STEGANOGRAPHY AS A MEANS OF ATTACKING INFORMATION SYSTEMS
Authors: Anna Romanova, Sergiy Toliupa
Affiliation: Taras Shevchenko University of Kyiv, Faculty of Information Technology, Taras Shevchenko University of Kyiv, Faculty of Information Technology
Keywords: steganography, TEMPEST, covert channel, information protection
ABSTRACT. An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented
Alexandre Miguel Ferreira: An Overview on Hiding and Detecting Stego-data in Video Streams. University of Amsterdam, System & Network Engineering – Research Project II, March 23 2015.
Konakhovich G. F., Puzyrenko A. Yu.: Computer steganography. Theory and practice with Mathcad (Rus). MK-Press Kyiv, Ukraine 2006
Fridrich, jessica, M. Goljan, D. Soukal: Searching for the Stego Key. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI 2004 (pdf): http://www.ws.binghamton.edu/fridrich/Research/Keysearch_SPIE.pdf.
Christopher League: An overview of digital steganography, particularly within images, for the computationally curious. Long Island University 2015: https://www.youtube.com/watch?v=- 7FBPgQDX5o.
Secret Code in Color Printers Lets Government Track You; Tiny Dots Show Where and When You Made Your Print. Electronic Frontier Foundation October 2005: https://www.eff.org/press/archives/2005/10/16.
Echo Data Hiding (html): http://www.slidefinder.net/a/audio_steganography_echo_data_hiding/24367218.
Akbas E. Ali: A New Text Steganography Method by Using Non-Printing Unicode Characters. Eng& Tech. Journal, 28 (1) 2010 (pdf): http://www.uotechnology.edu.iq/tec_magaz/volume282010/No.1.2010/researches/Text%287%29.pdf.
Anna Romanova, Sergiy Toliupa: Perspective steganographic solutions and their application. Proceedings of the VII Inter University Conference „Engineer of XXI Century” at the University of Bielsko-Biala (ATH), December 08, 2017, Bielsko-Biala, Poland. Volume 2 – p 269-278
M.G. Kuhn, R. Anderson: Soft Tempest: Hidden data transmission using electromagnetic emanations. University of Cambridge, Computer Laboratory, New Museum Site, 1998 (pdf): https://www.cl.cam.ac.uk/~mgk25/ih98-tempest.pdf.
D. Genkin, A. Shamir, E. Tromer: RSA key extraction via low-bandwidth acoustic cryptoanalysis.Tel Aviv University, December 18, 2013 (pdf): http://www.cs.tau.ac.il/~tromer/papers/acoustic-20131218.pdf.