Font Size: a A A

Network Traffic Data, Steganography Technology Research

Posted on:2007-06-28Degree:MasterType:Thesis
Country:ChinaCandidate:X GuFull Text:PDF
GTID:2208360185991572Subject:Systems Engineering
Abstract/Summary:PDF Full Text Request
The rapid development of Internet makes communication much easier than ever before. However, if those information relating to national security, secrets of company or personal privacy, being transported through the internet without any protection, it is quite likely that they might be attacked by some hackers, and if this happens, it would be no doubt that this would lead to enormous loss. So in the network communication, we should pay more attention to information security and take advantage of various methods to protect information security.Information hiding is a technique that hides the secret information in the cover information in order to protect the secret one. Though the information hiding is still a new research task, it has already become a very important part of information security research field. In the network communication, huge information currency makes large redundancy in network data and makes it impossible for the attackers to have enough energy to detect all network data, and this makes information hiding in network communication data to be an ideal technique.In this dissertation, some issues involved in steganographic theory and techniques in network communication data are detailed as follows:(1) The information hiding techniques in network communication data are summarized(2) A steganalysis technique based on Chi-square fitting test is proposed to analyze the steganograpic technique designed by Kamran Ahsan et al. This technique offers the minimal size of steganalysis window and the method to estimate the embedding rate. Besides that, a modified information hiding method is presented to resist the steganalysis technique proposed by ourselves.(3) In order to transport a few of important data safely, an information hiding method based on FTP protocol is provided.(4) Lots of steganographic methods based on XML documents are analysed and summarized. And an authentication method is proposed for electronic anamnesis. It embeds special information into the tags of XML documents to realize the authentication. The experimental results show that the method can authenticate the structure and content of anamnesis.(5) A novel steganographic algorithm for internet images is proposed finally, which...
Keywords/Search Tags:steganography, network communication, steganalysis, TCP/IP protocols, covert communication, chaos
PDF Full Text Request
Related items