Review and Comparison of Network Steganography Methods Based On Different Classifications

Document Type : Original Article

Authors

alzahra university

Abstract

The growth of Internet and computer networks has led to the ease of information transfer. This development has also caused some problems due to the fact that in network environments, data may be snooped while transferring from the sender to the receiver. So, it is always necessary to provide information security and in order to achieve this goal, steganography plays an important role. Network steganography is a method that uses network protocols. Many techniques for network steganography have been suggested up to this time so that familiarity with different algorithms, as well as recognizing the advantages and disadvantages of each of them, are required for researchers in this field who wish to introduce a new approach to steganography or to propose a new method of steganalysis. In this paper, it has been attempted to describe the various ideas behind network steganography methods in terms of two different classifications, and the result of the research have been presented. Although it would be ideal to devise a method which satisfies the three steganography evaluation criteria: capacity, undetectability and robustness simultaneously, but bearing in mind the conflict between them, a method can be proposed for each application which excels in the criterion that is most relevant in that application.

Keywords


  1. H. Sajedi and Sh. R. Yaghoubi, “Review on Steganographic Methods in Texts,” 2018. (In Persian)##
  2. A. Stančić, I. Grgurevic, and V. Vyroubal, “Usage of the Steganography within Highway Information and Communication Network,” 4th International Virtual Research Conference In Technical Disciplines (RCITD 2016), Slovakia, 2016.##
  3. J. Zhai, M. Wang, G. Liu, and Y. Dai, “SkyLen: a           Skype-Based Length Covert Channel,” Journal of Information Hiding and Multimedia Signal Processing, vol. 6, no. 3, May 2015.##
  4. B. G. Banik and S. K. Bandyopadhyay, “Review on Steganography in Digital Media,” International Journal of Science and Research (IJSR), vol. 4, pp. 1-10, 2015.##
  5. M. M. Pontón Loaiza, “Steganography using RTP Packets,” University of Abertay Dundee, Dundee, September 2014.##
  6. A. P. Dhamade and K. J. Panchal, “Packet Data Based Network Steganography,” International Journal of Advance Engineering and Research Development, vol. 2, no. 5, pp. 1520-1526, May 2015.##
  7. A. NoorAzar, Z. Norouzi, and M. Mir, “Representing an Enhanced Method based on Image Steganography based on Linear Codes Features,” Journal of Electronic and Cyber Defence, vol. 5, no. 4, pp. 43-53, 2018. (In Persian)##

 8.     V. Sabeti, Sh, Samavi, and M. R. Ahmadzadeh, “Steganalysis of the Steganographic Method based on Pixels Value Differencing in Random Intervals using Neural Networks,” 14th National Conference of Computer Society of Iran, March 2009. (In Persian)##

  1. W. Mazurczyk, S. Wendzel, S. Zander, A. Houmansadr, and K. Szczypiorski, “Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures,” IEEE Press Series on Information & Communication Networks Security, 2016.##
  2. S. Wendzel, S. Zander, B. Fechner, and C. Herdin,       “Pattern-Based Survey and Categorization of Network Covert Channel Techniques,” ACM Computing Surveys (CSUR), vol. 47, no. 3, pp. 50-77, 2015.##
  3. J. P. Black, “Techniques of Network Steganography and Covert Channels”, Sciences, 2013.##
  4. J. Lubacz, W. Mazurczyk, and K. Szczypiorski, “Principles and Overview of Network Steganography,” IEEE Communications Magazine, vol. 52, no. 5, pp. 225-229, 2014.##
  5. M. Van Horenbeeck, “Deception on the Network: Thinking Differently About Covert Channels,” Proc. 7th Australian Info, Warfare and Security Conf., 2006.##
  6. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for Data Hiding,” IBM. System Journal, vol. 35, no. 3, pp. 313–336, 1996.##
  7. W. Mazurczyk and K. Szczypiorski, “Covert Channels in SIP for VoIP signaling,” Proc. of 4th International Conference on Global E-security, United Kingdom, pp. 65-72, June 2008.##
  8. W. Mazurczyk, M. Smolarczyk, and K. Szczypiorski. “Retransmission steganography and its detection,” Soft Computing, vol. 15, no. 3, pp. 505-515, 2011.##
  9. D. Kundur and K. Ahsan, “Practical Internet Steganography: Data Hiding in IP,” Proc. Texas Wksp. Security of Information Systems, 2003.##
  10. B. Jankowski, W. Mazurczyk, and K. Szczypiorski, “PadSteg: Introducing Inter-Protocol Steganography,” Telecommunication Systems, vol. 52, no. 2, pp. 1101-1111, 2013.##
  11. K. Szczypiorski, “Steganography in TCP/IP Networks,” State of the Art and a Proposal of a New System – HICCUPS, Institute of Telecommunications' seminar, Warsaw University of Technology, Poland, November 2003.##
  12. K. Szczypiorski and W. Mazurczyk, “Steganography in IEEE 802.11 OFDM Symbols,” International Journal of Security and Communication Networks, vol. 3, no. 2, pp. 118-129, 2011.##
  13. P. Bialczak, W. Mazurczyk, and K. Szczypiorski, “Sending Hidden Data via Google Suggest,” 2011.##
  14. W. Mazurczyk and K. Szczypiorski, “Steganography of VoIP streams”, OTM Confederated International Conferences, On the Move to Meaningful Internet Systems, pp. 1001-1018. Springer, Berlin, 2008.##
  15. W. Mazurczyk and J. Lubacz, “LACK: a VoIP steganographic method,” Telecommunication Systems: Modelling, Analysis, Design and Management, vol. 45, no. 2, pp. 153-163, 2010.##
  16. W. Mazurczyk, J. Lubacz, and K. Szczypiorski. “On steganography in lost audio packets,” International Journal of Security and Communication Networks, vol. 7, no. 12, pp. 2602-2615, 2014.##
  17. W. Mazurczyk, “Lost audio packets steganography: a first practical evaluation,” International Journal of Security and Communication Networks, vol. 5, no. 12, pp. 1394-1403, 2012.##
  18. W. Mazurczyk, M. Smolarczyk, and K. Szczypiorski. “On information hiding in retransmissions,” Telecommunication Systems, vol. 52, no. 2, pp. 1113-1121, 2013.##

27.  W. Mazurczyk, P. Szaga, and K. Szczypiorski, “Using Transcoding for Hidden Communication in IP Telephony,” Multimedia Tools and Applications, vol. 70, no. 3, pp.     2139-2165, 2014.##

  1. W. Fraczek, W. Mazurczyk, and K. Szczypiorski, “Stream Control Transmission Steganography,” arXiv preprint arXiv: 1006.0247, 2010.##
  2. B. Jankowski, W. Mazurczyk, and K. Szczypiorski, “Information Hiding Using Improper Frame Padding,” Telecommunications Network Strategy and Planning Symposium (NETWORKS), 2010 14th International. IEEE, 2010.##
  3. W. Fraczek, W. Mazurczyk, and K. Szczypiorski, “Multi-Level Steganography: Improving Hidden Communication in Networks,” Journal of Universal Computer Science (J. UCS), Journal of Universal Computer Science (J. UCS), vol. 18, no. 14, pp. 1967-1986, 2012.##
  4. S. Ghanbari, N. Ghanbari, M. Keshtgari, and H. N. Karizi, “Steganalyisis in Images using Co-occurrence Matrix and Neural Networks,” Iranian Journal of Electrical and Computer Engineering, vol. 9, no. 3, 2012. (In Persian)##