Share Email Print

Proceedings Paper

WLAN steganography revisited
Author(s): Christian Kraetzer; Jana Dittmann; Ronny Merkel
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Two different approaches for using a sequence of packets of the IEEE 802.11 (WLAN) protocol as cover for a stenographic communication can be found in literature: in 2003 Krzysztof Szczypiorski introduced a method constructing a hidden channel using deliberately corrupted WLAN packets for communication. In 2006 Kraetzer et al. introduced a WLAN stenography approach that works without generating corrupted network packets. This later approach, with hidden storage channel scenario (SCI) and the timing channel based scenario (SCII), is reconsidered here. Fixed parameter settings limiting SCIs capabilities in the implementation (already introduced in 2006) motivated an enhancement. The new implementation of SCI increases the capacity, while at the same time improving the reliability and decreasing the detectability in comparison to the work described in 2006. The timing channel based approach SCII from 2006 is in this paper substituted by a completely new design based on the usage of WLAN Access Point addresses for the synchronization and payload transmission. This new design now allows a comprehensive practical evaluation of the implementation and the evaluations of the scheme, which was not possible with the original SCII before. The test results for both enhanced approaches are summarised and compared in terms of detectability, capacity and reliability.

Paper Details

Date Published: 18 March 2008
PDF: 17 pages
Proc. SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 681903 (18 March 2008); doi: 10.1117/12.764557
Show Author Affiliations
Christian Kraetzer, Otto-von-Guericke-Univ. Magdeburg (Germany)
Jana Dittmann, Otto-von-Guericke-Univ. Magdeburg (Germany)
Ronny Merkel, Otto-von-Guericke-Univ. Magdeburg (Germany)

Published in SPIE Proceedings Vol. 6819:
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
Edward J. Delp III; Ping Wah Wong; Jana Dittmann; Nasir D. Memon, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?