Visible to the public Improving Data Hiding Methods in Network Steganography Based on Packet Header Manipulation

TitleImproving Data Hiding Methods in Network Steganography Based on Packet Header Manipulation
Publication TypeConference Paper
Year of Publication2021
AuthorsGanivev, Abduhalil, Mavlonov, Obid, Turdibekov, Baxtiyor, Uzoqova, Ma'mura
Conference Name2021 International Conference on Information Science and Communications Technologies (ICISCT)
Date Publishednov
KeywordsCommunication channels, Communications technology, covert channels, Human Behavior, human factors, information science, Internet, Named Data Network Security, network protocols, network steganography, Packet header manipulation, Protocols, pubcrawl, Receivers, resilience, Resiliency, Scalability, steganography
AbstractIn this paper, internet is among the basic necessities of life. Internet has changed each and everybody's lives. So confidentiality of messages is very important over the internet. Steganography is the science of sending secret messages between the sender and intended receiver. It is such a technique that makes the exchange of covert messages possible. Each time a carrier is to be used for achieving steganography. The carrier plays a major role in establishing covert communication channel. This survey paper introduces steganography and its carriers. This paper concentrates on network protocols to be used as a carrier of steganograms. There are a number of protocols available to do so in the networks. Network steganography describes various methods used for transmitting data over a network without it being detected. Most of the methods proposed for hiding data in a network do not offer an additional protection to the covert data as it is sent as plain text. This paper presents a framework that offers the protection to the covert data by encrypting it and compresses it for gain in efficiency.
DOI10.1109/ICISCT52966.2021.9670109
Citation Keyganivev_improving_2021