Multilevel Steganography: Improving Hidden Communication in Networks

@article{Fraczek2012MultilevelSI,
  title={Multilevel Steganography: Improving Hidden Communication in Networks},
  author={Wojciech Fraczek and Wojciech Mazurczyk and Krzysztof Szczypiorski},
  journal={J. Univers. Comput. Sci.},
  year={2012},
  volume={18},
  pages={1967-1986}
}
The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. [] Key Method The most important is that the lower-level method steganographic bandwidth can be utilised to make the steganogram unreadable even after the detection of the upper-level method: e.g., it can carry a cryptographic key that deciphers the steganogram carried by the upper-level one. It can also be used to provide the steganogram with integrity. Another important…
Performance Analysis of Multi-class Steganographic Methods Based on Multi-Level Re-stegnography
TLDR
A steganographic algorithm based on the spatial domain, Selected Least significant Bits (SLSB) and Least Significant Bits (LSB), which is further exploited to do a 3-level re-steganography to enhance security.
Multi-Level Steganographic Algorithm for Audio Steganography using LSB, Parity Coding and Phase Coding Technique
TLDR
This paper defines a method for audio steganography using LSB coding, parity coding and phase coding technique in multi-level Steganography, an effective way to achieve higher security, increased undetectability and the maintained consistency in the clarity of digital audio signal.
The Solution of Key Transmission in Multi-level Network Steganography
TLDR
The experimental results showed that this solution can realize synchronous transmission of the ciphertext and the key, which has a high steganographic bandwidth and a low Steganographic cost, improving the security of network steganography.
The Solution of Key Transmission in Multi-level Network Steganography
TLDR
The experimental results showed that this solution can realize synchronous transmission of the ciphertext and the key, which has a high steganographic bandwidth and a low Steganographic cost, improving the security of network steganography.
On importance of steganographic cost for network steganography
TLDR
Steganographic cost can be an important characteristic that allows to express hidden data carrier degradation - similarly as MSE (Mean-Square Error) or PSNR (Peak Signal-to-Noise Ratio) are utilized for digital media steganography.
Future of Data Hiding: A Walk Through Conventional to Network Steganography
TLDR
In this paper various works recently done in the area of different categories of network security has been discussed and analyzed so as to find scope for future research.
Multilevel Network Steganography in Fountain Codes
  • J. Keller
  • Computer Science
    European Interdisciplinary Cybersecurity Conference
  • 2021
TLDR
This proposal opens the possibility for a multilevel steganographic method to establish a network storage covert channel in a fountain code, which is used to provide reliable communication over lossy network with low overhead and without acknowledgment.
An Integrated Synchronized Protocol for Secure Information Transmission derived from Multilevel Steganography and
In this paper a protocol is elucidated, it is based on multilevel steganography and dynamic cryptography in the secure information transmission, because the growing possibilities of modern
T An Integrated Synchronized Protocol for Secure Information Transmission derived from Multilevel Steganography and Dynamic Cryptography
In this paper a protocol is elucidated, it is based on multilevel steganography and dynamic cryptography in the secure information transmission, because the growing possibilities of modern
A COMPARATIVE STUDY OF STEGANOGRAPHY AND WATERMARKING
TLDR
An indepth analysis of steganography and watermarking has been shown by comparing the features of each on the basis of some of the parameters, and identifies a few key elements of data hiding through a layered structure.
...
...

References

SHOWING 1-10 OF 36 REFERENCES
Steganography of VoIP Streams
TLDR
The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.
Information hiding-a survey
TLDR
An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Information Hiding Using Improper frame padding
TLDR
Basing on real network traces, it is confirmed that PadSteg is feasible in today's networks and it is estimated what steganographic bandwidth is achievable while limiting the chance of disclosure.
The decoy: multi-level digital multimedia steganography model
TLDR
The focus of this paper is to develop an abstract multi-level model; and to use a published object to conceal (hide) a secret object using the proposed model.
Retransmission steganography and its detection
TLDR
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms, to not acknowledge a successfully received packet in order to intentionally invoke retransmissions.
A survey of covert channels and countermeasures in computer network protocols
TLDR
A survey of the existing techniques for creating covert channels in widely deployed network and application protocols and an overview of common methods for their detection, elimination, and capacity limitation, required to improve security in future computer networks are given.
Cloak: A Ten-Fold Way for Reliable Covert Communications
TLDR
Cloak is a new class of reliable timing channels--which is fundamentally different from other timing channels in several aspects, and is feasible under various network conditions and different round-trip delays.
Stream Control Transmission Protocol Steganography
TLDR
Identified new threats and suggested countermeasures may be used as a supplement to RFC 5062, which describes security attacks in SCTP protocol and can induce further standard modifications.
Chipping Away at Censorship Firewalls with User-Generated Content
TLDR
This paper develops Collage, which allows users to exchange messages through hidden channels in sites that host user-generated content, and shows how Collage can be used to build two applications: a direct messaging application, and a Web content delivery system.
Diffie-Hellman Key Agreement Method
This document standardizes one particular Diffie-Hellman variant, based on the ANSI X9.42 draft, developed by the ANSI X9F1 working group. Diffie-Hellman is a key agreement algorithm used by two
...
...