2014
DOI: 10.1109/mcom.2014.6815916
|View full text |Cite
|
Sign up to set email alerts
|

Principles and overview of network steganography

Abstract: Abstract. The paper presents basic principles of network steganography, which is a comparatively new research subject in the area of information hiding, followed by a concise overview and classification of network steganographic methods and techniques.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
51
0
3

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 77 publications
(54 citation statements)
references
References 13 publications
0
51
0
3
Order By: Relevance
“…The idea of using the underlying protocols or elements of the fundamental operation of the networks dates by to the early 1980's during the formation of the early Internet and the defining period for many network protocol definitions [3] [6]. In fact, a review of several key online databases shows that before the year 2000 only 25 papers discuss the topic of network steganography.…”
Section: Network Steganography Conceptsmentioning
confidence: 99%
See 3 more Smart Citations
“…The idea of using the underlying protocols or elements of the fundamental operation of the networks dates by to the early 1980's during the formation of the early Internet and the defining period for many network protocol definitions [3] [6]. In fact, a review of several key online databases shows that before the year 2000 only 25 papers discuss the topic of network steganography.…”
Section: Network Steganography Conceptsmentioning
confidence: 99%
“…Finally, in active mode, the messages can be completely modified even to the point of altering the semantic content or introducing distortive effects [9][11]. Network steganography is built upon this same prisoner-problem model [3]. The only major difference is that medium or cover file used is the network.…”
Section: Steganographymodelsmentioning
confidence: 99%
See 2 more Smart Citations
“…Стандартно выделяют три основные задачи информационной безопасности: конфиденциальность, целостность и доступность [21]. Конфиденциальность -это скрытие информации и ресурсов.…”
Section: обеспечение информационной безопасности облачных вычисленийunclassified