• Title/Summary/Keyword: Covert communication

Search Result 25, Processing Time 0.024 seconds

Digital Forensics of Microsoft Office 2007-2013 Documents to Prevent Covert Communication

  • Fu, Zhangjie;Sun, Xingming;Xi, Jie
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.525-533
    • /
    • 2015
  • MS Office suit software is the most widely used electronic documents by a large number of users in the world, which has absolute predominance in office software market. MS Office 2007-2013 documents, which use new office open extensible markup language (OOXML) format, could be illegally used as cover mediums to transmit secret information by offenders, because they do not easily arouse others suspicion. This paper proposes nine forensic methods and an integrated forensic tool for OOXML format documents on the basis of researching the potential information hiding methods. The proposed forensic methods and tool cover three categories; document structure, document content, and document format. The aim is to prevent covert communication and provide security detection technology for electronic documents downloaded by users. The proposed methods can prevent the damage of secret information embedded by offenders. Extensive experiments based on real data set demonstrate the effectiveness of the proposed methods.

OFDM based mimicking dolphin whistle for covert underwater communications (OFDM 기반 돌고래 휘슬음 모방 수중 은밀 통신 기법)

  • Lee, Hojun;Ahn, Jongmin;Kim, Yongcheol;Seol, Seunghwan;Kim, Wanjin;Chung, Jaehak
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.3
    • /
    • pp.219-227
    • /
    • 2021
  • This paper proposed an Orthogonal Frequency Division Multiplexing (OFDM) based biomimetic communication method using a dolphin whistle which covertly transmits communication signals to allies. The proposed method divides the dolphin whistle into several time slots corresponding to a number of OFDM symbols, and modulates the communication signal by mapping differential phase shift keying (DPSK) symbols into subcarriers that have the frequency bands of the dolphin whistle in each slot. The advantages of the proposed method are as follows: In the conventional Chirp Spread Spectrum (CSS) and Frequency Shift Keying (FSK) based biomimetic communication methods, the discontinuity of the frequency contour is large, but the proposed method can reduce the discontinuity. Even if the modulation order is increased, the degradation of the mimicking performance is small. The computer simulations demonstrate that the Bit Error Rate (BER) and mimicking performance of the proposed method are better performance than those of the conventional CSS and FSK.

Detection Performance Analysis of Underwater Vehicles by Long-Range Underwater Acoustic Communication Signals (장거리 수중 음향 통신 신호에 의한 수중 운동체 피탐지 성능 분석)

  • Hyung-Moon, Kim;Jong-min, Ahn;In-Soo, Kim;Wan-Jin, Kim
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.4
    • /
    • pp.11-22
    • /
    • 2022
  • Unlike a short-range, a long-range underwater acoustic communication(UWAC) uses low frequency signal and deep sound channel to minimize propagation loss. In this case, even though communication signals are modulated using a covert transmission technique such as spread spectrum, it is hard to conceal the existence of the signals. The unconcealed communication signal can be utilized as active sonar signal by enemy and presence of underwater vehicles may be exposed to the interceptor. Since it is very important to maintain stealthiness for underwater vehicles, the detection probability of friendly underwater vehicles should be considered when interceptor utilizes our long-range UWAC signal. In this paper, we modeled a long-range UWAC environment for analyzing the detection performance of underwater vehicles and proposed the region of interest(ROI) setup method and the measurement of detection performance. By computer simulations, we yielded parameters, analyzed the detection probability and the detection performance in ROI. The analysis results showed that the proposed detection performance analysis method for underwater vehicles could play an important role in the operation of long-range UWAC equipment.

Perception of Electronic News Media of Pakistan in the Digital Age

  • Saeed, Muzammil;Farooq, Tayyab;Khan, Muazam Ali;Mahmood, Nasir
    • Asian Journal for Public Opinion Research
    • /
    • v.9 no.3
    • /
    • pp.293-306
    • /
    • 2021
  • The news and views of Pakistani television channels are extensively shared on digital media for information or analysis where the general public discusses overt and covert agendas by mentioning their factual and presentational style. This study contributes to the contemporary studies of media perception through focus group interviews with 72 randomly selected master's and bachelor's students studying Media and Communication at the School of Media and Communication Studies, University of Management and Technology, Lahore, Pakistan to provide information about the feelings and observations of future journalists and media literates. In summary, the findings of our research exposed the negative perception of Pakistani electronic media among the participants due to what they perceived as biased, inaccurate, and unethical reporting.

A Steganography-Based Covert Communication Method in Roblox Metaverse Environment (로블록스 메타버스 환경에서의스테가노그래피기반은닉통신기법)

  • Dokyung Yun;Youngho Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.45-50
    • /
    • 2023
  • Roblox, the world's No. 1 metaverse platform, has more than 3 billion subscription accounts and more than 150 millionmonthly active users (MAU). Despite such high interest in metaverse, existing studies on analyzing the risk of cyberattacks and security in the metaverse environment is insufficient. Therefore, in this paper, we propose a new steganography-basedcovert communication method in Roblox. In our proposed method, a secret message is hidden into an image by using a function provided in the Roblox Experience environment and then the image is automatically stored in the RobloxExperience participants' devices (PC or Smartphone) so that a malicious software can extract the hidden message fromthe image. By our experiments in the Roblox metaverse environment, we validated our proposed method works and thus want to inform our proposed method can be used in various cyberattacks and crimes such as the spread of secret commands, the establishment of a steganography botnet, and the mass distribution of malicious malware in metaverse platforms.

A Conceptual Study on the Development of Intelligent Detection Model for the anonymous Communication bypassing the Cyber Defense System (사이버 방어체계를 우회하는 익명통신의 지능형 탐지모델개발을 위한 개념연구)

  • Jung, Ui Seob;Kim, Jae Hyun;Jeong, Chan Ki
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.77-85
    • /
    • 2019
  • As the Internet continues to evolve, cyber attacks are becoming more precise and covert. Anonymous communication, which is used to protect personal privacy, is also being used for cyber attacks. Not only it hides the attacker's IP address but also encrypts traffic, which allows users to bypass the information protection system that most organizations and institutions are using to defend cyber attacks. For this reason, anonymous communication can be used as a means of attacking malicious code or for downloading additional malware. Therefore, this study aims to suggest a method to detect and block encrypted anonymous communication as quickly as possible through artificial intelligence. Furthermore, it will be applied to the defense to detect malicious communication and contribute to preventing the leakage of important data and cyber attacks.

Developing an Embedded Method to Recognize Human Pilot Intentions In an Intelligent Cockpit Aids for the Pilot Decision Support System

  • Cha, U-Chang
    • Journal of the Ergonomics Society of Korea
    • /
    • v.17 no.3
    • /
    • pp.23-39
    • /
    • 1998
  • Several recent aircraft accidents occurred due to goal conflicts between human and machine actors. To facilitate the management of the cockpit activities considering these observations. a computational aid. the Agenda Manager (AM) has been developed for use in simulated cockpit environments. It is important to know pilot intentions performing cockpit operations accurately to improve AM performance. Without accurate knowledge of pilot goals or intentions, the information from AM may lead to the wrong direction to the pilot who is using the information. To provide a reliable flight simulation environment regarding goal conflicts. a pilot goal communication method (GCM) was developed to facilitate accurate recognition of pilot goals. Embedded within AM, the GCM was used to recognize pilot goals and to declare them to the AM. Two approaches to the recognition of pilots goals were considered: (1) The use of an Automatic Speech Recognition (ASR) system to recognize overtly or explicitly declared pilot goals. and (2) inference of covertly or implicitly declared pilot goals via the use of an intent inferencing mechanism. The integrated mode of these two methods could overcome the covert goal mis-understanding by use of overt GCM. And also could it overcome workload concern with overt mode by the use of covert GCM. Through simulated flight environment experimentation with real pilot subjects, the proposed GCM has demonstrated its capability to recognize pilot intentions with a certain degree of accuracy and to handle incorrectly declared goals. and was validated in terms of subjective workload and pilot flight control performance. The GCM communicating pilot goals were implemented within the AM to provide a rich environment for the study of human-machine interactions in the supervisory control of complex dynamic systems.

  • PDF

A biomimetic communication method based on time shift using dolphin whistle (돌고래 휘슬을 이용한 지연시간 기반 생체 모방 통신 기법)

  • Lee, Hojun;Ahn, Jongmin;Kim, Yongcheol;Lee, Sangkug;Chung, Jaehak
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.5
    • /
    • pp.580-586
    • /
    • 2019
  • In this paper, we propose a biomimetic communication method using a dolphin whistle to covertly transmit the communication signal. A conventional CSS (Chirp Spread Spectrum) modulation technique divides dolphin whistle into several slots and modulates with up and down chirp signals. That causes the time-frequency characteristic difference between the original dolphin whistle and the camouflage performance is degraded. In this paper, we propose a delay based modulation scheme to eliminate distortions. The simulation results show that the bit error rate of the proposed method is better performance than that of the conventional CSS modulation method by about 3.5 dB to 8 dB. And the camouflage performance that evaluated through the cross correlation in the time-frequency domain is also better than that of the CSS modulation method.

A Modified Product Code Over ℤ4 in Steganography with Large Embedding Rate

  • Zhang, Lingyu;Chen, Deyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3353-3370
    • /
    • 2016
  • The way of combination of Product Perfect Codes (PPCs) is based on the theory of short codes constructing long codes. PPCs have larger embedding rate than Hamming codes by expending embedding columns in a coding block, and they have been proven to enhance the performance of the F5 steganographic method. In this paper, the proposed modified product codes called MPCs are introduced as an efficient way to embed more data than PPCs by increasing 2r2-1-r2 embedding columns. Unlike PPC, the generation of the check matrix H in MPC is random, and it is different from PPC. In addition a simple solving way of the linear algebraic equations is applied to figure out the problem of expending embedding columns or compensating cases. Furthermore, the MPCs over ℤ4 have been proposed to further enhance not only the performance but also the computation speed which reaches O(n1+σ). Finally, the proposed ℤ4-MPC intends to maximize the embedding rate with maintaining less distortion , and the performance surpasses the existing improved product perfect codes. The performance of large embedding rate should have the significance in the high-capacity of covert communication.

A Study on Novel Steganography Communication Technique based on Thumbnail Images in SNS Messenger Environment (SNS 메신저 환경에서의 썸네일 이미지 기반의 새로운 스테가노그래피 통신 기법 연구)

  • Yuk, Simun;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.151-162
    • /
    • 2021
  • Steganography is an advanced technique that hides secret messages by transforming them into subtle noise and spreading them within multimedia files such as images, video and audio. This technology has been exploited in a variety of espionage and cyber attacks. SNS messenger is an attractive SNS Service platform for sending and receiving multimedia files, which is the main medium of steganography. In this study, we proposed two noble steganography communication techniques that guarantee the complete reception rate through the use of thumbnail images in the SNS messenger environment. In addition, the feasibility was verified through implementation and testing of the proposed techniques in a real environment using KakaoTalk, a representative SNS messenger in south korea. By proposing new steganography methods in this study, we re-evaluate the risk of the steganography methods and promoted follow-up studies on the corresponding defense techniques.