Abstract
Unlike subliminal or steganographic channels, a supraliminal channel encodes information in the semantic content of cover data, generating innocent communication in a manner similar to mimic functions. These low-bitrate channels are robust to active wardens, and can be used with subliminal channels to achieve steganographic public key exchange. Automated generation of innocent-looking content, however, remains a difficult problem.
Apple’s iChat, a popular instant-messaging client and the default client on the Macintosh operating system, includes a video chat facility that allows the user to apply special effects such as replacing the user’s background with a video file. We show how this can be used to implement a high-bitrate supraliminal channel, by embedding a computer animation engineered to communicate ciphertext by its pseudo-random behavior.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Craver, S.: On public-key steganography in the presence of an active warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 355–368. Springer, Heidelberg (1998)
Wayner, P.: Disappearing Cryptography: Information Hiding: Steganography & Watermarking, 2nd edn. Morgan Kaufmann, San Francisco (2002)
Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE Journal of Selected Areas in Communications 16(4), 474–481 (1998)
Giffin, J., Greenstadt, R., Litwack, P.: Covert messaging through TCP timestamps. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 194–208. Springer, Heidelberg (2003)
Inoue, D., Matsumoto, T.: Scheme of standard MIDI files steganography and its evaluation. In: SPIE Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 194–205 (2002)
Szopa, A.S.: New steganography innovation from ciphile software. talk.politics.crypto (August 2001) 3B894FCE.FC4B729E@ciphile.com
NetApplications.com: Operating system market share for January (2008), http://marketshare.hitslink.com/report.aspx?qprid=8
Mitnick, K., Simon, W.: The Art of Deception: Controlling the Human Element of Security. John Wiley & Sons, Chichester (2002)
Tcl programming, http://en.wikibooks.org/wiki/Tcl_Programming/Print_version
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Craver, S., Li, E., Yu, J., Atakli, I. (2008). A Supraliminal Channel in a Videoconferencing Application. In: Solanki, K., Sullivan, K., Madhow, U. (eds) Information Hiding. IH 2008. Lecture Notes in Computer Science, vol 5284. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88961-8_20
Download citation
DOI: https://doi.org/10.1007/978-3-540-88961-8_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88960-1
Online ISBN: 978-3-540-88961-8
eBook Packages: Computer ScienceComputer Science (R0)