Informatics and Automation
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Informatics and Automation:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Informatics and Automation, 2023, Issue 22, volume 5, Pages 1103–1151
DOI: https://doi.org/10.15622/ia.22.5.6
(Mi trspy1266)
 

Information Security

A Walk-through towards Network Steganography Techniques

U. Pilaniaa, M. Kumara, T. Rohitb, N. Nandalc

a Manav Rachna University
b University of Petroleum and Energy Studies
c Gokaraju Rangaraju Institute of Engineering and Technology
Abstract: 2D and 3D digital multimedia files offer numerous benefits like excellent quality, compression, editing, reliable copying, etc. These qualities of the multimedia files, on the other hand, are the cause of fear including the fear of getting access to data during communication. Steganography plays an important role in providing security to the data in communication. Changing the type of cover file from digital multimedia files to protocols improve the security of the communication system. Protocols are an integral part of the communication system and these protocols can also be used to hide secret data resulting in low chances of detection. This paper is intended to help improve existing network steganography techniques by enhancing bandwidth and decreasing detection rates through reviewing previous related work. Recent papers of the last 21 years on network steganography techniques have been studied, analyzed, and summarized. This review can help researchers to understand the existing trends in network steganography techniques to pursue further work in this area for algorithms’ improvement. The paper is divided according to the layers of the OSI model.
Keywords: network steganography, open system interconnection model, protocol, bandwidth, embedding capacity, physical layer, data link layer, network layer, transmission layer, application layer.
Received: 02.05.2023
Document Type: Article
Language: English
Citation: U. Pilania, M. Kumar, T. Rohit, N. Nandal, “A Walk-through towards Network Steganography Techniques”, Informatics and Automation, 22:5 (2023), 1103–1151
Citation in format AMSBIB
\Bibitem{PilKumRoh23}
\by U.~Pilania, M.~Kumar, T.~Rohit, N.~Nandal
\paper A Walk-through towards Network Steganography Techniques
\jour Informatics and Automation
\yr 2023
\vol 22
\issue 5
\pages 1103--1151
\mathnet{http://mi.mathnet.ru/trspy1266}
\crossref{https://doi.org/10.15622/ia.22.5.6}
Linking options:
  • https://www.mathnet.ru/eng/trspy1266
  • https://www.mathnet.ru/eng/trspy/v22/i5/p1103
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Informatics and Automation
    Statistics & downloads:
    Abstract page:42
    Full-text PDF :25
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024