Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 5
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

This research proposes a method to enhance the payload message by embedding messages on the dilated edge areas by the Least Significant Bit (LSB) method. To add security aspects to messages, messages are not embedded directly on the LSB but encrypted with XOR operations with Most Significant Bit (MSB). The experimental results of the test in this study showed that the dilation process to some extent can increase the payload of 18.65% and the average bpp is 1.42 while maintaining the imperceptibilty quality of stego image with an average PSNR value of about 47 dB, SSIM is 0.9977 and MSE is 1.13.

Go to article

Authors and Affiliations

De Rosal Ignatius Moses Setiadi
Download PDF Download RIS Download Bibtex

Abstract

Extensive use of computer networks is associated with the development of various effective methods that are suitable for hiding information in the contents transferred over the network. These methods are described as network steganography. Since web applications use HTTP protocol to transmit the requests to the server and send the answers to the final recipient, specifically HTTP protocol is ideal for hiding information. For example, there are several methods that can be used to transmit the additional content in the HTTP header. In this paper, we present authors’ evaluation method for network steganography using HTTP specific properties and evaluate the effectiveness of some techniques, providing experimental results.

Go to article

Authors and Affiliations

Paweł Buchwald
Maciej Rostański
Krystian Mączka
Download PDF Download RIS Download Bibtex

Abstract

Steganography is a technique that allows hidden transfer of data using some media such as Image, Audio, Video, Network Protocol or a Document, without its existence getting noticed. Over the past few years, a lot of research has been done in the field of Image, Video and Audio Steganography but very little work has been done in Network Steganography. A Network Steganography technique hides data in a Network Data Unit, i.e., a Network Protocol Packet. In this paper we present an algorithm ARPNetSteg that implements Network Steganography using the Address resolution protocol. Our technique is a robust technique that can transfer 44 bits of covert data per ARP reply packet.

Go to article

Authors and Affiliations

Punam Bedi
Arti Dua
Download PDF Download RIS Download Bibtex

Abstract

Wireless Local Area Networks present several vulnerabilities that are exploited, and as a result, numerous attacks have been developed and used against them. Although countermeasures to detect and eliminate such threats have been created throughout the years, few methods exist to prevent the attacks. IEEE 802.11 covert channels could be considered a candidate to prevent Wi-Fi attacks since they allow secret communication between the client station and the access point without establishing an association. They can be implemented in frames that attackers do not target. This paper presents a new covert channel that prevents Wi-Fi attacks. We also describe metrics, and discuss the performance results of the proposed solution. We show that the new protocol is able to achieve high efficiency of operation.
Go to article

Authors and Affiliations

Geovani Teca
1
Marek Natkaniec
1

  1. Faculty of Computer Science, Electronics and Telecommunications, Institute of Telecommunications, AGH University of Science and Technology, Al. Mickiewicza 30, 30-059 Krakow, Poland
Download PDF Download RIS Download Bibtex

Abstract

The paper presents the analysis of the Commercial Off-The-Shelf (COTS) software regarding the ability to be used in audio steganography techniques. Such methods are a relatively new tool for hiding and transmitting crucial information, also being used by hackers. In the following work, the publicly available software dedicated to audio steganography is examined. The aim was to provide the general operating model of the information processing in the steganographic effort. The embedding method was analyzed for each application, providing interesting insights and allowing classifying the methods. The results prove that it is possible to detect the hidden message within the specific audio file and identify the technique that was used to create it. This may be exploited further during the hacking attack detection and prevention.
Go to article

Authors and Affiliations

Piotr Marszałek
1
Piotr Bilski
2
ORCID: ORCID

  1. Doctoral School, Warsaw University of Technology, Warsaw, Poland
  2. Warsaw University of Technology, Warsaw, Poland

This page uses 'cookies'. Learn more