• Corpus ID: 5828473

Practical Data Hiding in TCP/IP

  title={Practical Data Hiding in TCP/IP},
  author={Kamran Ahsan and Deepa Kundur},
This work relates the areas of steganography, network protocols and security for practical data hiding in communication networks employing TCP/IP. Two approaches are proposed based on packet header manipulation and packet ordering within the IPSec framework. For the former the Internet protocol IPv4 header is analyzed to identify covert channels by exploiting redundancy and multiple interpretations of protocol strategies; by passing supplementary information through IPv4 headers we demonstrate… 

Figures and Tables from this paper

Steganography by hiding data in TCP/IP headers

A novel scheme to send message imperceptibly between points over Internet is presented, which uses fourth-order chaotic system to generate chaos sequence which is used to encrypt secret message, and then embeds the modulated message into identification field of IP header.

A Data-Hiding Method Based on TCP/IP Checksum

A new steganagraphic method is proposed, which hides encrypted secret information randomly in the checksum domain of TCP segment, which enjoys better invisibility and anti-statistic attacking performance than other current steganographies based on TCP/IP.


The paper focuses on the existent methods used with ipv4 and studies the various algorithms and the scheme to bypass the firewall.

Secure Network Steganographic Scheme Exploiting TCP Sequence Numbers

This paper attempts to propose a novel steganographic scheme which uses the length of the TCP segments to transfer secret information and shows that this scheme is better than other existing schemes based on adjusting thelength of packets.

Framework for Efficient Secure Steganographic Communication over Network Protocols

This paper presents a framework that offers the protection to the covert data by encrypting it and compresses it for gain in efficiency and is compared with other steganography frameworks.

Information Hiding Using Improper frame padding

Basing on real network traces, it is confirmed that PadSteg is feasible in today's networks and it is estimated what steganographic bandwidth is achievable while limiting the chance of disclosure.

Secure Data Communication Using Protocol Steganography in IPv6

  • Sandip BobadeR. Goudar
  • Computer Science
    2015 International Conference on Computing Communication Control and Automation
  • 2015
This paper examines security issues related IPv6 protocol, a new generation protocol which slowly replaces IPv4 in future because IPv4 is rapidly running out, and steganography, the technique of information hiding, which is a new approach for data hiding.

SCONeP: Steganography and Cryptography approach for UDP and ICMP

An implementation called SCONeP (Steganography and Cryptography over Network Protocols) that offers the protection of hidden data by encrypting it is proposed, and two less utilized protocols for data hiding, ICMP and UDP are described.

Steganography in Handling Oversized IP Packets

This paper identifies new class of network steganography methods that utilize mechanisms for handling oversized IP packets: IP fragmentation, PMTUD (Path MTU Discovery) and PLPMTUD (Packetization

PadSteg: introducing inter-protocol steganography

Basing on real network traces, it is confirmed that PadSteg is feasible in today’s networks and it is estimated what steganographic bandwidth is achievable while limiting the chance of disclosure.



Covert Channel Analysis and Data Hiding in TCP/IP

It is shown how associating additional information with IPv4 headers can ease up security mechanisms in network nodes like routers, firewalls and for services such as authentication, audit, and billing.

Hiding Data in the OSI Network Model

The Alice and Bob analogy, derived from cryptology, is used to present network protocols in a way that more clearly defines the problem.

Covert Channels in LAN Protocols

There is a potential of unused bandwidth in commonly used LAN protocols, which might be exploitable as covert channel and the key point is, that exploitation of this potential is not a question of a LAN's architecture, but is strongly dependent on the design of its internal interfaces and on its implementations.

Covert Channels in the TCP/IP Protocol Suite

This paper attempts to illustrate the weaknesses in the TCP/IP protocol suite in both theoretical and practical examples.

Associating network flows with user and application information

This work presents an approach that works transparently and allows to associate user and application specific information with IP data streams by only slightly modifying components of the operating system environment and infrastructure components.

End-to-end Internet packet dynamics

The prevalence of unusual network events such as out-of-order delivery and packet corruption are characterized and a robust receiver-based algorithm for estimating "bottleneck bandwidth" is discussed that addresses deficiencies discovered in techniques based on "packet pair".

Observing TCP dynamics in real networks

By analyzing traces of a busy segment of the Internet, it is shown how it is possible to observe pheonomena of the TCP protocol in “real life” and measure both their frequency and their effects on performance.


This publication is effective immediately and is mandatory for use by all DoD Components in carrying out ADP system technical security evaluation activities applicable to the processing and storage of classified and other sensitive DoD information and applications as set forth herein.

Internet protocol, darpa internet program , protocol specification

  • September 1981. Specification prepared for Defense Advanced Research Projects Agency.
  • 1981