Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
5 pages
1 file
This Paper presents improvement and extension of previous methodology about timing steganography based on network steganography. The previous article uses time interval between two successive transmissions mixed with cryptography prior to hiding. However this improvement tend to extend and provide new methods based on time format such as hours, minutes, second, millisecond and Nanosecond etc. It further examine how to handle effect of different time zone and high precision timing for ultrafast timing such as millisecond, Nanoseconds, picosecond, femtosecond which human action is too slow for perfect timing. In addition, the extension based on TCP-IP status codes where each elements of set of status code are index and the index represents certain numeric of combination for hiding. Finally, the cryptography method is improved and extended to series based cryptography with any defined number of different cryptographic methods combined altogether with multiple keys generated dynamically...
2020
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embeds a bit of data in each pair that includes two non-identical packet lengths. In the current situation, if the first packet length of the pair is larger than the second one, it shows a ‘1’ bit and otherwise, it shows a ‘0’ bit. If the intended bit of the sender is in conflict with the current status, he/she will create the desired status by swapping the packet lengths. In this method, the paired packets can be selected freely, but in the second proposed method, the packets are divided into buckets and only packets within a single bucket can be paired together. In this case, the embedding metho...
Proceedings of the International Conference & Workshop on Emerging Trends in Technology - ICWET '11, 2011
Steganography is the efficient technique to provide secure data transmission over the network, as the number of users increases effectively. The cryptography is also used to provide security to data over network, but transmission of secured message may be detectable to third party. From security point of view, steganography does not allow to detect the presence of hidden secret other than indeed user, over the communication channel. In this paper, we design a system, which uses features of both cryptography as well as steganography, where TCP/IP header is used as a steganographic carrier to hide encrypted data. Steganography is a useful tool that allows covert transmission of information over the communications channel.
Procedia Computer Science, 2020
Steganography is a technique of hiding secret data inside a cover. The most popularly used cover media include images, videos, audios, documents and network protocols. Network Steganography is a technique that uses common network protocols (the header field, the payload field or both) to hide a secret message. TCP/IP protocol suite has been a potential target for network steganography from the very beginning. It has a lot of possibilities for creation of hidden channels that can be used to communicate covertly. In this paper, we propose a technique that creates a covert channel using the Overflow field of Timestamp option of Internet Protocol, version 4 over a Local Area Network. This technique implements a storage based network steganography that uses the timestamp option which is used for debugging and measurement over the networks. In this technique, we use legitimate values in the Overflow field which makes it difficult to detect the possibility of covert communication.
Engineering, Technology & Applied Science Research, 2018
Nowadays we are witnessing a total convergence towards a digital world where information is digitized, conveyed and processed using highly developed techniques and tools. The development of broadband networks, including the internet, has made easy the manipulation, transmission and sharing of information. However, new security issues arise and they are particularly related to integrity, confidentiality and traceability of data. Facing this situation, network security has become very important and challenges related to the protection of exchanged data over the internet against unauthorized access and use have increased. In the current work, we propose to implement an optimized steganography technique over TCP/IP protocol [1]. We have also tested it against well-known security equipment using latest versions. We will see that they are inefficient to stop this kind of cover channels. Our work is like an alarm to every IT administrator to change their thinking about data lost prevention...
2011
This paper describes steganographic timing channels that use cryptographic primitives to hide the presence of covert channels in the timing of network traffic. We have identified two key properties for steganographic timing channels: (1) the parameters of the scheme should be cryptographically keyed, and (2) the distribution of input timings should be indistinguishable from output timings. These properties are necessary (although we make no claim they are sufficient) for the undetectability of a steganographic timing channel. Without them, the contents of the channel can be read and observed by unauthorized persons, and the presence of the channel is trivially exposed by noticing large changes in timing distributions-a previously proposed methodology for covert channel detection. Our steganographic timing scheme meets the secrecy requirement by employing cryptographic keys, and we achieve a restricted form of input/output distribution parity. Under certain distributions, our schemes conforms to a uniformness property; input timings that are uniformly distributed modulo a timing window are indistinguishable from output timings, measured under the same modulo. We also demonstrate that our scheme is practical under real network conditions, and finally present an empirical study of its covertness using the firstorder entropy metric, as suggested by Gianvecchio and Wang [8], which is currently the best published practical detection heuristic for timing channels.
International Journal of Engineering Research and Technology (IJERT), 2016
https://www.ijert.org/application-of-steganography-and-cryptography-for-secured-data-communication-a-review https://www.ijert.org/research/application-of-steganography-and-cryptography-for-secured-data-communication-a-review-IJERTV5IS040354.pdf The need for security in data communication is as long as mankind; since eavesdroppers often intercept such communication for malicious purposes. Several techniques such as steganography and cryptography have been employed to hide the existence of communication and scramble such communication making it difficult to interpret in cases where steganography fails. Combining Cryptography and steganography has proven to have taken data communication security to another level. In this work, a review of these techniques is presented with major focus on two journals titled "Dual Layer Security of Data Using LSB Image Steganography Method and AES Encryption Algorithm" [1] and "An Efficient Data Hiding Scheme Using Steganography and Cryptography Technique" [2]were considered for review. A brief description of the techniques is provided. It is found that these techniques could improve security of data communication beyond the present levels if properly combined with little or no performance degradation.
— The two important aspects of security that deal with transmitting information or data over some medium like internet are cryptography and steganography. Cryptography results in converting plain text into cipher text which is in unreadable or in non-explanatory form, difficult to be guessed by eavesdropper, Steganography on the other hand hides the secret data into carrier medium in such a way that its detection is prevented. Steganography is not a replacement of cryptography but can supplement it to produce good results. It is observed that steganography and cryptography alone is not sufficient for information security, so we can make more secure and robust approach by combining the best of both techniques. This paper describes the various steganography techniques combined with cryptography.
International Journal of Advanced Computer Science and Applications, 2014
The two important aspects of security that deal with transmitting information or data over some medium like Internet are steganography and cryptography. Steganography deals with hiding the presence of a message and cryptography deals with hiding the contents of a message. Both of them are used to ensure security. But none of them can simply fulfill the basic requirements of security i.e. the features such as robustness, undetectability and capacity etc. So a new method based on the combination of both cryptography and steganography known as Crypto-Steganography which overcome each other's weaknesses and make difficult for the intruders to attack or steal sensitive information is being proposed. This paper also describes the basics concepts of steganography and cryptography on the basis of previous literatures available on the topic.
The Art of secret writing has a long history and with the advent of computer science it has taken a different practice with application areas related to security and authentication. Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out of the usual. This paper presents an overview of steganography model and the general principle behind its usage with a focus on model based on Key generation Unit. The focus is given on different techniques to hide secret messages into images. Applications of steganography are digital watermarking, secure communication, signature authentication and data storage and linkage.
International Journal on Data Science and Technology, 2017
Internet communication become the need of entire world, today internet is like a recourse of power that is used to run human life. The users, as a layman, may not know that internet, a way of communication, as the use of internet is increasing also data and information that is traveling through internet is increasing by every passing day every minute. In an internet environment where every user need security about their data and information that they want to share with other, such environment requires secrecy and security to safeguard the privacy. There are many approaches available that can be adopted to provide user data security, Steganography is one of the techniques which offer sufficient platform to tackle this aspect in a suitable way. The working is very easy; the information (data) can be hidden inside the other information (data) while viewers may see the cover and hidden data will be known to intended viewers only that know the way of decryption that is adopted at sender side. In simple world two images are selected, one as cover and other as message carrier, but the view and size of original image may not be changed. This paper discusses certain technique and algorithms in context to Least Significant Bit (LSB) and ascertains possible depth of LSB usage where the distortion of image starts and attracts the attacker/ hacker. It became a unique way of information hiding by merging images with cipher data or plain text.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Advances in Multidisciplinary and scientific Research Journal Publication
International journal of engineering research and technology, 2017
International Conference …, 2008
International Journal of Innovative Research in Science, Engineering and Technology, 2014
Baghdad Science Journal, 2022