Skip to main content

Steganogaphy Using Mac-Independent Opportunistic Routing and Encoding (MORE) Protocol Based Communications

  • Conference paper
  • First Online:
  • 243 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1118))

Abstract

In this paper, we first propose an enhanced version of the proposed steganoraphic scheme using MORE protocol, increasing its security and performances. To do so, we use matrix permutation keys for the embedding (resp. extraction) process, and we give optimized embedding and retrieval algorithms leading to a 50% reduced time/computation complexity. Furthermore, we analyse the proposed schemes and discuss their vulnerability to steganalysis attacks, then we propose an enhancement against these attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3/4), 313–336 (1996)

    Article  Google Scholar 

  2. Bierbrauer, J., Fridrich, J.: Constructing good covering codes for applications in steganography. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security III. LNCS, vol. 4920, pp. 1–22. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69019-1_1

    Chapter  Google Scholar 

  3. Belhamra, M.A., Souidi, E.M.: A steganogaphic scheme for mac-independent opportunistic routing and encoding (MORE) protocol. In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE. SECRYPT, Porto, Portugal, 26–28 July, vol. 2, pp. 254–264 (2018)

    Google Scholar 

  4. Van Horenbeeck, M.: Deception on the network: thinking differently about covert channels. In: Proceedings of the 7th Australian Info, Warfare and Security Conference (2006). School of Computer and Information Science, Edith Cowan University, Perth, Western Australia

    Google Scholar 

  5. Mazurczyk, W., Caviglione, L.: Steganography in modern smartphones and mitigation techniques. IEEE Commun. Surv. Tutor. 17(1), 334–357 (2015)

    Article  Google Scholar 

  6. Wendzel, S., Zander, S., Fechner, B., Herdin, C.: Pattern-based survey and categorization of network covert channel techniques. ACM Comput. Surv. 47(3), 50, 1–50, 26 (2015)

    Article  Google Scholar 

  7. Szczypiorski, K., Mazurczyk, W.: Steganography in IEEE 802.11 OFDM symbols. Secur. Commun. Netw. 9(2), 118–129 (2016)

    Article  Google Scholar 

  8. Szczypiorski, K.: Steganography in TCP/IP networks. In: State of the Art and a Proposal of a New System-HICCUPS, Institute of Telecommunications’ seminar, Warsaw University of Technology, Poland (2003)

    Google Scholar 

  9. Grabski, S., Szczypiorski, K.: Steganography in OFDM symbols of fast IEEE 802.11n networks. In: 2013 IEEE Symposium on Security and Privacy Workshops, San Francisco, CA, USA, 23–24 May 2013, pp. 158–164 (2013)

    Google Scholar 

  10. Kundur, D., Ahsan, K.: Practical internet steganography: data hiding in IP. In: Proceedings Texas Workshop Security of Information Systems (2003)

    Google Scholar 

  11. Mazurczyk, W., Smolarczyk, M., Szczypiorski, K.: Retransmission steganography and its detection. Soft. Comput. 15(3), 505–515 (2011)

    Article  Google Scholar 

  12. Mazurczyk, W., Szczypiorski, K.: Covert channels in SIP for VoIP signalling. In: Jahankhani, H., Revett, K., Palmer-Brown, D. (eds.) ICGeS 2008. CCIS, vol. 12, pp. 65–72. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69403-8_9

    Chapter  Google Scholar 

  13. Jankowski, B., Mazurczyk, W., Szczypiorski, K.: PadSteg: introducing inter-protocol steganography. Telecommun. Syst. 52(2), 1101–1111 (2013)

    Google Scholar 

  14. Gentle, J.E.: Numerical Linear Algebra for Applications in Statistics. Springer, New York (2012)

    MATH  Google Scholar 

  15. Justel, A., Peña, D., Zamar, R.: A multivariate Kolmogorov-Smirnov test of goodness of fit. Stat. Probab. Lett. 35(3), 251–259 (1997)

    Article  MathSciNet  Google Scholar 

  16. Krätzer, C., Dittmann, J., Lang, A., Kühne, T.: WLAN steganography: a first practical review. In: Proceedings of the 8th Workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, 26–27 September 2006, pp. 17–22 (2006)

    Google Scholar 

  17. Mazurczyk, W., Szaga, P., Szczypiorski, K.: Using transcoding for hidden communication in IP telephony. Multimed. Tools Appl. 70(3), 2139–2165 (2014)

    Article  Google Scholar 

  18. Belhamra, M.A., Souidi, E.M.: Introduction to steganography in RRNS based communications. In: Proceedings of the 2nd International Conference on Networking, Information Systems & Security, NISS 2019, Rabat, Morocco, 27–28 March, pp. 21:1–21:7. ACM (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to El Mamoun Souidi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Belhamra, M.A., Souidi, E.M. (2019). Steganogaphy Using Mac-Independent Opportunistic Routing and Encoding (MORE) Protocol Based Communications. In: Obaidat, M. (eds) E-Business and Telecommunications. ICETE 2018. Communications in Computer and Information Science, vol 1118. Springer, Cham. https://doi.org/10.1007/978-3-030-34866-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34866-3_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34865-6

  • Online ISBN: 978-3-030-34866-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics