network steganography
Recently Published Documents


TOTAL DOCUMENTS

51
(FIVE YEARS 5)

H-INDEX

4
(FIVE YEARS 0)





2021 ◽  
Vol 70 (1) ◽  
pp. 38-42
Author(s):  
К.Е. Коромыслов

This report will provide basic information on the network steganography method based on deliberate time delays. The main attention will be paid to the description of this method, its features, practical implementation and detection methods. As a result, two main methods of detecting this method are described, as well as the experimental implementation of one of them.



Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2128
Author(s):  
Milosz Smolarczyk ◽  
Krzysztof Szczypiorski ◽  
Jakub Pawluk

This paper presents a new method for steganography detection in network protocols. The method is based on a multilayer approach for the selective analysis of derived and aggregated metrics utilizing machine learning algorithms. The main objective is to provide steganalysis capability for networks with large numbers of devices and connections. We discuss considerations for performance analysis and present results. We also describe a means of applying our method for multilayer detection of a popular RSTEG (Retransmission Steganography) technique.



2020 ◽  
Author(s):  
Moses Okello

This Paper presents improvement and extension of previous methodology about timing steganography based on network steganography. The previous article uses time interval between two successive transmissions mixed with cryptography prior to hiding. However this improvement tend to extend and provide new methods based on time format such as hours, minutes, second, millisecond and Nanosecond etc. It further examine how to handle effect of different time zone and high precision timing for ultrafast timing such as millisecond, Nanoseconds, picosecond, femtosecond which human action is too slow for perfect timing. In addition, the extension based on TCP-IP status codes where each elements of set of status code are index and the index represents certain numeric of combination for hiding. Finally, the cryptography method is improved and extended to series based cryptography with any defined number of different cryptographic methods combined altogether with multiple keys generated dynamically. The methods for both cryptography and steganography was integrated and each module carefully tested for their feasibility and appropriate analysis, comparisons is presented too.<br>



2020 ◽  
Author(s):  
Moses Okello

This Paper presents improvement and extension of previous methodology about timing steganography based on network steganography. The previous article uses time interval between two successive transmissions mixed with cryptography prior to hiding. However this improvement tend to extend and provide new methods based on time format such as hours, minutes, second, millisecond and Nanosecond etc. It further examine how to handle effect of different time zone and high precision timing for ultrafast timing such as millisecond, Nanoseconds, picosecond, femtosecond which human action is too slow for perfect timing. In addition, the extension based on TCP-IP status codes where each elements of set of status code are index and the index represents certain numeric of combination for hiding. Finally, the cryptography method is improved and extended to series based cryptography with any defined number of different cryptographic methods combined altogether with multiple keys generated dynamically. The methods for both cryptography and steganography was integrated and each module carefully tested for their feasibility and appropriate analysis, comparisons is presented too.<br>





Sign in / Sign up

Export Citation Format

Share Document