Title :
Invisible Flow Watermarks for Channels With Dependent Substitution, Deletion, and Bursty Insertion Errors
Author :
Xun Gong ; Rodrigues, M. ; Kiyavash, Negar
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA
Abstract :
Flow watermarks efficiently link packet flows in a network in order to thwart various attacks such as stepping stones. We study the problem of designing good flow watermarks. Earlier flow watermarking schemes mostly considered substitution errors, neglecting the effects of packet insertions and deletions that commonly happen within a network. More recent schemes considered packet deletions but often at the expense of the watermark visibility. We present an invisible flow watermarking scheme capable of enduring a large number of packet losses and insertions. To maintain invisibility, our scheme uses quantization-index-modulation (QIM) to embed the watermark into interpacket delays, as opposed to time intervals including many packets. As the watermark is injected within individual packets, packet losses and insertions may lead to watermark desynchronization and substitution errors. To address this issue, we add a layer of error-correction coding to our scheme. Experimental results on both synthetic and real network traces demonstrate that our scheme is robust to network jitter, packet drops, and splits, while remaining invisible to an attacker.
Keywords :
error correction codes; telecommunication channels; telecommunication network reliability; telecommunication security; telecommunication traffic; watermarking; bursty insertion errors; dependent substitution; error correction coding; interpacket delays; invisible flow watermarks; network jitter; packet drops; packet flows; packet losses; quantization index modulation; real network; stepping stones; synthetic network; watermark desynchronization; watermark visibility; Communication networks; Delays; Error correction codes; Jitter; Packet loss; Robustness; Watermarking; Communication networks; error correction codes; watermarking;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2013.2279794