Title :
A Steganography Scheme in P2P Network
Author :
Li, Zishuai ; Sun, Xingming ; Wang, Baowei ; Wang, Xiaoliang
Author_Institution :
Sch. of Comput. & Commun., Hunan Univ., Changsha
Abstract :
With the extensive application of the peer-to-peer (P2P) network, the torrent file, a vital part of the BitTorrent P2P network, has become a very popular file format over the Internet. Through detailed analysis, we found that the torrent files are ideal host carriers of steganography. In this paper, we propose a steganography scheme for torrent files, in which two approaches, namely Letter Case Change (LCC) and Field Reusage (FR), are adopted to produce stego-torrent. In LCC, the insensitivity of letter case in torrent files is used to hide data. The approach doesn´t change the size of the torrent files, which allows for a high level of transparency and security. In FR, the structure redundancy of torrent files is exploited to embed information. The approach has a tremendous capacity. The flexible use of these two approaches can meet different needs. The experimental results show these methods are highly efficient and imperceptible.
Keywords :
Internet; cryptography; data encapsulation; peer-to-peer computing; BitTorrent; Internet; P2P network; field reusage; letter case change; peer-to-peer network; steganography; Application software; Computer networks; Data security; IP networks; Intelligent networks; Peer to peer computing; Signal processing; Steganography; Sun; Uniform resource locators; BitTorrent Network; P2P Network; Steganography; Torrent file;
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-0-7695-3278-3
DOI :
10.1109/IIH-MSP.2008.144