Skip to main content

Behavioral Security in Covert Communication Systems

  • Conference paper
  • First Online:
Digital Forensics and Watermarking (IWDW 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12022))

Included in the following conference series:

Abstract

The purpose of the covert communication system is to implement the communication process without causing third party perception. In order to achieve complete covert communication, two aspects of security issues need to be considered. The first one is to cover up the existence of information, that is, to ensure the content security of information; the second one is to cover up the behavior of transmitting information, that is, to ensure the behavioral security of communication. However, most of the existing information hiding models are based on the “Prisoners’ Model”, which only considers the content security of carriers, while ignoring the behavioral security of the sender and receiver. We think that this is incomplete for the security of covert communication. In this paper, we propose a new covert communication framework, which considers both content security and behavioral security in the process of information transmission. In the experimental part, we analyzed a large amount of collected real Twitter data to illustrate the security risks that may be brought to covert communication if we only consider content security and neglect behavioral security. Finally, we designed a toy experiment, pointing out that in addition to most of the existing content steganography, under the proposed new framework of covert communication, we can also use user’s behavior to implement behavioral steganography. We hope this new proposed framework will help researchers to design better covert communication systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shannon, C.E.: Communication theory of secrecy systems. Bell Labs Tech. J. 28(4), 656–715 (1949)

    Article  MathSciNet  Google Scholar 

  2. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  3. Beller, M.J., Chang, L.-F., Yacobi, Y.: Privacy and authentication on a portable communications system. IEEE J. Sel. Areas Commun. 11(6), 821–829 (1993)

    Article  Google Scholar 

  4. Simmons, G.J.: The prisoners’ problem and the subliminal channel. In: Chaum, D. (ed.) Advances in Cryptology, pp. 51–67. Springer, Boston (1984)

    Chapter  Google Scholar 

  5. Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, New York (2009)

    Book  Google Scholar 

  6. Yang, Z., Du, X., Tan, Y., Huang, Y., Zhang, Y.-J.: AAG-stega: automatic audio generation-based steganography. arXiv preprint arXiv:1809.03463 (2018)

  7. Yang, Z.-L., Guo, X.-Q., Chen, Z.-M., Huang, Y.-F., Zhang, Y.-J.: RNN-stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280–1295 (2019)

    Article  Google Scholar 

  8. Yang, Z., Peng, X., Huang, Y.: A sudoku matrix-based method of pitch period steganography in low-rate speech coding. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) SecureComm 2017. LNICST, vol. 238, pp. 752–762. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78813-5_40

    Chapter  Google Scholar 

  9. Yang, Z., Wei, N., Sheng, J., Huang, Y., Zhang, Y.-J.: TS-CNN: text steganalysis from semantic space based on convolutional neural network. arXiv preprint arXiv:1810.08136 (2018)

  10. Yang, Z., Jin, S., Huang, Y., Zhang, Y., Li, H.: Automatically generate steganographic text based on Markov model and Huffman coding. arXiv preprint arXiv:1811.04720 (2018)

  11. Yang, Z., Yang, H., Hu, Y., Huang, Y., Zhang, Y.-J.: Real-time steganalysis for stream media based on multi-channel convolutional sliding windows. arXiv preprint arXiv:1902.01286 (2019)

  12. Yang, Z., Wang, K., Li, J., Huang, Y., Zhang, Y.: TS-RNN: text steganalysis based on recurrent neural networks. IEEE Sig. Process. Lett. 26, 1743–1747 (2019)

    Article  Google Scholar 

  13. Yang, Z., Zhang, P., Jiang, M., Huang, Y., Zhang, Y.-J.: RITS: real-time interactive text steganography based on automatic dialogue model. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICCCS 2018. LNCS, vol. 11065, pp. 253–264. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00012-7_24

    Chapter  Google Scholar 

  14. Cachin, C.: An information-theoretic model for steganography. Inf. Comput. 192(1), 41–56 (2004)

    Article  MathSciNet  Google Scholar 

  15. Li, S., Ho, A.T., Wang, Z., Zhang, X.: Lost in the digital wild: hiding information in digital activities. In: Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, pp. 27–37. ACM (2018)

    Google Scholar 

  16. Pantic, N., Husain, M.I.: Covert botnet command and control using twitter. In: Proceedings of the 31st Annual Computer Security Applications Conference, pp. 171–180. ACM (2015)

    Google Scholar 

  17. Zhang, X.: Behavior steganography in social network. In: Pan, J.S., Tsai, P.W., Huang, H.C. (eds.) Advances in Intelligent Information Hiding and Multimedia Signal Processing. SIST, vol. 63, pp. 21–23. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-50209-0_3

    Chapter  Google Scholar 

  18. Costa, A.F., Yamaguchi, Y., Traina, A.J.M., Faloutsos, C., et al.: Modeling temporal activity to detect anomalous behavior in social media. ACM Trans. Knowl. Discov. Data (TKDD) 11(4), 49 (2017)

    Google Scholar 

  19. Chino, D.Y., Costa, A.F., Traina, A.J., Faloutsos, C.: VolTime: unsupervised anomaly detection on users’ online activity volume. In: Proceedings of the 2017 SIAM International Conference on Data Mining, pp. 108–116. SIAM (2017)

    Google Scholar 

  20. Ranshous, S., Shen, S., Koutra, D., Harenberg, S., Faloutsos, C., Samatova, N.F.: Anomaly detection in dynamic networks: a survey. Wiley Interdisc. Rev. Comput. Stat. 7(3), 223–247 (2015)

    Article  MathSciNet  Google Scholar 

  21. Anand, K., Kumar, J., Anand, K.: Anomaly detection in online social network: a survey. In: 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 456–459. IEEE (2017)

    Google Scholar 

  22. Hutto, C.J., Gilbert, E.: VADER: a parsimonious rule-based model for sentiment analysis of social media text. In: Eighth International AAAI Conference on Weblogs and Social Media (2014)

    Google Scholar 

  23. Bandt, C., Pompe, B.: Permutation entropy: a natural complexity measure for time series. Phys. Rev. Lett. 88(17), 174102 (2002)

    Article  Google Scholar 

Download references

Acknowledgment

The authors thank Dr. Shujun Li for constructive communications. This work was supported in part by the National Key Research and Development Program of China under Grant 2018YFB0804103 and the National Natural Science Foundation of China (No. U1536207, No. U1705261 and No. U1636113).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhongliang Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, Z., Hu, Y., Huang, Y., Zhang, Y. (2020). Behavioral Security in Covert Communication Systems. In: Wang, H., Zhao, X., Shi, Y., Kim, H., Piva, A. (eds) Digital Forensics and Watermarking. IWDW 2019. Lecture Notes in Computer Science(), vol 12022. Springer, Cham. https://doi.org/10.1007/978-3-030-43575-2_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-43575-2_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-43574-5

  • Online ISBN: 978-3-030-43575-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics