Nothing Special   »   [go: up one dir, main page]

Skip to main content

Data Hiding in Identification and Offset IP Fields

  • Conference paper
Advanced Distributed Systems (ISSADS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 3563))

Included in the following conference series:

Abstract

Steganography is defined as the art and science of hiding information, it takes one piece of information and hides it within another. The piece more used to hide information are the digital images. In this paper we present a way to use unused fields in the IP header of TCP/IP packets in order to send information between to nodes over Internet.

The work described here was supported by the Computer Security Research Group at TESM-CEM.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Kanh, D.: The History of Steganography. Proceedings: Information Hiding. In: First International Workshop, Cambridge, UK, pp. 1–5 (1996)

    Google Scholar 

  2. Bender, W., et al.: Techniques for Data Hiding IBM Systems Journal 35(3&4), 313–336 (1996) 15. Craig H. Rowland, Covert Channels in the TCP/IP protocol suite. First Monday(2003)

    Article  Google Scholar 

  3. RFC 793, Transmission Control Protocol, Darpa Internet Program, Protocol Specification (September 1981)

    Google Scholar 

  4. RFC 791 Internet Protocol, Darpa Internet Program, Protocol Specification (September 1981)

    Google Scholar 

  5. Simmons, G.J.: Prisoners problem and the subliminal channel., Advances in Cryptology. In: Chaum, D. (ed.) Advances in Cryptology: Proceedings of CRYPTO 1983, pp. 51–67. Plenum, New York (1983)

    Google Scholar 

  6. Johnson, N.F., Jajodia, S.: Steganalysis of Images Created Using Current Steganography Software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 273–289. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  7. Marvel, L.M., Retter, C.T., Boncelet Jr., C.G.: Hiding information in images. In: International Conference on Image Processing (ICIP 1998), Chicago, Illinois, Vol. 3- Set-Vol. 2 October 04 - 07 (1998)

    Google Scholar 

  8. Johnson, N.F., Jajodia, S.: Steganalysis: The Investigation of Hidden Information. In: IEEE Information Technology Conference, Syracuse, New York, USA, September 1 - 3, pp. 113–116 (1998)

    Google Scholar 

  9. Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the Unseen. IEEE Computer 31(2), 26–34 (1998)

    Google Scholar 

  10. Marvel, L.M., Boncelet Jr., C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Transactions on Image Processing 8 (August 1999)

    Google Scholar 

  11. Jamil, T., Ahmad, A.: An Investigation into the application of Linear Feedback Shift Registers for Steganography SoutheastCon. In: Proceedings IEEE, April 5-7, pp. 239–244 (2002)

    Google Scholar 

  12. Petrovic, R., Winograd, J.M., Jemili, K., Metois, E.: Data hiding within audio signals Telecommunications in Modern Satellite, Cable and Broadcasting Services. In: 4th International Conference on 1999, October 13-15, vol. 1 (1999)

    Google Scholar 

  13. Gang, L., Akansu, A.N., Ramkumar, M.: MP3 resistant oblivious steganography Acoustics, Speech, and Signal Processing. In: IEEE International Conference on Proceedings (ICASSP 2001), May 7-11, vol. 3, pp. 1365–1368 (2001)

    Google Scholar 

  14. Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Communications of the ACM archive 47 (10), 76–82 (2004)

    Article  Google Scholar 

  15. Fridrich, J., Goljan, M.: Practical steganalysis of digital images: state of the art. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 1–13 (April 2002)

    Google Scholar 

  16. Chandramouli, R., Subbalakshmi, K.P.: Active steganalysis of spread spectrum image steganography Circuits and Systems, ISCAS 2003. In: Proceedings of the 2003 International Symposium on, May 25-28, vol. 3 (2003)

    Google Scholar 

  17. Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography Comput. Lab. IEEE Journal on Communications 16 (4), 474–481 (1998)

    Google Scholar 

  18. Rowland, C.H.: Covert channels in the TCP/IP protocol suite. DoIS Documents in Information Science (May 1997)

    Google Scholar 

  19. Ahsan, K., Kundur, D.: Practical data hiding in TCP/IP. In: Proc. ACM Workshop on Multimedia Security (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cauich, E., Gómez Cárdenas, R., Watanabe, R. (2005). Data Hiding in Identification and Offset IP Fields. In: Ramos, F.F., Larios Rosillo, V., Unger, H. (eds) Advanced Distributed Systems. ISSADS 2005. Lecture Notes in Computer Science, vol 3563. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11533962_11

Download citation

  • DOI: https://doi.org/10.1007/11533962_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28063-7

  • Online ISBN: 978-3-540-31674-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics