Abstract
A wireless sensor network (WSN) typically consists of base stations and a large number of wireless sensors. The sensory data gathered from the whole network at a certain time snapshot can be visualized as an image. As a result, information hiding techniques can be applied to this “sensory data image”. Steganography refers to the technology of hiding data into digital media without drawing any suspicion, while steganalysis is the art of detecting the presence of steganography. This article provides a brief review of steganography and steganalysis applications for wireless sensor networks (WSNs). Then we show that the steganographic techniques are both related to sensed data authentication in wireless sensor networks, and when considering the attacker point of view, which has not yet been investigated in the literature. Our simulation results show that the sink level is unable to detect an attack carried out by the nsF5 algorithm on sensed data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hiding, I.: Steganography and Watermarking-Attacks and Countermeasures. Kluwer Academic Publishers, Norwell, MA, USA (2001)
Bahi, J., Couchot, J.-F., Guyeux, C.: Steganography: a class of secure and robust algorithms. The Computer Journal 55(6), 653–666 (2012)
Bahi, J., Guyeux, C., Makhoul, A., Pham, C.: Low cost monitoring and intruders detection using wireless video sensor networks. International Journal of Distributed Sensor Networks, 11 p. (2012)
Chanu, Y.J., Singh, K.M., Tuithung, T.: Image steganography and steganalysis: A survey. International Journal of Computer Applications, Published by Foundation of Computer Science 52(2), 1–11 (2012)
Chanu, Y.J., Tuithung, T., Singh, K.M.: A short survey on image steganography and steganalysis techniques. In: 2012 3rd National Conference on Emerging Trends and Applications in Computer Science (NCETACS) pp. 52–55 (2012)
Farid, H.: Detecting steganographic messages in digital images. Technical report, Hanover, NH, USA (2001)
Fridrich, J., Long, M.: Steganalysis of lsb encoding in color images. In: 2000 IEEE International Conference on Multimedia and Expo ICME 2000, vol. 3, pp. 1279–1282 (2000)
Fridrich, J., Goljan, M.: Practical steganalysis of digital images - state of the art. In: Proceedings of SPIE, pp. 1–13 (2002)
Fridrich, J., Pevný, T., Kodovský, J.: Statistically undetectable jpeg steganography: Dead ends challenges, and opportunities. In: Proceedings of the 9th Workshop on Multimedia & Security, MMSec 2007, pp. 3–14. ACM, New York (2007)
Gul, G., Kurugollu, F.: A new methodology in steganalysis: breaking highly undetectable steganograpy (hugo). In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 71–84. Springer, Heidelberg (2011)
Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2), 432–444 (2012)
Kodovský, J., Fridrich, J.: Calibration revisited. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, MMSec 2009, pp. 63–74. ACM, New York (2009)
Morkel, T., Eloff, J.H.P., Olivier, M.S.: An overview of image steganography. In: Labuschagne, L., Venter, H.S., Eloff, J.H.P., Eloff, M.M. (eds.) Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, Published electronically (2005)
Provos, N.: Defending against statistical steganalysis. In: Proceedings of the 10th Conference on USENIX Security Symposium - Vol. 10, SSYM 2001, pp. 24–24, Berkeley. USENIX Association (2001)
Westfeld, A.: Lecture Notes in Computer Science. In: Moskowitz, I.S. (ed.) F5a steganographic algorithm. Information Hiding, pp. 289–302. Springer, Berlin Heidelberg (2001)
Pfitzmann, A. (ed.): IH 1999. LNCS, vol. 1768. Springer, Heidelberg (2000)
Zhang, W., Liu, Y., Das, S.K., De, P.: Fast track article: Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach. Pervasive Mob. Comput. 4(5), 658–680 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Al-Sharif, R., Guyeux, C., Fadil, Y.A., Makhoul, A., Jaber, A. (2014). On the Usefulness of Information Hiding Techniques for Wireless Sensor Networks Security. In: Mitton, N., Gallais, A., Kantarci, M., Papavassiliou, S. (eds) Ad Hoc Networks. ADHOCNETS 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 140. Springer, Cham. https://doi.org/10.1007/978-3-319-13329-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-13329-4_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13328-7
Online ISBN: 978-3-319-13329-4
eBook Packages: Computer ScienceComputer Science (R0)