Research Article

Network based Steganography

by  Joshi Rana, Amanpreet Kaur, Nitin Malik
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 74 - Issue 4
Published: July 2013
Authors: Joshi Rana, Amanpreet Kaur, Nitin Malik
10.5120/12872-9442
PDF

Joshi Rana, Amanpreet Kaur, Nitin Malik . Network based Steganography. International Journal of Computer Applications. 74, 4 (July 2013), 12-16. DOI=10.5120/12872-9442

                        @article{ 10.5120/12872-9442,
                        author  = { Joshi Rana,Amanpreet Kaur,Nitin Malik },
                        title   = { Network based Steganography },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 74 },
                        number  = { 4 },
                        pages   = { 12-16 },
                        doi     = { 10.5120/12872-9442 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Joshi Rana
                        %A Amanpreet Kaur
                        %A Nitin Malik
                        %T Network based Steganography%T 
                        %J International Journal of Computer Applications
                        %V 74
                        %N 4
                        %P 12-16
                        %R 10.5120/12872-9442
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography, introduced in 2003, is a techniques used for hidden communication between two covert parties. It is an art of hidden communication. It also relates to the areas like network protocols and security for practical data hiding in communication networks using Transmission Control Protocol/Internet Protocol (TCP/IP). The typical steganographic method utilizes digitized media files (images, video and audio files) as a cover medium for hiding data, network steganography uses communication protocols such as TCP/IP. Such methods make it harder to detect and eliminate. In a typical steganography using network the modification of a single network protocol occurs. Such modification can be applied to the Protocol Data Unit. Network steganography sheltersa broad spectrum of techniques.

References
  • "Hide and Seek: An Introduction to Steganography", IEEE Computer Society, May/June 2003.
  • ElizbietaZielinska and Krzysztof Szczypiorski, "Direct Sequence Spread Spectrum Steganographic Scheme for IEEE 802. 15. 4", IEEE International Conference on Multimedia Information Networking and Security, 2011.
  • Pukhraj Singh. "Whispers On The Wire: Network Based Covert Channels", http://gray-world. net/papers/pukhrajsingh_covert. doc
  • Michael T. Raggo , "Steganography", DefCon 12, Aug. 2004
  • Donovan Artz, "Digital Steganography: hiding data within data", IEEE Internet Computing, May/June 2001, pp. 1089-7801
  • "Steganography", http://en. wikipedia. org/wiki/Steganography
  • Craig H. Rowland, "Covert Channels in the TCP/IP Protocol Suite", First Monday, Vol. 2, No. 5, May 1997, http://firstmonday. org/ojs/index. php/fm/article/view/528/449
  • PrabhakarMateti, "TCP Exploits", http://www. cs. wright. edu/people/faculty/pmateti/InternetSecurity/Lectures/TCPexploits/
  • "Network Steganography and Anomaly Detection", http://stegano. net/network-steganography. html
  • Tariq Jamil, "Steganography, the art of hidden information in plain sight", IEEE Potentials, Feb/March 1999, ISSN 0278-6648
  • Arvindkumar and K. M. Pooja, "Steganography data hidden technique", International Journal of Computer Application, Volume 9, November 2007.
  • Neil F. Johnson, "Information Hiding: Steganography & Digital Watermarking", http://www. jjtc. com/Steganography
  • S. K. Pal, P. K. Saxena and S. K. Muttoo, "Image Steganography For Wireless Networks Using The Hadamard Transform", International Conference on Signal Processing and Communications, 2004.
  • Anand S Nair, Arijit Sur and Sukumar Nandi, "Detection of Packet Length Based Network Steganography", IEEE International Conference on Multimedia Information Networking and Security, 2010
  • WbStego Steganography Tool, http://wbstego. wbailer. com/, March 2004.
  • Anand S Nair, Abhishek Kumar, Arijit Su and Sukumar Nandi, "Length Based Network Steganography using UDP Protocol", IEEE, 2011.
  • WojciechFr?czek, WojciechMazurczyk and Krzysztof Szczypiorski, "How Hidden Can Be Even More Hidden?, IEEE International Conference on Multimedia Information Networking and Security, 2011.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Network Steganography cryptography TCP/IP Covert channel Steganalysis

Powered by PhDFocusTM