• Corpus ID: 220384327

A New DHT: Network Steganography Based on Distributed Coding

  title={A New DHT: Network Steganography Based on Distributed Coding},
  author={Pengfei Xue and Jing-Song Hu and RongGui Hu and Hanlin Liu and Yu Gu},
  journal={J. Inf. Hiding Multim. Signal Process.},
Network steganography is a new branch of information hiding. Compared with digital media steganography, it has a stronger undetectability and difficult to track. To further enhance the undetectability of network steganography, a new network steganography based on distributed coding (NS-DCM) is proposed in this paper. NS-DCM is realized by coding steganogram in the distributed system. The experimental results showed that the proposed method has an average bandwidth of 0.998 bits/packet and a… 
Fast Detection of Heterogeneous Parallel Steganography for Streaming Voice
The proposed model is able to effectively extract the key characteristic of the exceptions due to steganography and fuse the extracted features for different steganographic algorithms used in HPS and significantly improves the classification accuracy in detecting both low embedding rate samples and short segment samples.
Generative steganography with Kerckhoffs’ principle
Generative steganography with Kerckhoffs’ principle (GSK) is proposed and an example of the working process is presented by adopting a generator trained on the dataset MNIST, which demonstrates that GSK can use a cover image without any modification to generate messages.


Practical Internet Steganography : Data Hiding in IP
This paper investigates practical techniques and uses of Internet steganography and facilitates the interaction of fundamental steganographic principles with the existing network security environment to more generally bridge the areas of data hiding, network protocols and security.
LACK—a VoIP steganographic method
The analytical results presented in the paper concern the influence of LACK’s hidden data insertion procedure on the method’'s impact on quality of voice transmission and its resistance to steganalysis.
Retransmission steganography and its detection
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms, to not acknowledge a successfully received packet in order to intentionally invoke retransmissions.
How Hidden Can be Even More Hidden?
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram
Steganography of VoIP Streams
The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.
Practical Data Hiding in TCP/IP
By passing supplementary information through IPv4 headers it is demonstrated how security mechanisms can be enhanced in routers, firewalls, and for services such as authentication, audit and logging without considerable additions to software or hardware.
Hiding Data in the OSI Network Model
The Alice and Bob analogy, derived from cryptology, is used to present network protocols in a way that more clearly defines the problem.
Building Covert Channels over the Packet Reordering Phenomenon
This paper proposes using the packet reordering phenomenon as the media to carry a hidden channel and shows promising results show the potential of the proposed approach.
The Research on Information Hiding Based on Command Sequence of FTP Protocol
Three characters of covert channels, which are concealment, bandwidth and robustness, are studied and the methods to construct covert channels are also applicable to other internet protocol.
Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs
A novel reversible data hiding scheme based on invariability of the sum of pixel pairs and pairwise difference adjustment (PDA) is presented and half the difference of a pixel pair plus 1-bit watermark has been elaborately selected to satisfy this purpose.