|
Information Security
A Walk-through towards Network Steganography Techniques
U. Pilaniaa, M. Kumara, T. Rohitb, N. Nandalc a Manav Rachna University
b University of Petroleum and Energy Studies
c Gokaraju Rangaraju Institute of Engineering and Technology
Abstract:
2D and 3D digital multimedia files offer numerous benefits like excellent quality, compression, editing, reliable copying, etc. These qualities of the multimedia files, on the other hand, are the cause of fear including the fear of getting access to data during communication. Steganography plays an important role in providing security to the data in communication. Changing the type of cover file from digital multimedia files to protocols improve the security of the communication system. Protocols are an integral part of the communication system and these protocols can also be used to hide secret data resulting in low chances of detection. This paper is intended to help improve existing network steganography techniques by enhancing bandwidth and decreasing detection rates through reviewing previous related work. Recent papers of the last 21 years on network steganography techniques have been studied, analyzed, and summarized. This review can help researchers to understand the existing trends in network steganography techniques to pursue further work in this area for algorithms’ improvement. The paper is divided according to the layers of the OSI model.
Keywords:
network steganography, open system interconnection model, protocol, bandwidth, embedding capacity, physical layer, data link layer, network layer, transmission layer, application layer.
Received: 02.05.2023
Citation:
U. Pilania, M. Kumar, T. Rohit, N. Nandal, “A Walk-through towards Network Steganography Techniques”, Informatics and Automation, 22:5 (2023), 1103–1151
Linking options:
https://www.mathnet.ru/eng/trspy1266 https://www.mathnet.ru/eng/trspy/v22/i5/p1103
|
Statistics & downloads: |
Abstract page: | 42 | Full-text PDF : | 25 |
|