CFP last date
20 January 2025
Reseach Article

An Overview of Advanced Network Steganography

by Maitrik K Shah, Ankitkumar M. Virparia, Kamal Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 21
Year of Publication: 2015
Authors: Maitrik K Shah, Ankitkumar M. Virparia, Kamal Sharma
10.5120/20871-3364

Maitrik K Shah, Ankitkumar M. Virparia, Kamal Sharma . An Overview of Advanced Network Steganography. International Journal of Computer Applications. 118, 21 ( May 2015), 23-26. DOI=10.5120/20871-3364

@article{ 10.5120/20871-3364,
author = { Maitrik K Shah, Ankitkumar M. Virparia, Kamal Sharma },
title = { An Overview of Advanced Network Steganography },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 21 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number21/20871-3364/ },
doi = { 10.5120/20871-3364 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:02:22.215923+05:30
%A Maitrik K Shah
%A Ankitkumar M. Virparia
%A Kamal Sharma
%T An Overview of Advanced Network Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 21
%P 23-26
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the art and science of hiding the information in the carrier object. The main objective of steganography is to hide the existence of data. Lots of advancements has been done in the use of carrier medium, started from image, sound, video and network packets and protocols. Information hiding inside image, audio and video is often called digital steganography whereas if network packets and/or protocols are used then it is called network steganography. Using this technique we can send small amount of information confidentially. Here in this paper, various approaches towards network steganography and current status of research in this field are discussed.

References
  1. C. Rowland 1997. Covert channels in TCP/IP protocol suite. Peer reviewed journal on Internet, January 1997.
  2. Theodore G. Handel, Maxwell T Sanford, "Data hiding in the OSI Network model", First International workshop on Information Hiding,
  3. Bartosz Jankowski, Wojciech Mazurczyk, Krzysztof Szczypiorski. Information Hiding Using Improper Frame Padding. Telecommunications Network Strategy and Planning Symposium (NETWORKS), 2010 14th International
  4. Shah, M. K. and Patel, S. B, "Network based packet watermarking using TCP/IP protocol suite," NUiCONE, Nirma University, IEEE 2011
  5. IWojciech Mazurczyk and Krzysztof Szczypiorski, "Steganography in Handling Over- sized IP Packets". Proc. Int. Conf. Multime. Inf. Network Security MINS-2009.
  6. Osamah Ibrahiem Abdullaziz, Vik Tor Goh,Huo-Chong Ling and KokSheik Wong, Network Packet payload parity based Steganography, 2013 IEEE conference on sustainable utilization and development in Engineering and Technology
  7. K. Szczypiorski, "HICCUPS: Hidden Communication System for Corrupted Networks," Proc. 10th Int'l. Multi- Conf. Advanced Computer Systems, Oct. 2003, pp. 31–40.
  8. Dhananjay M Dakhane, Dr Prashant R Deshmukh, "New approach towards covert communication using TCP SQN reference model", International journal of innovative research & development, September 2014, Vol 3 Issue 9.
  9. X. Luo, Edmond W. W. Chan, and Rocky K. C. Chang, "CLACK: A network covert channel based on partial acknowledgment encoding," IEEE International Conference on Communications, pp. 1-5, 2009.
  10. Mazurczyk, W. , Smolarczyk, M. , Szczypiorski, K. (2009) Retransmission steganography and its detection. vSoft Computing, Journal no. 500 Springer, ISSN: 1432-7643 (print version), ISSN: 1433-7479 (electronic version), November 2009
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Network Steganography Network Protocols Covert communication covert channels information hiding.