Abstract
Steganography is defined as the art and science of hiding information, it takes one piece of information and hides it within another. The piece more used to hide information are the digital images. In this paper we present a way to use unused fields in the IP header of TCP/IP packets in order to send information between to nodes over Internet.
The work described here was supported by the Computer Security Research Group at TESM-CEM.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kanh, D.: The History of Steganography. Proceedings: Information Hiding. In: First International Workshop, Cambridge, UK, pp. 1–5 (1996)
Bender, W., et al.: Techniques for Data Hiding IBM Systems Journal 35(3&4), 313–336 (1996) 15. Craig H. Rowland, Covert Channels in the TCP/IP protocol suite. First Monday(2003)
RFC 793, Transmission Control Protocol, Darpa Internet Program, Protocol Specification (September 1981)
RFC 791 Internet Protocol, Darpa Internet Program, Protocol Specification (September 1981)
Simmons, G.J.: Prisoners problem and the subliminal channel., Advances in Cryptology. In: Chaum, D. (ed.) Advances in Cryptology: Proceedings of CRYPTO 1983, pp. 51–67. Plenum, New York (1983)
Johnson, N.F., Jajodia, S.: Steganalysis of Images Created Using Current Steganography Software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 273–289. Springer, Heidelberg (1998)
Marvel, L.M., Retter, C.T., Boncelet Jr., C.G.: Hiding information in images. In: International Conference on Image Processing (ICIP 1998), Chicago, Illinois, Vol. 3- Set-Vol. 2 October 04 - 07 (1998)
Johnson, N.F., Jajodia, S.: Steganalysis: The Investigation of Hidden Information. In: IEEE Information Technology Conference, Syracuse, New York, USA, September 1 - 3, pp. 113–116 (1998)
Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the Unseen. IEEE Computer 31(2), 26–34 (1998)
Marvel, L.M., Boncelet Jr., C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Transactions on Image Processing 8 (August 1999)
Jamil, T., Ahmad, A.: An Investigation into the application of Linear Feedback Shift Registers for Steganography SoutheastCon. In: Proceedings IEEE, April 5-7, pp. 239–244 (2002)
Petrovic, R., Winograd, J.M., Jemili, K., Metois, E.: Data hiding within audio signals Telecommunications in Modern Satellite, Cable and Broadcasting Services. In: 4th International Conference on 1999, October 13-15, vol. 1 (1999)
Gang, L., Akansu, A.N., Ramkumar, M.: MP3 resistant oblivious steganography Acoustics, Speech, and Signal Processing. In: IEEE International Conference on Proceedings (ICASSP 2001), May 7-11, vol. 3, pp. 1365–1368 (2001)
Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Communications of the ACM archive 47 (10), 76–82 (2004)
Fridrich, J., Goljan, M.: Practical steganalysis of digital images: state of the art. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 1–13 (April 2002)
Chandramouli, R., Subbalakshmi, K.P.: Active steganalysis of spread spectrum image steganography Circuits and Systems, ISCAS 2003. In: Proceedings of the 2003 International Symposium on, May 25-28, vol. 3 (2003)
Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography Comput. Lab. IEEE Journal on Communications 16 (4), 474–481 (1998)
Rowland, C.H.: Covert channels in the TCP/IP protocol suite. DoIS Documents in Information Science (May 1997)
Ahsan, K., Kundur, D.: Practical data hiding in TCP/IP. In: Proc. ACM Workshop on Multimedia Security (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cauich, E., Gómez Cárdenas, R., Watanabe, R. (2005). Data Hiding in Identification and Offset IP Fields. In: Ramos, F.F., Larios Rosillo, V., Unger, H. (eds) Advanced Distributed Systems. ISSADS 2005. Lecture Notes in Computer Science, vol 3563. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11533962_11
Download citation
DOI: https://doi.org/10.1007/11533962_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28063-7
Online ISBN: 978-3-540-31674-9
eBook Packages: Computer ScienceComputer Science (R0)