@ARTICLE{Buchwald_Paweł_Network_2014, author={Buchwald, Paweł and Rostański, Maciej and Mączka, Krystian}, volume={vol. 26}, number={No 3-4}, journal={Theoretical and Applied Informatics}, pages={177-187}, howpublished={online}, year={2014}, publisher={Committee of Informatics of Polish Academy of Science}, publisher={Institute of Theoretical and Applied Informatics of Polish Academy of Science}, abstract={Extensive use of computer networks is associated with the development of various effective methods that are suitable for hiding information in the contents transferred over the network. These methods are described as network steganography. Since web applications use HTTP protocol to transmit the requests to the server and send the answers to the final recipient, specifically HTTP protocol is ideal for hiding information. For example, there are several methods that can be used to transmit the additional content in the HTTP header. In this paper, we present authors’ evaluation method for network steganography using HTTP specific properties and evaluate the effectiveness of some techniques, providing experimental results.}, type={Article}, title={Network steganography method for user’s identity confirmation in web applications}, URL={http://journals.pan.pl/Content/118525/PDF/Network%20steganography%20method.pdf}, keywords={HTTP, network steganography, web applications}, }