2012
DOI: 10.1016/j.jnca.2011.10.003
|View full text |Cite
|
Sign up to set email alerts
|

A framework for avoiding steganography usage over HTTP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 23 publications
0
5
0
1
Order By: Relevance
“…Alas, objects exchanged via HTTP can still contain hidden data. In this case, ad-hoc proxies can be deployed to check inline objects against steganographic contents and sanitize them [57]. This requires a non-negligible amount of computing resources and also accounts for the presence of specific detectors/sanitizers for each considered inline object (e.g., protocol headers, images, audio, video and additional plugins).…”
Section: Elimination and Limitationmentioning
confidence: 99%
“…Alas, objects exchanged via HTTP can still contain hidden data. In this case, ad-hoc proxies can be deployed to check inline objects against steganographic contents and sanitize them [57]. This requires a non-negligible amount of computing resources and also accounts for the presence of specific detectors/sanitizers for each considered inline object (e.g., protocol headers, images, audio, video and additional plugins).…”
Section: Elimination and Limitationmentioning
confidence: 99%
“…Authors proposed an attack using discrete spring transform which will only distort the numerical value of the carrier media while keeping visual quality in a high level. Blasco, Jorge, et al [25] suggest a framework to forbid the steganography usage through HTTP. Different sanitizers that eliminate hidden content from any kind of information transmitted through HTTP were proposed.…”
Section: Related Workmentioning
confidence: 99%
“…У цьому методі для прихованої передачі даних можуть бути використані різні характеристики HTTP-повідомлень. До них належать модифікації порядку заголовків, їх структури та змісту [8,9]. Програмна модель, яка реалізує метод МС-HTTP, відповідає клієнт-серверній архітектурі: на стороні клієнта повідомлення перетворюється у двійковий формат і кодується як пробіли всередині HTTP-заголовків запитів.…”
Section: і огляд реалізованих методів мережної стеганографіїunclassified