The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Personal storage services are one of the most popular applications based on the cloud computing paradigm. Therefore, the analysis of possible privacy and security issues has been a relevant part of the research agenda. However, threats arising from the adoption of information hiding techniques have been mainly neglected. In this perspective, the paper investigates how personal cloud storage services...
Cyber Physical Systems (CPS) have been linked to serious security concerns in recent years. Research publications suggest that there is a potential to transfer hidden information through CPS environments. In comparison to these existing studies, we demonstrate that CPS cannot only be used to covertly transfer secret data but also to store secret data. Using an analogy to the biological concept of...
Covert channel in network protocols has been an area absorbing great interests for many years in secret transmission. Recently, covert channels based on packet length have become a new preference among researchers in this field because of their excellent performance in simulating statistical features of network packets in real world. However, few approaches which can embed secret information with...
The paper presents a set of steganographic filters which can be used on Raspberry Pi 2 microcomputer. Four types of filters are described: two types for network steganography based on IP header, one for steganography based on TCP header, and one for steganography in VoIP technique.
This work addresses the issues related to network steganography in IEEE 802.15.4 Wireless Personal Area Networks (WPAN). The proposed communication scheme employs illicit Direct Sequence Spread Spectrum code sequences for the transmission of steganographic data. The presented approach is a compromise between minimising the probability of covert channel disclosure and providing robustness against random...
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based...
In recent scientific literature, network based steganography is regarded as a new research direction in the paradigm of information hiding. Few approaches have been found which embed secret information by altering the length of network packets. In this paper, the steganographic security of an existing network length based embedding algorithm has been analyzed and a new scheme has been proposed to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.