Curtin University Homepage
  • Library
  • Help
    • Admin

    espace - Curtin’s institutional repository

    JavaScript is disabled for your browser. Some features of this site may not work without it.
    View Item 
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item

    A survey of network protocol based steganographic techniques

    Access Status
    Fulltext not available
    Authors
    Abdullaziz, O.
    Goh, V.
    Ling, Huo Chong
    Wong, K.
    Date
    2014
    Type
    Conference Paper
    
    Metadata
    Show full item record
    Citation
    Abdullaziz, O. and Goh, V. and Ling, H.C. and Wong, K. 2014. A survey of network protocol based steganographic techniques, pp. 229-235.
    Source Title
    Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014
    ISBN
    9789834406943
    School
    Curtin Malaysia
    URI
    http://hdl.handle.net/20.500.11937/71105
    Collection
    • Curtin Research Publications
    Abstract

    Steganography is a sub-discipline of information hiding, which hides external information into an innocuous carrier to establish stealthy communication. Steganography in network protocols however, is an emerging research area, which exploits network protocols specifications, protocol mechanisms, network applications, and network services to realize covert channels between network end-systems. In this paper, we aim to clarify topics related to information hiding and its applications especially steganography. We also provide a brief comparison between steganography and cryptography. Eventually, we categorize and present some of the current work related steganography in networks.

    Related items

    Showing items related by title, author, creator and subject.

    • An investigation into the application of active networks to mobile computing environments
      Chin, Kwan-Wu (2000)
      Telecommunication service providers have recently begun to offer ubiquitous access to packetised data. As a result, the Internet is not limited to computers that are physically connected but is also available to users ...
    • Architecture and performance of multi-hop wireless ad-hoc routing protocol (MultiWARP)
      Van Der Werf, Steven Martijn (2010)
      In recent years, a great deal of attention has been given to wireless connectivity solutions that are capable of establishing wireless ad-hoc networks between mobile nodes. Whilst most of these networks are formed using ...
    • Wireless Sensor Network transport protocol: A critical review
      Rathnayaka, Dinusha; Potdar, Vidyasagar (2011)
      The transport protocols for Wireless Sensor Network (WSN) play vital role in achieving the high performance together with longevity of the network. The researchers are continuously contributing in developing new transport ...
    Advanced search

    Browse

    Communities & CollectionsIssue DateAuthorTitleSubjectDocument TypeThis CollectionIssue DateAuthorTitleSubjectDocument Type

    My Account

    Admin

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Follow Curtin

    • 
    • 
    • 
    • 
    • 

    CRICOS Provider Code: 00301JABN: 99 143 842 569TEQSA: PRV12158

    Copyright | Disclaimer | Privacy statement | Accessibility

    Curtin would like to pay respect to the Aboriginal and Torres Strait Islander members of our community by acknowledging the traditional owners of the land on which the Perth campus is located, the Whadjuk people of the Nyungar Nation; and on our Kalgoorlie campus, the Wongutha people of the North-Eastern Goldfields.