Show simple item record

dc.contributor.authorAbdullaziz, O.
dc.contributor.authorGoh, V.
dc.contributor.authorLing, Huo Chong
dc.contributor.authorWong, K.
dc.date.accessioned2018-12-13T09:08:47Z
dc.date.available2018-12-13T09:08:47Z
dc.date.created2018-12-12T02:47:03Z
dc.date.issued2014
dc.identifier.citationAbdullaziz, O. and Goh, V. and Ling, H.C. and Wong, K. 2014. A survey of network protocol based steganographic techniques, pp. 229-235.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/71105
dc.description.abstract

Steganography is a sub-discipline of information hiding, which hides external information into an innocuous carrier to establish stealthy communication. Steganography in network protocols however, is an emerging research area, which exploits network protocols specifications, protocol mechanisms, network applications, and network services to realize covert channels between network end-systems. In this paper, we aim to clarify topics related to information hiding and its applications especially steganography. We also provide a brief comparison between steganography and cryptography. Eventually, we categorize and present some of the current work related steganography in networks.

dc.titleA survey of network protocol based steganographic techniques
dc.typeConference Paper
dcterms.source.startPage229
dcterms.source.endPage235
dcterms.source.titleConference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014
dcterms.source.seriesConference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014
dcterms.source.isbn9789834406943
curtin.departmentCurtin Malaysia
curtin.accessStatusFulltext not available


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record