Improved Concept and Implementation of
a Fountain Code Covert Channel


Jörg Keller+ and Ewelina Marciniszyn

FernUniversität in Hagen, 58084 Hagen, Germany
joerg.keller@fernuni-hagen.de, ewelina.marciniszyn@gmail.com

 

 

Abstract

Fountain codes are used to provide reliable communication over a lossy network with low overhead and without acknowledgment. We present a method for network steganography within a fountain code as carrier, which uses most carrier packets to transmit parts of the secret message, and tries to maximize bandwidth. As also parts of the secret message get lost when a carrier packet is lost, reliable transmission of the secret message is provided by using a second fountain code. Thus, our proposal opens the possibility for a multilevel steganographic method. We provide a detailed analysis on the possible bandwidth in multiple levels and a complete implementation for Luby Transform (LT) codes which we evaluate with a focus on detectability, i.e., if random values in a carrier packet can be distinguished from secret message parts. We also discuss countermeasures that limit the possibilities for covert channels in fountain codes.

Keywords: network steganography, storage covert channel, fountain code, multilevel steganography

 

+: Corresponding author: Jörg Keller
Faculty of Mathematics and Computer Science, FernUniversit¨at in Hagen, 58084 Hagen, Germany,
Tel: +49-2331-987-376

 

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)
Vol. 13, No. 3, pp. 25-36, September 2022 [
pdf]

 

Received: May 04, 2022; Accepted: August 22, 2022; Published: September 30, 2022

DOI: 10.22667/JOWUA.2022.09.30.025