DocumentCode :
2660019
Title :
How Hidden Can be Even More Hidden?
Author :
Fraczek, W. ; Mazurczyk, Wojciech ; Szczypiorski, Krzysztof
Author_Institution :
Inst. of Telecommun., Warsaw Univ. of Technol., Warsaw, Poland
fYear :
2011
fDate :
4-6 Nov. 2011
Firstpage :
581
Lastpage :
585
Abstract :
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors´ best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram extraction harder to perform.
Keywords :
data encapsulation; steganography; deep hiding technique; network steganography method; steganogram extraction; steganographic communication; Bandwidth; IP networks; Protocols; Receivers; Scattering; Security; deep hiding techniques; information hiding; inter-protocol steganography; multi-level steganography; network steganography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multimedia Information Networking and Security (MINES), 2011 Third International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4577-1795-6
Type :
conf
DOI :
10.1109/MINES.2011.97
Filename :
6103840
Link To Document :
بازگشت