منابع مشابه
New High Secure Network Steganography Method Based on Packet Length
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...
متن کاملToward network steganography detection
Network steganography is a recently introduced, general term which describes all information hiding methods that may be used to hide secret data in the normal data transmissions of users. While sending encrypted information, enabled by some cryptographic algorithm, protects messages from being captured by unauthorized parties, steganographic techniques enable concealing the fact that a message ...
متن کاملAn Improved Retransmission-based Network Steganography: Design and Detection
Network steganography is a covert communication technique that uses redundancies in network protocols to transfer secret information. The retransmission-based steganography (RSTEG) embeds covert messages into the payload field of the intentionally retransmission packets. So its capacity is higher than most of the existing methods. Because TCP checksum field of the original packet is different f...
متن کاملImage Steganography Method Based on Kohonen Neural Network
A new high capacity image steganography method based on kohonen neural network is introduced. Kohonen network is trained according to the absolute contrast sensitivity of pixels present in cover image. Trained network classify the pixels in different classes of sensitivity. Data embedding is performed in less sensitive pixels by LSB substitution method, which replaces the least significant bits...
متن کاملAbout software implementation of network steganography retransmission based algorithm
Hybrid network steganography method RSTEG was implemented for Windows TCP/IP stack. The implementation description is provided, including further development prospects.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2013
ISSN: 0975-8887
DOI: 10.5120/12872-9442