Abstract
The purpose of the study of the authors of this article are the two most popular network protocols of the network and transport level – TCP and IP, for the presence of the steganographic potential of their packets. The article describes and argues the choice of certain working tools. A study was made of possible ways of channel steganography in data packets of protocols. The argumentation is given for the choice of certain working tools. The implementation of the attachment of information was made. Described the feasibility of the application, developed software, and appropriate conclusions were made throughout the study.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Huang, F., Huang, J., Shi, Y.Q.: New channel selection rule for JPEG steganography. IEEE Trans. Inf. Forensics Secur. 7(4), 1181–1191 (2012)
Abarca, S.: An analysis of network steganographic malware. Doctoral dissertation, Utica College (2018)
Schmidt, S.S., Mazurczyk, W., Keller, J., Caviglione, L.: A new data-hiding approach for IP telephony applications with silence suppression. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, p. 83. ACM, August 2017
Bąk, P., Bieniasz, J., Krzemiński, M., Szczypiorski, K.: Application of perfectly undetectable network steganography method for malware hidden communication. In: 4th International Conference on Frontiers of Signal Processing (ICFSP), pp. 34–38. IEEE, September 2018
Wendzel, S., Mazurczyk, W.: Poster: an educational network protocol for covert channel analysis using patterns. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1739–1741. ACM, October 2016
Xue, P.F., Hu, J.S., Liu, H.L., Hu, R.G.: A new network steganographic method based on the transverse multi-protocol collaboration (2017)
Abdullaziz, O.I., Goh, V.T., Ling, H.C., Wong, K.: AIPISteg: an active IP identification based steganographic method. J. Netw. Comput. Appl. 63, 150–158 (2016)
K21. Kostyrin A.S., Krasov A.V.: Implementation of the channel steganography method using the ICMP protocol. In: The Collection: Regional Informatics and Information Security Collection of Scientific Papers. St. Petersburg Society of Informatics, Computer Engineering, Communication and Control Systems, pp. 313–316 (2017)
Sharikov, P.I.: The method of finding the most profitable container in the format of executable files. Science-intensive technologies in Earth space research. T.7. No. 5, pp. 58–62 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Sharikov, P.I., Krasov, A.V., Gelfand, A.M., Kosov, N.A. (2020). Research of the Possibility of Hidden Embedding of a Digital Watermark Using Practical Methods of Channel Steganography. In: Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., Ivanovic, M. (eds) Intelligent Distributed Computing XIII. IDC 2019. Studies in Computational Intelligence, vol 868. Springer, Cham. https://doi.org/10.1007/978-3-030-32258-8_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-32258-8_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-32257-1
Online ISBN: 978-3-030-32258-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)