We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.MM

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Multimedia

Title: Trends toward real-time network data steganography

Abstract: Network steganography has been a well-known covert data channeling method for over three decades. The basic set of techniques and implementation tools have not changed significantly since their introduction in the early 1980's. In this paper, we review the predominant methods of classical network steganography, describing the detailed operations and resultant challenges involved in embedding data in the network transport domain. We also consider the various cyber threat vectors of network steganography and point out the major differences between classical network steganography and the widely known end-point multimedia embedding techniques, which focus exclusively on static data modification for data hiding. We then challenge the security community by introducing an entirely new network dat hiding methodology, which we refer to as real-time network data steganography. Finally we provide the groundwork for this fundamental change of covert network data embedding by forming a basic framework for real-time network data operations that will open the path for even further advances in computer network security.
Comments: 20 pages introducing the concept of real-time network steganography
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
Cite as: arXiv:1604.02778 [cs.MM]
  (or arXiv:1604.02778v1 [cs.MM] for this version)

Submission history

From: James Collins [view email]
[v1] Mon, 11 Apr 2016 02:58:06 GMT (1238kb)

Link back to: arXiv, form interface, contact.