Network steganography consists of different steganographic technics that utilize network protocols for hiding data. We present nine new covert channels which utilize the new standard, HTTP/2, and which can be used regardless its transport carrier (TLS or clear TCP). These covert channels use a protocol feature that has dual nature (for example, no padding can be represented in two ways); or a feature that is not mandatory (as streams prioritization and dependencies); or random value field (as PING frame payload field); or there is no strict rule how to obtain new values for some fields (as stream identifiers). As far as we know, this is the first research about hiding data in HTTP/2. Also, we give a small survey of existing covert channels...
Due to high efficiency and relatively ease of use, application-layer covert channels, especially Hyp...
Describes Information Hiding in communication networks, and highlights their important issues, chall...
In order to protect user privacy or guarantee free access to the Internet, the network covert channe...
Network Steganography describes all the methods used for transmitting data over a network without it...
Network Steganography describes all the methods used for transmitting data over a network without it...
In the context of modern telecommunications effects leading, on one hand, to the increase of law enf...
Network steganography is a relatively new discipline which studies different steganographic techniq...
Steganography is a sub-discipline of information hiding, which hides external information into an in...
Steganography is a sub-discipline of information hiding, which hides external information into an in...
Steganographic techniques allow users to covertly transmit information, hid-ing the existence of the...
Covert channels are communication channels that can be exploited by a process to transfer informatio...
Steganography, as a subfield of information hiding, is an art of hiding a message in a legitimate ca...
In this thesis, we develop network information hiding methods which can be utilized to transmit exte...
Includes bibliographical references (pages 29-30).Covert channels encompass a group of methods desig...
Abstract- In secure data communication Network Security is important. Basically in cryptography Encr...
Due to high efficiency and relatively ease of use, application-layer covert channels, especially Hyp...
Describes Information Hiding in communication networks, and highlights their important issues, chall...
In order to protect user privacy or guarantee free access to the Internet, the network covert channe...
Network Steganography describes all the methods used for transmitting data over a network without it...
Network Steganography describes all the methods used for transmitting data over a network without it...
In the context of modern telecommunications effects leading, on one hand, to the increase of law enf...
Network steganography is a relatively new discipline which studies different steganographic techniq...
Steganography is a sub-discipline of information hiding, which hides external information into an in...
Steganography is a sub-discipline of information hiding, which hides external information into an in...
Steganographic techniques allow users to covertly transmit information, hid-ing the existence of the...
Covert channels are communication channels that can be exploited by a process to transfer informatio...
Steganography, as a subfield of information hiding, is an art of hiding a message in a legitimate ca...
In this thesis, we develop network information hiding methods which can be utilized to transmit exte...
Includes bibliographical references (pages 29-30).Covert channels encompass a group of methods desig...
Abstract- In secure data communication Network Security is important. Basically in cryptography Encr...
Due to high efficiency and relatively ease of use, application-layer covert channels, especially Hyp...
Describes Information Hiding in communication networks, and highlights their important issues, chall...
In order to protect user privacy or guarantee free access to the Internet, the network covert channe...