fi Steganography

Abstract: -In this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of "the moving observer". We considered three levels of undetectability named: "good", "bad", and "ugly". To illustrate this method we chose Wi-Fi steganography as a solid family of information hiding protocols. We present the state of the art in this area covering well-known hiding techniques for 802.11 networks. "The moving observer" approach could help not only in the evaluation of steganog… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…The generation mode of these additional constellation points can be controlled by a shared secret key. However, when the detector is near the sender, the regularity of dirty constellation may result in the poor resistance to some statistical detection [17].…”
Section: Introductionmentioning
confidence: 99%
“…The generation mode of these additional constellation points can be controlled by a shared secret key. However, when the detector is near the sender, the regularity of dirty constellation may result in the poor resistance to some statistical detection [17].…”
Section: Introductionmentioning
confidence: 99%
“…The research shows that Facebook algorithms are efficient in the detection of steganography known so far, in particular for hidden information of greater size. In [11], a way of evaluation of network steganography techniques was proposed in three categories of undetectability: good, bad and ugly. The presented classification manner may be applied to other steganographic methods.…”
Section: Discussionmentioning
confidence: 99%
“…As it has been stated before, this transformation is a result of paths traced by the OSPF routing protocol. The nodes collecting data on packet delays will be nodes number 1,6,7,3,9,15,21,20,19,18,34,28,29 (the selected nodes create three "walls" between node 0 and 35 in the topology diagram). LACK will be the steganographic method used.…”
Section: B Manhattan-type Topologymentioning
confidence: 99%