How Hidden Can be Even More Hidden?
@article{Fraczek2011HowHC, title={How Hidden Can be Even More Hidden?}, author={Wojciech Fraczek and Wojciech Mazurczyk and Krzysztof Szczypiorski}, journal={2011 Third International Conference on Multimedia Information Networking and Security}, year={2011}, pages={581-585} }
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the…
13 Citations
Network based Steganography
- Computer Science
- 2013
The typical steganographic method utilizes digitized media files as a cover medium for hiding data, while network steganography uses communication protocols such as TCP/IP to make it harder to detect and eliminate.
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
- Computer ScienceISSE
- 2014
The issues related to countering network steganography in practice are discussed, an outlook on further research directions and problems are provided and its potential application for harmful purposes is highlighted.
A New DHT: Network Steganography Based on Distributed Coding
- Computer ScienceJ. Inf. Hiding Multim. Signal Process.
- 2018
A new network steganography based on distributed coding (NS-DCM) is proposed in this paper and the experimental results showed that the proposed method has an average bandwidth of 0.998 bits/packet and a better undetectability than some other network Steganography.
Network-based Steganography using Encryption in TCP/IP Header
- Computer Science
- 2013
Network steganography shelters a broad spectrum of techniques and relates to the areas like network protocols and security for practical data hiding in communication networks using Transmission Control Protocol/Internet Protocol (TCP/IP).
Steganalysis of Storage-based Covert Channels Using Entropy
- Computer Science2019 29th International Telecommunication Networks and Applications Conference (ITNAC)
- 2019
The technique uses entropy estimates, and can not only detect secret messages, but also estimate their size, which helps to uncover the existence of covert channels in networks.
A Discussion and Review of Network Steganography
- Computer Science2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)
- 2016
This paper argues that prevention techniques such as traffic normalisation might be employed to combat the use of covert channels, and notes the emergence of new covert channels as technology advances, and questions the practicality of keeping ahead of all potential channels.
A New Network Steganographic Method Based on the Transverse Multi-Protocol Collaboration
- Computer ScienceJ. Inf. Hiding Multim. Signal Process.
- 2017
A new network steganographic method called Transverse Multi-Protocol Collaboration Network Steganographic Method (TMPCNSM) is proposed and experiments showed that the great advantage of this method over others are higher steganography bandwidth and more undetectable characteristics due to the complexity of multi-protocol collaborative.
High capacity steganographic algorithm based on payload adaptation and optimization
- Computer Science2012 7th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)
- 2012
A new and enhanced high capacity steganographic algorithm based on the original smart LSB pixel mapping and data rearrangement design that reduces the image degradation in the embedding process with the original luminosity of the image as a quality metric, and is capable of maintaining even more of the original color quality.
A Lightweight Protocol for Secure Video Streaming
- Computer ScienceSensors
- 2018
This paper presents a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer that is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality.
TCP Packet Steganography using SDA Algorithm
- Computer Science
- 2016
This electronic document represents the comparative study of transmission of encrypted data packet using different cryptographic algorithm.
References
SHOWING 1-10 OF 15 REFERENCES
Information Hiding Using Improper frame padding
- Computer Science2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)
- 2010
Basing on real network traces, it is confirmed that PadSteg is feasible in today's networks and it is estimated what steganographic bandwidth is achievable while limiting the chance of disclosure.
PadSteg: introducing inter-protocol steganography
- Computer ScienceTelecommun. Syst.
- 2013
Basing on real network traces, it is confirmed that PadSteg is feasible in today’s networks and it is estimated what steganographic bandwidth is achievable while limiting the chance of disclosure.
Steganography of VoIP Streams
- Computer ScienceOTM Conferences
- 2008
The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.
Retransmission steganography and its detection
- Computer ScienceSoft Comput.
- 2011
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms, to not acknowledge a successfully received packet in order to intentionally invoke retransmissions.
A survey of covert channels and countermeasures in computer network protocols
- Computer ScienceIEEE Communications Surveys & Tutorials
- 2007
A survey of the existing techniques for creating covert channels in widely deployed network and application protocols and an overview of common methods for their detection, elimination, and capacity limitation, required to improve security in future computer networks are given.
Stream Control Transmission Protocol Steganography
- Computer Science2010 International Conference on Multimedia Information Networking and Security
- 2010
Identified new threats and suggested countermeasures may be used as a supplement to RFC 5062, which describes security attacks in SCTP protocol and can induce further standard modifications.
Cloak: A Ten-Fold Way for Reliable Covert Communications
- Computer ScienceESORICS
- 2007
Cloak is a new class of reliable timing channels--which is fundamentally different from other timing channels in several aspects, and is feasible under various network conditions and different round-trip delays.
Retransmission steganography and its detection, Soft Computing, ISSN: 1432-7643
- (print version),
- 2009
Szczypiorski - PadSteg: Introducing Inter-Protocol Steganography - In: Telecommunication Systems: Modelling, Analysis, Design and Management, to be published
- 2013
Steganography in TCP/IP Networks. State of the Art and a Proposal of a New System – HICCUPS, Institute of Telecommunications' seminar, Warsaw
- 2003