TY - JOUR
T1 - On the distinguishability of distance-bounded permutations in ordered channels
AU - Estevez-Tapiador, J.
AU - Hernandez-Castro, Julio
AU - Alcaide, A.
AU - Ribagorda, A.
PY - 2008/6
Y1 - 2008/6
N2 - Ordered channels, such as those provided by Internet protocol and transmission control protocol protocols, rely on sequence numbers to recover from packet reordering due to network dynamics. The existence of covert channels in any ordered channel is a well-known fact: Two parties can reorder the elements (packets) to be sent according to some predefined code. Schemes based on distance-bounded permutations have been proposed for steganographic communication with the aim of keeping and controling the increase of latency due to reordering. In this paper,
we demonstrate that distance-bounded permutations are highly
anomalous from a metric point of view. Our analysis is based on the study of the distribution of distances between normal permutations generated by the channel, and those produced when embedding hidden information. We provide results for four different distances: Kendall’s , Spearman’s , Spearman’s footrule, and Levenshtein’s distance (which is equivalent to Ulam’s distance for
permutations). In all cases, it is shown how sequences with hidden information can be separated from the normal ones. As a result, very accurate and efficient distinguishers can be easily constructed.
Finally, we study the detection capabilities of the associated detectors through a receiver operating characteristic analysis.
AB - Ordered channels, such as those provided by Internet protocol and transmission control protocol protocols, rely on sequence numbers to recover from packet reordering due to network dynamics. The existence of covert channels in any ordered channel is a well-known fact: Two parties can reorder the elements (packets) to be sent according to some predefined code. Schemes based on distance-bounded permutations have been proposed for steganographic communication with the aim of keeping and controling the increase of latency due to reordering. In this paper,
we demonstrate that distance-bounded permutations are highly
anomalous from a metric point of view. Our analysis is based on the study of the distribution of distances between normal permutations generated by the channel, and those produced when embedding hidden information. We provide results for four different distances: Kendall’s , Spearman’s , Spearman’s footrule, and Levenshtein’s distance (which is equivalent to Ulam’s distance for
permutations). In all cases, it is shown how sequences with hidden information can be separated from the normal ones. As a result, very accurate and efficient distinguishers can be easily constructed.
Finally, we study the detection capabilities of the associated detectors through a receiver operating characteristic analysis.
U2 - 10.1109/TIFS.2008.920724
DO - 10.1109/TIFS.2008.920724
M3 - Article
SN - 1556-6013
VL - 3
SP - 166
EP - 172
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
IS - 2
ER -