New Steganographic Method for Marking IP Stego Datagrams Based on the IP ID Field | ||||
The International Conference on Electrical Engineering | ||||
Article 13, Volume 8, 8th International Conference on Electrical Engineering ICEENG 2012, May 2012, Page 1-8 PDF (85.4 K) | ||||
Document Type: Original Article | ||||
DOI: 10.21608/iceeng.2012.30647 | ||||
View on SCiNiTO | ||||
Authors | ||||
Manal A. Shehab; Noha O. Korany | ||||
Electrical Engineering Department, Faculty of Engineering, Alexandria University - Egypt. | ||||
Abstract | ||||
Stego datagrams could be transmitted as a continuous traffic stream or they could be marked and mixed with normal datagrams, then transmitted from the steganogram sender to the steganogram receiver. The steganogram receiver would check for the mark to identify the stego datagrams and extract the hidden data from them. This paper suggests a new steganographic marking method with two scenarios to mark the IP stego datagrams using the IP ID field. This method could be used to mark the IP datagrams only and it requires from the packet source to be the steganogram sender. If this method is used to mark the IPv6 packets, then the IP packet fragmentation is required by the packet source. | ||||
Keywords | ||||
Stego; Steganographic; Data hiding; marking and IP ID field | ||||
Statistics Article View: 188 PDF Download: 212 |
||||