CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Network based Steganography

by Joshi Rana, Amanpreet Kaur, Nitin Malik
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 74 - Number 4
Year of Publication: 2013
Authors: Joshi Rana, Amanpreet Kaur, Nitin Malik
10.5120/12872-9442

Joshi Rana, Amanpreet Kaur, Nitin Malik . Network based Steganography. International Journal of Computer Applications. 74, 4 ( July 2013), 12-16. DOI=10.5120/12872-9442

@article{ 10.5120/12872-9442,
author = { Joshi Rana, Amanpreet Kaur, Nitin Malik },
title = { Network based Steganography },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 74 },
number = { 4 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 12-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume74/number4/12872-9442/ },
doi = { 10.5120/12872-9442 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:41:20.440738+05:30
%A Joshi Rana
%A Amanpreet Kaur
%A Nitin Malik
%T Network based Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 74
%N 4
%P 12-16
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography, introduced in 2003, is a techniques used for hidden communication between two covert parties. It is an art of hidden communication. It also relates to the areas like network protocols and security for practical data hiding in communication networks using Transmission Control Protocol/Internet Protocol (TCP/IP). The typical steganographic method utilizes digitized media files (images, video and audio files) as a cover medium for hiding data, network steganography uses communication protocols such as TCP/IP. Such methods make it harder to detect and eliminate. In a typical steganography using network the modification of a single network protocol occurs. Such modification can be applied to the Protocol Data Unit. Network steganography sheltersa broad spectrum of techniques.

References
  1. "Hide and Seek: An Introduction to Steganography", IEEE Computer Society, May/June 2003.
  2. ElizbietaZielinska and Krzysztof Szczypiorski, "Direct Sequence Spread Spectrum Steganographic Scheme for IEEE 802. 15. 4", IEEE International Conference on Multimedia Information Networking and Security, 2011.
  3. Pukhraj Singh. "Whispers On The Wire: Network Based Covert Channels", http://gray-world. net/papers/pukhrajsingh_covert. doc
  4. Michael T. Raggo , "Steganography", DefCon 12, Aug. 2004
  5. Donovan Artz, "Digital Steganography: hiding data within data", IEEE Internet Computing, May/June 2001, pp. 1089-7801
  6. "Steganography", http://en. wikipedia. org/wiki/Steganography
  7. Craig H. Rowland, "Covert Channels in the TCP/IP Protocol Suite", First Monday, Vol. 2, No. 5, May 1997, http://firstmonday. org/ojs/index. php/fm/article/view/528/449
  8. PrabhakarMateti, "TCP Exploits", http://www. cs. wright. edu/people/faculty/pmateti/InternetSecurity/Lectures/TCPexploits/
  9. "Network Steganography and Anomaly Detection", http://stegano. net/network-steganography. html
  10. Tariq Jamil, "Steganography, the art of hidden information in plain sight", IEEE Potentials, Feb/March 1999, ISSN 0278-6648
  11. Arvindkumar and K. M. Pooja, "Steganography data hidden technique", International Journal of Computer Application, Volume 9, November 2007.
  12. Neil F. Johnson, "Information Hiding: Steganography & Digital Watermarking", http://www. jjtc. com/Steganography
  13. S. K. Pal, P. K. Saxena and S. K. Muttoo, "Image Steganography For Wireless Networks Using The Hadamard Transform", International Conference on Signal Processing and Communications, 2004.
  14. Anand S Nair, Arijit Sur and Sukumar Nandi, "Detection of Packet Length Based Network Steganography", IEEE International Conference on Multimedia Information Networking and Security, 2010
  15. WbStego Steganography Tool, http://wbstego. wbailer. com/, March 2004.
  16. Anand S Nair, Abhishek Kumar, Arijit Su and Sukumar Nandi, "Length Based Network Steganography using UDP Protocol", IEEE, 2011.
  17. WojciechFr?czek, WojciechMazurczyk and Krzysztof Szczypiorski, "How Hidden Can Be Even More Hidden?, IEEE International Conference on Multimedia Information Networking and Security, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Network Steganography cryptography TCP/IP Covert channel Steganalysis