ThermoSteg-Covert Channel for Microbolometer Thermographic Cameras

被引:0
|
作者
Sawicki, Krzysztof [1 ]
Bieszczad, Grzegorz [1 ]
Sosnowski, Tomasz [1 ]
机构
[1] Mil Univ Technol, Inst Optoelect, PL-00908 Warsaw, Poland
关键词
steganography; hardware security; thermography; covert channel; thermal cameras; EXFILTRATING DATA;
D O I
10.3390/s21196395
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The article presents a new concept-steganography in thermography. Steganography is a technique of hiding information in a non-obvious way and belongs to sciences related to information security. The proposed method, called ThermoSteg, uses a modification of one of the parameters of the thermal imaging camera-integration time-to embed the signal containing hidden information. Integration time changing makes the microbolometer array heat up while reading the sensors. The covert information can be extracted from the stream of thermograms recorded by another thermal camera that observes the first one. The covert channel created with the ThermoSteg method allows the transmission of covert data using a thermal sensor as a wireless data transmitter. This article describes a physical phenomenon that is exploited by the ThermoSteg method and two proposed methods of covert data extraction, and presents the results of experiments.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] A new covert channel in WIFI networks
    Frikha, L.
    Trabelsi, Z.
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 255 - 260
  • [32] A Covert Queueing Channel in FCFS Schedulers
    Ghassami, AmirEmad
    Kiyavash, Negar
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) : 1551 - 1563
  • [33] Integrated criteria for covert channel auditing
    Chang-da Wang
    Shi-guang Ju
    Journal of Zhejiang University-SCIENCE A, 2008, 9 : 737 - 743
  • [34] Integrated criteria for covert channel auditing
    Wang, Chang-da
    Ju, Shi-guang
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A, 2008, 9 (06): : 737 - 743
  • [35] Covert Channel Attacks in Pervasive Computing
    Tuptuk, Nilufer
    Hailes, Stephen
    2015 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2015, : 236 - 242
  • [36] A completely covert audio channel in Android
    Thakur S.
    Stamp M.
    Stamp, Mark (mark.stamp@sjsu.edu), 1600, Springer-Verlag France (13) : 141 - 152
  • [37] WLAN Covert Timing Channel Detection
    Zhao, Hong
    Chen, Minxiou
    2015 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2015,
  • [38] Covert Communication With Incumbent Channel Activities
    Ding, Haichuan
    An, Jianping
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2025, 14 (01) : 3 - 7
  • [39] An Autonomic and Permissionless Android Covert Channel
    Block, Kenneth
    Narain, Sashank
    Noubir, Guevara
    PROCEEDINGS OF THE 10TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 2017), 2017, : 184 - 194
  • [40] Constructing The On/Off Covert Channel On Xen
    Xia Yetian
    Zi Xiaochao
    Yao Lihong
    Pan Li
    Li Jianhua
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 568 - 572