Font Size: a A A

Research And Implement Of Information Hiding Based On Network Protocols

Posted on:2016-04-04Degree:MasterType:Thesis
Country:ChinaCandidate:M N GongFull Text:PDF
GTID:2308330473960952Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Hiding information in network traffic may lead to leakage of confidential information. The thesis introduces a new steganographic system: the Pad Steg(Padding Steganography). It is the first information hiding solution which represents inter-protocol steganography i.e. usage of relation between two or more protocols from the TCP/IP stack to enable secret communication. Pad Steg utilizes ARP and TCP protocols together with an Ether leak vulnerability(improper Ethernet frame padding) to facilitate secret communication for hidden groups in LANs(Local Area Networks).IP telephony called Tran Steg(Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In Tran Steg it is the overt data that is compressed to make space for the steganogram. The main innovation of Tran Steg is to, for a chosen voice stream, find a codec that will result in a similar voice quality but smaller voice payload size than the originally selected. Then, the voice stream is transcoded. The main research contents include the following aspects:(1) Introduced the theory of information hiding knowledge, characteristics and classification. Describes the characteristics of the ARP protocol and IP telephony voice stream. Then, the relevant network protocols and voice streams steganographic methods are described in detail.(2) Proposed a new system that is filled with steganography, which can be used in LAN, and the use of ARP and other protocols such as TCP or ICMP, and Ethernet frame information leakage vulnerability. Taking into account the nature of the current network, the thesis conducts a feasibility study on the information hiding system conducted. Some possible countermeasures for filling steganography also is proposed.(3) Proposed a new method for Vo IP steganography. Verification analysis using the concept of implementing transcoding steganography features: steganography bandwidth undetectable and steganography costs. Potential methods proposed transcoding steganography detection. The results obtained demonstrated that the proposed method is feasible, and in the introduction of a reduced fine voice steganography premise provides a high bandwidth. In addition, compared Vo IP has now emerged steganographic method, transcoding steganography is not easy to be detected.
Keywords/Search Tags:Network Protocol, Information Hiding, ARP, IP telephony, Communication Security
PDF Full Text Request
Related items