نتایج جستجو برای: network steganography

تعداد نتایج: 675311  

2014
Steffen Wendzel Wojciech Mazurczyk Luca Caviglione Michael Meier

Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography. Similarly, other malicious activities can profit from network steganography, such as data leakage or the exchange of pedophile data. This paper provides an introduction to network steganography and highlight...

Journal: :CoRR 2016
Krzysztof Szczypiorski Tomasz Tyl

This article presents a new method for detecting a source point of time based network steganography MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods. The presented analysis describes a method that allows finding the source of steganography s...

Journal: :International Journal of Computer Applications 2013

Journal: :Telecommunication Systems 2010

2012
Rajeshwari Goudar Anjali Patil

Network steganography describe methods which are used for transmitting information over network without being detected. Length of packet is used for sending secret data. In this paper, a network steganographic detection scheme has been proposed which can detect the presence of steganographic content by modifying length of UDP datagrams. Proposed detection scheme can detect network steganography...

2012
M. Indra Sena Reddy Purushotham Reddy K. Subba Reddy

Steganography, literally meaning “secret writing”, involves hiding a data file in another innocuous-looking file. From the time of Herodotus in Greece, to the defense mechanisms of today, steganography has been used to deny one’s adversaries the knowledge of message traffic. Steganography takes one piece of information and hides it within another. A “container file” holds the secret message in ...

2011
Smriti Gupta Ranjeet Biswas

With the rapid application growing of internet and wireless network, information security becomes significant to protect commerce secret and personal privacy. Steganography plays crucial role for information security guarantee. There have been number of steganography embedding techniques proposed over last few years. In this paper, our goal is to evaluate number of JPEG steganography techniques...

2012
Saroj Kumar

In this paper we present a classification of network security techniques such as: secrecy, authentication, non-repudiation and integrity control. The secrecy techniques are two categories: cryptography and steganography. Steganography like cryptography is a very useful technique to achieve secrecy in communication. If both cryptography and steganography are used then the communication becomes t...

Journal: :JCM 2015
Krzysztof Szczypiorski Artur Janicki Steffen Wendzel

In this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of “the moving observer”. We considered three levels of undetectability named: “good”, “bad”, and “ugly”. To illustrate this method we chose Wi-Fi steganography as a solid family of information hiding protocols. We present the state of the art in this area covering well-known hi...

Journal: :CoRR 2015
Khan Muhammad Jamil Ahmad Naeem Ur Rehman Zahoor Jan Rashid Jalal Qureshi

There are five different types of steganography based on the carrier object that is used for embedding the secret information. The carrier object may be images, text, videos, audios or network protocol packets. If the image is used as a carrier, it is called image steganography. Similarly if video is used for hiding secret messages, we call it video steganography and so on[1, 5]. The diagrammat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید