Font Size: a A A

The Research On Information Hiding Base On TCP/IP Protocol And Its Application In Telecom-card

Posted on:2007-02-22Degree:MasterType:Thesis
Country:ChinaCandidate:C H LiuFull Text:PDF
GTID:2178360212459169Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As an essential way to protect information, information hiding has drawn extensive attention in recent years since the wide spread of information communication and computer networks. What research on information hiding does is to present some ways and means to embed useful or important information into the other open information and insure security of the hidden information that is not be infringed or detected. This thesis makes some analysis and research on the principles and techniques of information hiding and TCP/IP protocol. And later, the thesis presents a new approach of information hiding based on TCP/IP protocol.The thesis discovers that there are two ways that could be applied to information hiding based on TCP/IP protocol after analysis and research on information hiding: one is to embed hidden information into the packet and trying to make the hidden information look innocuous to the network monitor, and the other one is to modify packet so that monitor couldn't detected such a secret communication. Therefore,there are three method that could embed hidden information into the other open information based on TCP/IP protocol. First, it could transmit hidden information that could be encrypted and embed into the other datagram in the mandatory fields of IP or TCP header. Second, it could embed some genuine message into an IP datagram and transmit hiding information based on Internet Control Message Protocol error messages generated by the router. Third, it could hide information based on modification of the low bit of the TCP/IP timestamps. After detailed discussion of the above three methods, this thesis proposes a TCP/IP information hiding method based on chaotic mapping and DES encryption.At the same time, the thesis makes research on security issues in telecom-card based on information hiding in TCP/IP protocol. Finally, the thesis points out some problems in application and foresights the future research prospect.
Keywords/Search Tags:Information Hiding, TCP/IP Protocol, Telecom-card
PDF Full Text Request
Related items