3 research outputs found
Review of Linguistic Text Steganographic Methods
Steganography is a method of concealing confidential data in a cover file such that attacker cannot predict about clandestine data. Steganography exploit cover message, for example content, picture, sound, video record and so forth to conceal a mystery or secret message. Text Steganography is one of a procedure to conceal the one kind (text) of content data inside same type of content messages. Linguistic steganography is the language based steganographic scheme which proposes more advanced methods to hide the secret messages in text. Initially linguistic text steganographic techniques are developed only for the English language. But now days different regional languages are also used to hide the information like Hindi. This paper reviews the different linguistic text steganographic methods of hindi and English language
Covert Channel in the BitTorrent Tracker Protocol
Covert channels have the unique quality of masking evidence that a communication has ever occurred between two parties. For spies and terrorist cells, this quality can be the difference between life and death. However, even the detection of communications in a botnet could be troublesome for its creators. To evade detection and prevent insights into the size and members of a botnet, covert channels can be used. A botnet should rely on covert channels built on ubiquitous protocols to blend in with legitimate traffic. In this paper, we propose a covert channel built on the BitTorrent peer-to-peer protocol. In a simple application, this covert channel can be used to discretely and covertly send messages between two parties. However, this covert channel can also be used to stealthily distribute commands or the location of a command and control server for use in a botnet
StegTorrent: a Steganographic Method for the P2P File Sharing Service
The paper proposes StegTorrent a new network steganographic method for the
popular P2P file transfer service-BitTorrent. It is based on modifying the
order of data packets in the peer-peer data exchange protocol. Unlike other
existing steganographic methods that modify the packets' order it does not
require any synchronization. Experimental results acquired from prototype
implementation proved that it provides high steganographic bandwidth of up to
270 b/s while introducing little transmission distortion and providing
difficult detectability.Comment: 7 pages, 7 figures, 1 tabl