ThermoSteg-Covert Channel for Microbolometer Thermographic Cameras

被引:0
|
作者
Sawicki, Krzysztof [1 ]
Bieszczad, Grzegorz [1 ]
Sosnowski, Tomasz [1 ]
机构
[1] Mil Univ Technol, Inst Optoelect, PL-00908 Warsaw, Poland
关键词
steganography; hardware security; thermography; covert channel; thermal cameras; EXFILTRATING DATA;
D O I
10.3390/s21196395
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The article presents a new concept-steganography in thermography. Steganography is a technique of hiding information in a non-obvious way and belongs to sciences related to information security. The proposed method, called ThermoSteg, uses a modification of one of the parameters of the thermal imaging camera-integration time-to embed the signal containing hidden information. Integration time changing makes the microbolometer array heat up while reading the sensors. The covert information can be extracted from the stream of thermograms recorded by another thermal camera that observes the first one. The covert channel created with the ThermoSteg method allows the transmission of covert data using a thermal sensor as a wireless data transmitter. This article describes a physical phenomenon that is exploited by the ThermoSteg method and two proposed methods of covert data extraction, and presents the results of experiments.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Covert communication with noise and channel uncertainties
    Hien Q. Ta
    Quoc-Viet Pham
    Khuong Ho-Van
    Sang W. Kim
    Wireless Networks, 2022, 28 : 161 - 172
  • [42] Covert channel for improving VoIP security
    Mazurczyk, Wojciech
    Kotulski, Zbigniew
    ADVANCES IN INFORMATION PROCESSING AND PROTECTION, 2007, : 271 - +
  • [43] Practical overview of a Xen covert channel
    Salauen, Mickael
    JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2010, 6 (04): : 317 - 328
  • [44] A sequential distinguisher for covert channel identification
    Subbalakshmi, K.P.
    Chandramouli, Rajarathnam
    Ranganathan, Nagarajan
    International Journal of Network Security, 2007, 5 (03) : 274 - 282
  • [46] Covert Channel For Local Area Network
    Ji, Liping
    Fan, Yu
    Ma, Chuan
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 316 - 319
  • [47] An assessment of VoIP covert channel threats
    Takahashi, Takehiro
    Lee, Wenke
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 371 - +
  • [48] Creating Covert Channel Using SIP
    Mehic, Miralem
    Mikulec, Martin
    Voznak, Miroslav
    Kapicak, Lukas
    MULTIMEDIA COMMUNICATIONS, SERVICES AND SECURITY, MCSS 2014, 2014, 429 : 182 - 192
  • [49] The covert channel over HTTP protocol
    Graniszewski, Waldemar
    Krupski, Jacek
    Szczypiorski, Krzysztof
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2016, 2016, 10031
  • [50] Traffic Normalization for Covert Channel Protecting
    Frolova, Daria
    Kogos, Konstsntin
    Epishkina, Anna
    PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS), 2021, : 2330 - 2333