A survey of network protocol based steganographic techniques

Osamah Ibrahiem Abdullaziz, Vik Tor Goh, Huo Chong Ling, Kok Sheik Wong

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Abstract

Steganography is a sub-discipline of information hiding, which hides external information into an innocuous carrier to establish stealthy communication. Steganography in network protocols however, is an emerging research area, which exploits network protocols specifications, protocol mechanisms, network applications, and network services to realize covert channels between network end-systems. In this paper, we aim to clarify topics related to information hiding and its applications especially steganography. We also provide a brief comparison between steganography and cryptography. Eventually, we categorize and present some of the current work related steganography in networks.

Original languageEnglish
Title of host publicationConference Proceedings - Cryptology 2014
Subtitle of host publicationProceedings of the 4th International Cryptology and Information Security Conference 2014
EditorsAinuddin Wahid Abdul Wahab, Hailiza Kamarul Haili, Ji-Jian Chin, Moesfa Soeheila Mohamad, Shekh Faisal Abdul Latip, Miin Huey Ang, Muhammad Reza Za'ba, Muhammad Rezal Kamel Ariffin, Faridah Yunos, Swee-Huay Heng, Bok Min Goi, Rabiah Ahmad, Yanbin Pan, Mohamad Rushdan Md. Said
PublisherInstitute for Mathematical Research (INSPEM)
Pages229-235
Number of pages7
ISBN (Electronic)9789834406943
Publication statusPublished - 2014
Externally publishedYes
EventInternational Cryptology and Information Security Conference 2014 - Putrajaya, Malaysia
Duration: 24 Jun 201426 Jun 2014
Conference number: 4th
https://einspem.upm.edu.my/cryptology2014/

Conference

ConferenceInternational Cryptology and Information Security Conference 2014
Abbreviated titleCryptology 2014
Country/TerritoryMalaysia
CityPutrajaya
Period24/06/1426/06/14
Internet address

Keywords

  • Covert channels
  • Information hiding
  • Network steganography

Cite this