Skip to main content
Kent Academic Repository

On the Distinguishability of Distance-Bounded Permutations in Ordered Channels

Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Alcaide, Almudena, Ribagorda, Arturo (2008) On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security, 3 (2). pp. 166-172. ISSN 1556-6013. (doi:10.1109/TIFS.2008.920724) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31957)

PDF
Language: English

Restricted to Repository staff only
[thumbnail of On the Distinguishability of Distance-Bounded Permutations in Ordered Channels.pdf]
Official URL:
http://dx.doi.org/10.1109/TIFS.2008.920724

Abstract

Ordered channels, such as those provided by Internet protocol and transmission control protocol protocols, rely on sequence numbers to recover from packet reordering due to network dynamics. The existence of covert channels in any ordered channel is a well-known fact: Two parties can reorder the elements (packets) to be sent according to some predefined code. Schemes based on distance-bounded permutations have been proposed for steganographic communication with the aim of keeping and controling the increase of latency due to reordering. In this paper, we demonstrate that distance-bounded permutations are highly anomalous from a metric point of view. Our analysis is based on the study of the distribution of distances between normal permutations generated by the channel, and those produced when embedding hidden information. We provide results for four different distances: Kendall's ?, Spearman's ?, Spearman's footrule, and Levenshtein's distance (which is equivalent to Ulam's distance for permutations). In all cases, it is shown how sequences with hidden information can be separated from the normal ones. As a result, very accurate and efficient distinguishers can be easily constructed. Finally, we study the detection capabilities of the associated detectors through a receiver operating characteristic analysis.

Item Type: Article
DOI/Identification number: 10.1109/TIFS.2008.920724
Uncontrolled keywords: Distances on permutations; Ordered channels; Steganalysis; Steganography
Subjects: Q Science > QA Mathematics (inc Computing science) > QA 75 Electronic computers. Computer science
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing
Depositing User: Julio Hernandez Castro
Date Deposited: 24 Oct 2012 13:34 UTC
Last Modified: 05 Nov 2024 10:14 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/31957 (The current URI for this page, for reference purposes)

University of Kent Author Information

Hernandez-Castro, Julio C..

Creator's ORCID: https://orcid.org/0000-0002-6432-5328
CReDIT Contributor Roles:
  • Depositors only (login required):

Total unique views for this document in KAR since July 2020. For more details click on the image.