• Corpus ID: 201705282

Practical Internet Steganography : Data Hiding in IP

  title={Practical Internet Steganography : Data Hiding in IP},
  author={Deepa Kundur and Texas},
This paper investigates practical techniques and uses of Internet steganography. Internet steganography is the exploitation of Internet elements and protocols for the purpose of covertly communicating supplementary data. Each scenario facilitates the interaction of fundamental steganographic principles with the existing network security environment to more generally bridge the areas of data hiding, network protocols and security. 

Figures and Tables from this paper

Design of a Steganographic System for Hiding Information in TCP/IP Packets
A steganographic system for hiding information in network packets, specifically in TCP / IP (Transmission Control Protocol / Internet Protocol) packets, which uses fields of the packet headers to send secret information to the recipient.
Practical Protocol Steganography: Hiding Data in IP Header
A novel scheme to send message imperceptibly between points over Internet, which uses fourth-order Chebyshev chaotic system to generate chaos sequence which is used to encrypt secret message, and then embeds the modulated message into identification field of IP header.
Secure data transmission using steganography based data hiding in TCP/IP
A system that provides a novel method for secure data transmission using steganography by hiding data in TCP/IP header by preventing hackers from hacking the confidential data is proposed.
Principles and overview of network steganography
The article discusses basic principles of network steganography, which is a comparatively new research subject in the area of information hiding, followed by a concise overview and classification of
Design of a steganographic system for hiding information in TCP/IP packets
A steganographic system that permits the sending, reception and recuperation of secret data hidden in the TCP/IP packet header fields that are often unused or that exhibit some intrinsic redundancy to said protocols is presented.
VoIP steganography and its Detection—A survey
This article is a first survey of the existing Voice over IP (VoIP) steganography methods and their countermeasures.
A New DHT: Network Steganography Based on Distributed Coding
A new network steganography based on distributed coding (NS-DCM) is proposed in this paper and the experimental results showed that the proposed method has an average bandwidth of 0.998 bits/packet and a better undetectability than some other network Steganography.
Secure Data Communication Using Protocol Steganography in IPv6
  • Sandip Bobade, R. Goudar
  • Computer Science
    2015 International Conference on Computing Communication Control and Automation
  • 2015
This paper examines security issues related IPv6 protocol, a new generation protocol which slowly replaces IPv4 in future because IPv4 is rapidly running out, and steganography, the technique of information hiding, which is a new approach for data hiding.
Network packet payload parity based steganography
This paper proposes two packet-length based steganographic techniques to implement a covert channel and examines and analyze the packet lengths of normal traffic to show that these techniques can cope with traffic anomaly detection methods and does not introduce noticeable traffic overhead.
Steganography for e-Business: An Offensive Use of Information Security
A new use of steganographic technique is proposed for e-business, using animation to encode an important and secret business message. A very robust steganography system is proposed and discussed from


Practical Data Hiding in TCP/IP
By passing supplementary information through IPv4 headers it is demonstrated how security mechanisms can be enhanced in routers, firewalls, and for services such as authentication, audit and logging without considerable additions to software or hardware.
Hiding Data in the OSI Network Model
The Alice and Bob analogy, derived from cryptology, is used to present network protocols in a way that more clearly defines the problem.
On the limits of steganography
It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography.
Covert Channels in LAN Protocols
There is a potential of unused bandwidth in commonly used LAN protocols, which might be exploitable as covert channel and the key point is, that exploitation of this potential is not a question of a LAN's architecture, but is strongly dependent on the design of its internal interfaces and on its implementations.
Eliminating Steganography in Internet Traffic with Active Wardens
This paper examines the techniques and challenges of a high-bandwidth, unattended, real-time, active warden in the context of a network firewall, and introduces the concept of Minimal Requisite Fidelity (MRF) as a measure of the degree of signal fidelity that is both acceptable to end users and destructive to covert communications.
Covert Channels in the TCP/IP Protocol Suite
This paper attempts to illustrate the weaknesses in the TCP/IP protocol suite in both theoretical and practical examples.
Associating network flows with user and application information
This work presents an approach that works transparently and allows to associate user and application specific information with IP data streams by only slightly modifying components of the operating system environment and infrastructure components.
Internet protocol, DARPA internet program , protocol specification
  • September 1981, Specification prepared for Defense Advanced Research Projects Agency.
  • 1981
A note on the confinement problem
A set of examples attempts to stake out the boundaries of the problem by defining a program during its execution so that it cannot transmit information to any other program except its caller.