A survey of network protocol based steganographic techniques

Citation

Abdullaziz Ibrahiem, Osamah Ibrahiem and Goh, Vik Tor and Ling, Huo Chong (2014) A survey of network protocol based steganographic techniques. In: Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Institute for Mathematical Research (INSPEM), pp. 229-235. ISBN 978-983440694-3

Full text not available from this repository.

Abstract

Steganography is a sub-discipline of information hiding, which hides external information into an innocuous carrier to establish stealthy communication. Steganography in network protocols however, is an emerging research area, which exploits network protocols specifications, protocol mechanisms, network applications, and network services to realize covert channels between network end-systems. In this paper, we aim to clarify topics related to information hiding and its applications especially steganography. We also provide a brief comparison between steganography and cryptography. Eventually, we categorize and present some of the current work related steganography in networks.

Item Type: Book Section
Additional Information: 4th International Cryptology and Information Security Conference 2014, Cryptology 2014; Putrajaya; Malaysia; 24 June 2014 through 26 June 2014
Subjects: Q Science > QA Mathematics > QA71-90 Instruments and machines > QA75.5-76.95 Electronic computers. Computer science
T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Faculty of Engineering (FOE)
Depositing User: Ms Nurul Iqtiani Ahmad
Date Deposited: 08 Apr 2015 05:16
Last Modified: 25 Aug 2021 08:42
URII: http://shdl.mmu.edu.my/id/eprint/6159

Downloads

Downloads per month over past year

Loading...
View Item
View Item
Edit (login required)