How Hidden Can be Even More Hidden?

@article{Fraczek2011HowHC,
  title={How Hidden Can be Even More Hidden?},
  author={Wojciech Fraczek and Wojciech Mazurczyk and Krzysztof Szczypiorski},
  journal={2011 Third International Conference on Multimedia Information Networking and Security},
  year={2011},
  pages={581-585}
}
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the… 

Figures from this paper

Network based Steganography
TLDR
The typical steganographic method utilizes digitized media files as a cover medium for hiding data, while network steganography uses communication protocols such as TCP/IP to make it harder to detect and eliminate.
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
TLDR
The issues related to countering network steganography in practice are discussed, an outlook on further research directions and problems are provided and its potential application for harmful purposes is highlighted.
A New DHT: Network Steganography Based on Distributed Coding
TLDR
A new network steganography based on distributed coding (NS-DCM) is proposed in this paper and the experimental results showed that the proposed method has an average bandwidth of 0.998 bits/packet and a better undetectability than some other network Steganography.
Network-based Steganography using Encryption in TCP/IP Header
TLDR
Network steganography shelters a broad spectrum of techniques and relates to the areas like network protocols and security for practical data hiding in communication networks using Transmission Control Protocol/Internet Protocol (TCP/IP).
Steganalysis of Storage-based Covert Channels Using Entropy
TLDR
The technique uses entropy estimates, and can not only detect secret messages, but also estimate their size, which helps to uncover the existence of covert channels in networks.
A Discussion and Review of Network Steganography
  • Jun O. Seo, S. Manoharan, Aniket Mahanti
  • Computer Science
    2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)
  • 2016
TLDR
This paper argues that prevention techniques such as traffic normalisation might be employed to combat the use of covert channels, and notes the emergence of new covert channels as technology advances, and questions the practicality of keeping ahead of all potential channels.
A New Network Steganographic Method Based on the Transverse Multi-Protocol Collaboration
TLDR
A new network steganographic method called Transverse Multi-Protocol Collaboration Network Steganographic Method (TMPCNSM) is proposed and experiments showed that the great advantage of this method over others are higher steganography bandwidth and more undetectable characteristics due to the complexity of multi-protocol collaborative.
High capacity steganographic algorithm based on payload adaptation and optimization
TLDR
A new and enhanced high capacity steganographic algorithm based on the original smart LSB pixel mapping and data rearrangement design that reduces the image degradation in the embedding process with the original luminosity of the image as a quality metric, and is capable of maintaining even more of the original color quality.
A Lightweight Protocol for Secure Video Streaming
TLDR
This paper presents a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer that is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality.
TCP Packet Steganography using SDA Algorithm
This electronic document represents the comparative study of transmission of encrypted data packet using different cryptographic algorithm.
...
...

References

SHOWING 1-10 OF 15 REFERENCES
Information Hiding Using Improper frame padding
TLDR
Basing on real network traces, it is confirmed that PadSteg is feasible in today's networks and it is estimated what steganographic bandwidth is achievable while limiting the chance of disclosure.
PadSteg: introducing inter-protocol steganography
TLDR
Basing on real network traces, it is confirmed that PadSteg is feasible in today’s networks and it is estimated what steganographic bandwidth is achievable while limiting the chance of disclosure.
Steganography of VoIP Streams
TLDR
The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.
Retransmission steganography and its detection
TLDR
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms, to not acknowledge a successfully received packet in order to intentionally invoke retransmissions.
A survey of covert channels and countermeasures in computer network protocols
TLDR
A survey of the existing techniques for creating covert channels in widely deployed network and application protocols and an overview of common methods for their detection, elimination, and capacity limitation, required to improve security in future computer networks are given.
Stream Control Transmission Protocol Steganography
TLDR
Identified new threats and suggested countermeasures may be used as a supplement to RFC 5062, which describes security attacks in SCTP protocol and can induce further standard modifications.
Cloak: A Ten-Fold Way for Reliable Covert Communications
TLDR
Cloak is a new class of reliable timing channels--which is fundamentally different from other timing channels in several aspects, and is feasible under various network conditions and different round-trip delays.
Retransmission steganography and its detection, Soft Computing, ISSN: 1432-7643
  • (print version),
  • 2009
Szczypiorski - PadSteg: Introducing Inter-Protocol Steganography - In: Telecommunication Systems: Modelling, Analysis, Design and Management, to be published
  • 2013
Steganography in TCP/IP Networks. State of the Art and a Proposal of a New System – HICCUPS, Institute of Telecommunications' seminar, Warsaw
  • 2003
...
...