On importance of steganographic cost for network steganography

@article{Mazurczyk2016OnIO,
  title={On importance of steganographic cost for network steganography},
  author={Wojciech Mazurczyk and Steffen Wendzel and Ignacio Azagra Villares and Krzysztof Szczypiorski},
  journal={ArXiv},
  year={2016},
  volume={abs/1406.2519}
}
Network steganography encompasses the information hiding techniques that can be applied in communication network environments and that utilize hidden data carriers for this purpose. In this paper we introduce a characteristic called steganographic cost which is an indicator for the degradation or distortion of the carrier caused by the application of the steganographic method. Based on exemplary cases for single- and multi-method steganographic cost analyses we observe that it can be an… 
The Solution of Key Transmission in Multi-level Network Steganography
TLDR
The experimental results showed that this solution can realize synchronous transmission of the ciphertext and the key, which has a high steganographic bandwidth and a low Steganographic cost, improving the security of network steganography.
The Solution of Key Transmission in Multi-level Network Steganography
TLDR
The experimental results showed that this solution can realize synchronous transmission of the ciphertext and the key, which has a high steganographic bandwidth and a low Steganographic cost, improving the security of network steganography.
Perfect undetectability of network steganography
TLDR
The paper presents StegBlocks, which defines a new concept for performing undetectable hidden communication and presents the approach to perfect undetECTability of network steganography, which was developed based on the rules of undetectability for general Steganography.
Steg Blocks: Ensuring Perfect Undetectability of Network Steganography
TLDR
The paper presents StegBlocks, which defines a new concept for performing undetectable hidden communication and presents the approach to perfect undetECTability of network steganography, which was developed based on the rules of undetectability for general Steganography.
Improved Security Based on Combined Encryption and Steganography Techniques
TLDR
A combination of image based steganography with encryption is presented based on two different files in which important information is hidden and embedded into different graphic files, sent to the destination through different channels and then restored.
Unified Description for Network Information Hiding Methods
TLDR
The first unified description of hiding methods in network steganography is introduced, based on a comprehensive analysis of the existing publications in the domain, to make it easier to categorize, compare and extend.
Secure Communication Method Based on Encryption and Steganography
TLDR
A combination of encryption with image based steganography is presented in order to offer similar robustness as offered by advanced encryption algorithms such as RSA, AES or DES but with lower resource needs.
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research
TLDR
A framework and a metric are proposed to help evaluating the creativity bound to a given hiding technique to support two sides of the scientific peer review process as both authors and reviewers can use the framework to analyze the novelty and applicability of hiding techniques.
"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography
In this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of "the moving observer". We considered three levels of undetectability named:
...
...

References

SHOWING 1-10 OF 37 REFERENCES
ReLACK: A Reliable VoIP Steganography Approach
  • Mohammad Hamdaqa, L. Tahvildari
  • Computer Science
    2011 Fifth International Conference on Secure Software Integration and Reliability Improvement
  • 2011
TLDR
This paper modifies the (k, n) threshold secret sharing scheme, which is based on Lagrange's Interpolation, and applies a two phase approach on the LACK steganography mechanism to provide reliability and fault tolerance and to increase steganalysis complexity.
Multilevel Steganography: Improving Hidden Communication in Networks
TLDR
The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks, in such a way that one method serves as a carrier for the second one (called the lower-level) in a relationship between two information hiding solutions.
Steganography in Digital Media: Principles, Algorithms, and Applications
TLDR
This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of Steganography.
Lost audio packets steganography: the first practical evaluation
TLDR
First experimental results for an Internet Protocol (IP) telephony-based steganographic method called lost audio packets steganography (LACK) are presented and the method’s impact on the quality of voice transmission is shown.
Steganography of VoIP Streams
TLDR
The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.
Evaluation of steganographic methods for oversized IP packets
TLDR
New network steganography methods that utilize mechanisms for handling oversized IP packets: IP fragmentation, PMTUD (Path MTU Discovery) and PLPMTud (Packetization Layer Path MTU discovery) are described.
Retransmission steganography and its detection
TLDR
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms, to not acknowledge a successfully received packet in order to intentionally invoke retransmissions.
On information hiding in retransmissions
The paper presents an idea and experimental results for RSTEG (Retransmission Steganography), which is an intra-protocol hybrid network steganography method. It is intended for a broad class of
Eliminating Steganography in Internet Traffic with Active Wardens
TLDR
This paper examines the techniques and challenges of a high-bandwidth, unattended, real-time, active warden in the context of a network firewall, and introduces the concept of Minimal Requisite Fidelity (MRF) as a measure of the degree of signal fidelity that is both acceptable to end users and destructive to covert communications.
Covert communications through network configuration messages
...
...