Peer-reviewed articles 17,970 +



Title: THE USE OF NETWORK PROTOCOLS FOR STEGANOGRAPHICAL PURPOSES

THE USE OF NETWORK PROTOCOLS FOR STEGANOGRAPHICAL PURPOSES
L. Krajnik;R. Ambroziak
1314-2704
English
17
21
Network steganography could be used to try to send secret information using computer networks. Transfer of secret information must be carried out in a manner that is hard to detect and compromise covered communication in this way. Only the entities involved in such correspondence should have the right to read the content of message. For other observers, such data exchange should not arise any suspicion. Currently, a lot of interest among scientists is paid to topics of assessment of the suitability of various network protocols for the purpose of carrying out with their help the exchange of classified information. In the literature you can find many items proposing to utilize various network protocols, often supported by the presentation of the application and evaluation of parameters characterizing the proposed method. Among the network protocols described as fit for use steganographical techniques literature represents, among others, as follows:
1. IP - examples described in the literature methods using IP protocol header fields, i.e. IP Identification Field, Do Not Fragment Field (DF);
2. TCP - literature presents several proposals for use TCP initial sequence number (ISN) to hide information;
3. ARP - Address Resolution Protocol - an application PadSteg proposed in [1] uses the ARP request message in steganographical purposes;
4. UDP - although it does not have mechanisms assuring errorless communication can also be the base for the exchange of hidden information;
5. RTP - Real-time Transfer Protocol - is used in most applications that support IP telephony, and generally allows the transfer of audio and video in real time.
These protocols, of course, do not exhaust the pool is used for steganographical purposes. Development of new efficient methods of network steganography on the one hand directly expand the capacity to carry out covert exchange of information and the other will affect the development of the field of complementary steganography, or steganalysis. In the era of continuous and ubiquitous exchange of information in a digital representation steganography next to cryptography will be a key tool in the security of data transmission in computer networks.
conference
17th International Multidisciplinary Scientific GeoConference SGEM 2017
17th International Multidisciplinary Scientific GeoConference SGEM 2017, 29 June - 5 July, 2017
Proceedings Paper
STEF92 Technology
International Multidisciplinary Scientific GeoConference-SGEM
Bulgarian Acad Sci; Acad Sci Czech Republ; Latvian Acad Sci; Polish Acad Sci; Russian Acad Sci; Serbian Acad Sci & Arts; Slovak Acad Sci; Natl Acad Sci Ukraine; Natl Acad Sci Armenia; Sci Council Japan; World Acad Sci; European Acad Sci, Arts & Letters; Ac
695-702
29 June - 5 July, 2017
website
cdrom
3017
steganography; information hiding; information concealing

25th SGEM International Conference on Earth & Planetary Sciences


International GeoConference SGEM2025
27 June - 6 July, 2025 / Albena, Bulgaria

Read More
   

SGEM Vienna GREEN "Green Science for Green Life"


Extended Scientific Sessions SGEM Vienna GREEN
3 -6 December, 2025 / Vienna, Austria

Read More
   

A scientific platform for Art-Inspired Scientists!


The Magical World Where Science meets Art
Vienna, Austria

Read More