Citation
Abdullaziz Ibrahiem, Osamah Ibrahiem and Goh, Vik Tor and Ling, Huo Chong (2014) A survey of network protocol based steganographic techniques. In: Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Institute for Mathematical Research (INSPEM), pp. 229-235. ISBN 978-983440694-3 Full text not available from this repository.
Official URL: http://einspem.upm.edu.my/cryptology2014/
Abstract
Steganography is a sub-discipline of information hiding, which hides external information into an innocuous carrier to establish stealthy communication. Steganography in network protocols however, is an emerging research area, which exploits network protocols specifications, protocol mechanisms, network applications, and network services to realize covert channels between network end-systems. In this paper, we aim to clarify topics related to information hiding and its applications especially steganography. We also provide a brief comparison between steganography and cryptography. Eventually, we categorize and present some of the current work related steganography in networks.
Item Type: | Book Section |
---|---|
Additional Information: | 4th International Cryptology and Information Security Conference 2014, Cryptology 2014; Putrajaya; Malaysia; 24 June 2014 through 26 June 2014 |
Subjects: | Q Science > QA Mathematics > QA71-90 Instruments and machines > QA75.5-76.95 Electronic computers. Computer science T Technology > TK Electrical engineering. Electronics Nuclear engineering |
Divisions: | Faculty of Engineering (FOE) |
Depositing User: | Ms Nurul Iqtiani Ahmad |
Date Deposited: | 08 Apr 2015 05:16 |
Last Modified: | 25 Aug 2021 08:42 |
URII: | http://shdl.mmu.edu.my/id/eprint/6159 |
Downloads
Downloads per month over past year
Edit (login required) |