Abstract
In this paper, we first propose an enhanced version of the proposed steganoraphic scheme using MORE protocol, increasing its security and performances. To do so, we use matrix permutation keys for the embedding (resp. extraction) process, and we give optimized embedding and retrieval algorithms leading to a 50% reduced time/computation complexity. Furthermore, we analyse the proposed schemes and discuss their vulnerability to steganalysis attacks, then we propose an enhancement against these attacks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3/4), 313–336 (1996)
Bierbrauer, J., Fridrich, J.: Constructing good covering codes for applications in steganography. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security III. LNCS, vol. 4920, pp. 1–22. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69019-1_1
Belhamra, M.A., Souidi, E.M.: A steganogaphic scheme for mac-independent opportunistic routing and encoding (MORE) protocol. In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE. SECRYPT, Porto, Portugal, 26–28 July, vol. 2, pp. 254–264 (2018)
Van Horenbeeck, M.: Deception on the network: thinking differently about covert channels. In: Proceedings of the 7th Australian Info, Warfare and Security Conference (2006). School of Computer and Information Science, Edith Cowan University, Perth, Western Australia
Mazurczyk, W., Caviglione, L.: Steganography in modern smartphones and mitigation techniques. IEEE Commun. Surv. Tutor. 17(1), 334–357 (2015)
Wendzel, S., Zander, S., Fechner, B., Herdin, C.: Pattern-based survey and categorization of network covert channel techniques. ACM Comput. Surv. 47(3), 50, 1–50, 26 (2015)
Szczypiorski, K., Mazurczyk, W.: Steganography in IEEE 802.11 OFDM symbols. Secur. Commun. Netw. 9(2), 118–129 (2016)
Szczypiorski, K.: Steganography in TCP/IP networks. In: State of the Art and a Proposal of a New System-HICCUPS, Institute of Telecommunications’ seminar, Warsaw University of Technology, Poland (2003)
Grabski, S., Szczypiorski, K.: Steganography in OFDM symbols of fast IEEE 802.11n networks. In: 2013 IEEE Symposium on Security and Privacy Workshops, San Francisco, CA, USA, 23–24 May 2013, pp. 158–164 (2013)
Kundur, D., Ahsan, K.: Practical internet steganography: data hiding in IP. In: Proceedings Texas Workshop Security of Information Systems (2003)
Mazurczyk, W., Smolarczyk, M., Szczypiorski, K.: Retransmission steganography and its detection. Soft. Comput. 15(3), 505–515 (2011)
Mazurczyk, W., Szczypiorski, K.: Covert channels in SIP for VoIP signalling. In: Jahankhani, H., Revett, K., Palmer-Brown, D. (eds.) ICGeS 2008. CCIS, vol. 12, pp. 65–72. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69403-8_9
Jankowski, B., Mazurczyk, W., Szczypiorski, K.: PadSteg: introducing inter-protocol steganography. Telecommun. Syst. 52(2), 1101–1111 (2013)
Gentle, J.E.: Numerical Linear Algebra for Applications in Statistics. Springer, New York (2012)
Justel, A., Peña, D., Zamar, R.: A multivariate Kolmogorov-Smirnov test of goodness of fit. Stat. Probab. Lett. 35(3), 251–259 (1997)
Krätzer, C., Dittmann, J., Lang, A., Kühne, T.: WLAN steganography: a first practical review. In: Proceedings of the 8th Workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, 26–27 September 2006, pp. 17–22 (2006)
Mazurczyk, W., Szaga, P., Szczypiorski, K.: Using transcoding for hidden communication in IP telephony. Multimed. Tools Appl. 70(3), 2139–2165 (2014)
Belhamra, M.A., Souidi, E.M.: Introduction to steganography in RRNS based communications. In: Proceedings of the 2nd International Conference on Networking, Information Systems & Security, NISS 2019, Rabat, Morocco, 27–28 March, pp. 21:1–21:7. ACM (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Belhamra, M.A., Souidi, E.M. (2019). Steganogaphy Using Mac-Independent Opportunistic Routing and Encoding (MORE) Protocol Based Communications. In: Obaidat, M. (eds) E-Business and Telecommunications. ICETE 2018. Communications in Computer and Information Science, vol 1118. Springer, Cham. https://doi.org/10.1007/978-3-030-34866-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-34866-3_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34865-6
Online ISBN: 978-3-030-34866-3
eBook Packages: Computer ScienceComputer Science (R0)