منابع مشابه
Toward network steganography detection
Network steganography is a recently introduced, general term which describes all information hiding methods that may be used to hide secret data in the normal data transmissions of users. While sending encrypted information, enabled by some cryptographic algorithm, protects messages from being captured by unauthorized parties, steganographic techniques enable concealing the fact that a message ...
متن کاملTrends toward real-time network data steganography
Network steganography has been a well-known covert data channeling method for over three decades. The basic set of techniques and implementation tools have not changed significantly since their introduction in the early 1980’s. In this paper, we review the predominant methods of classical network steganography, describing the detailed operations and resultant challenges involved in embedding da...
متن کاملMoveSteg: A Method of Network Steganography Detection
This article presents a new method for detecting a source point of time based network steganography MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods. The presented analysis describes a method that allows finding the source of steganography s...
متن کاملToward a theory of Steganography
Informally, steganography refers to the practice of hiding secret messages in communications over a public channel so that an eavesdropper (who listens to all communications) cannot even tell that a secret message is being sent. In contrast to the active literature proposing new concrete steganographic protocols and analysing flaws in existing protocols, there has been very little work on forma...
متن کاملAn Improved Retransmission-based Network Steganography: Design and Detection
Network steganography is a covert communication technique that uses redundancies in network protocols to transfer secret information. The retransmission-based steganography (RSTEG) embeds covert messages into the payload field of the intentionally retransmission packets. So its capacity is higher than most of the existing methods. Because TCP checksum field of the original packet is different f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Telecommunication Systems
سال: 2010
ISSN: 1018-4864,1572-9451
DOI: 10.1007/s11235-010-9361-8