In this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of âthe moving observerâ. We considered three levels of undetectability named: âgoodâ, âbadâ, and âuglyâ. To illustrate this method we chose Wi-Fi steganography as a solidfamily of information hiding protocols. We present the state of the art in this area covering well-known hiding techniques for 802.11 networks. âThe moving observerâ approach could help not only in the evaluation of steganographic algorithms, but also might be a starting point fora new detection system of network steganography. The concept of a new detection system, called MoveSteg, is explained in detail
Steganography is the art and science of hiding the information in the carrier object. The main objec...
Network steganography encompasses the information hiding techniques that can be applied in communica...
Abstract — Due to the increasing demand of various internet applications such as voice over IP (VOIP...
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network ...
This article presents a new method for detecting a source point of time based network steganography ...
This article presents a new method for detecting a source point of time based network steganography ...
Network steganography is the art of hiding secret information within innocent network transmissions....
Network steganography is the art of hiding secret information within innocent network transmissions....
Abstract. A wireless sensor network (WSN) typically consists of base stations and a large number of ...
Steganography is a technology used since years for the communication of messages secretly. These sec...
International audienceA wireless sensor network (WSN) typically consists of base stations and a larg...
Abstract: This paper is a combined contribution to the field of steganography and ad-hoc networks. ...
Network steganography has been a well-known covert data channeling method for over three decades. Th...
Steganography, as a subfield of information hiding, is an art of hiding a message in a legitimate ca...
Steganography is a sub-discipline of information hiding, which hides external information into an in...
Steganography is the art and science of hiding the information in the carrier object. The main objec...
Network steganography encompasses the information hiding techniques that can be applied in communica...
Abstract — Due to the increasing demand of various internet applications such as voice over IP (VOIP...
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network ...
This article presents a new method for detecting a source point of time based network steganography ...
This article presents a new method for detecting a source point of time based network steganography ...
Network steganography is the art of hiding secret information within innocent network transmissions....
Network steganography is the art of hiding secret information within innocent network transmissions....
Abstract. A wireless sensor network (WSN) typically consists of base stations and a large number of ...
Steganography is a technology used since years for the communication of messages secretly. These sec...
International audienceA wireless sensor network (WSN) typically consists of base stations and a larg...
Abstract: This paper is a combined contribution to the field of steganography and ad-hoc networks. ...
Network steganography has been a well-known covert data channeling method for over three decades. Th...
Steganography, as a subfield of information hiding, is an art of hiding a message in a legitimate ca...
Steganography is a sub-discipline of information hiding, which hides external information into an in...
Steganography is the art and science of hiding the information in the carrier object. The main objec...
Network steganography encompasses the information hiding techniques that can be applied in communica...
Abstract — Due to the increasing demand of various internet applications such as voice over IP (VOIP...