Skip to main content
Erschienen in: Neural Computing and Applications 3/2021

04.08.2020 | S.I. : ATCI 2020

Research on information steganography based on network data stream

verfasst von: Jiazhong Lu, Weisha Zhang, Ziye Deng, Shibin Zhang, Yan Chang, Xiaolei Liu

Erschienen in: Neural Computing and Applications | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To protect the information from being intercepted by third parties during the network communication process, this paper proposes a new type of data steganography technology based on network data flow. Using the network protocol itself and the relationship between data packets in the entire network data stream to perform network data steganography, transfer hidden data, and perform secondary identity authentication. Different from the traditional steganography method, this method can encode the hidden data and send the interval value by embedding the data packet, thereby hiding and transmitting the hidden data. In this technology, the operation of hidden data does not affect the user's access request for real network data, and it can perform processes such as hidden data transfer and secondary authentication without the user being able to detect it. Through experimental verification and evaluation, our method improves the concealment of the steganographic channel, is not easy to attract attention and has no obvious statistical characteristics of the traffic, and can improve the concealment and robustness of the steganography technology based on network data streams.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Kahn D (1996) The history of steganography [C]. International Workshop on Information Hiding Kahn D (1996) The history of steganography [C]. International Workshop on Information Hiding
4.
Zurück zum Zitat Cheddad A, Condell J, Curran K et al (2010) Digital image steganography: survey and analysis of current methods [J]. Signal Process 90(3):727–752CrossRef Cheddad A, Condell J, Curran K et al (2010) Digital image steganography: survey and analysis of current methods [J]. Signal Process 90(3):727–752CrossRef
5.
Zurück zum Zitat Nosrati M, Karimi R, Hariri M (2012) Audio steganography: a survey on recent approaches [J]. World Appl Program 2(3):202–205 Nosrati M, Karimi R, Hariri M (2012) Audio steganography: a survey on recent approaches [J]. World Appl Program 2(3):202–205
6.
Zurück zum Zitat Balaji R, Naveen G (2011) Secure data transmission using video steganography[C]. In: IEEE International Conference on Electro/information Technology Balaji R, Naveen G (2011) Secure data transmission using video steganography[C]. In: IEEE International Conference on Electro/information Technology
7.
Zurück zum Zitat Duan Y, Lee VCS, Lam K et al (2019) A cross-layer design for data dissemination in vehicular ad hoc networks. Neural Comput Appl 31:2869–2887CrossRef Duan Y, Lee VCS, Lam K et al (2019) A cross-layer design for data dissemination in vehicular ad hoc networks. Neural Comput Appl 31:2869–2887CrossRef
8.
Zurück zum Zitat Vimal S, Kalaivani L, Kaliappan M et al (2020) Development of secured data transmission using machine learning-based discrete-time partially observed Markov model and energy optimization in cognitive radio networks. Neural Comput Appl 32:151–161CrossRef Vimal S, Kalaivani L, Kaliappan M et al (2020) Development of secured data transmission using machine learning-based discrete-time partially observed Markov model and energy optimization in cognitive radio networks. Neural Comput Appl 32:151–161CrossRef
9.
Zurück zum Zitat Ooi KS, Kong CL, Goay CH et al (2020) Crosstalk modeling in high-speed transmission lines by multilayer perceptron neural networks. Neural Comput Appl 32:7311–7320CrossRef Ooi KS, Kong CL, Goay CH et al (2020) Crosstalk modeling in high-speed transmission lines by multilayer perceptron neural networks. Neural Comput Appl 32:7311–7320CrossRef
10.
Zurück zum Zitat Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography [J]. IEEE Secur Priv 99(3):32–44CrossRef Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography [J]. IEEE Secur Priv 99(3):32–44CrossRef
11.
Zurück zum Zitat Fridrich J, Goljan M, Du R (2001) Detecting lsb steganography in color, and gray-scale images [J]. IEEE Multimedia 8(4):22–28CrossRef Fridrich J, Goljan M, Du R (2001) Detecting lsb steganography in color, and gray-scale images [J]. IEEE Multimedia 8(4):22–28CrossRef
12.
Zurück zum Zitat Zhou S, Tan B (2020) Electrocardiogram soft computing using hybrid deep learning CNN-ELM. Appl Soft Comput 86:105778CrossRef Zhou S, Tan B (2020) Electrocardiogram soft computing using hybrid deep learning CNN-ELM. Appl Soft Comput 86:105778CrossRef
13.
Zurück zum Zitat Zhou S, Ke M, Luo P (2019) Multi-camera transfer GAN for person re-identification. J Vis Commun Image Represent 59:393–400CrossRef Zhou S, Ke M, Luo P (2019) Multi-camera transfer GAN for person re-identification. J Vis Commun Image Represent 59:393–400CrossRef
14.
Zurück zum Zitat Sheng DH, Kin TU (2011) A novel video steganography based on non-uniform rectangular partition [C]. In: IEEE International Conference on Computational Science and Engineering Sheng DH, Kin TU (2011) A novel video steganography based on non-uniform rectangular partition [C]. In: IEEE International Conference on Computational Science and Engineering
15.
Zurück zum Zitat Zheng Xu, Guo L, Liu Y (2019) Special issue on intelligent signal processing methods and applications for photonic networks communications. Photon Netw Commun 37(2):139–140CrossRef Zheng Xu, Guo L, Liu Y (2019) Special issue on intelligent signal processing methods and applications for photonic networks communications. Photon Netw Commun 37(2):139–140CrossRef
16.
Zurück zum Zitat Dong K, Kim HJ, Yu X, Feng X (2020) Reversible data hiding for binary images based on adaptive overlapping pattern. EURASIP J Inf Secur 11:1–13 Dong K, Kim HJ, Yu X, Feng X (2020) Reversible data hiding for binary images based on adaptive overlapping pattern. EURASIP J Inf Secur 11:1–13
17.
Zurück zum Zitat Luo X, Chan EWW, Chang RKC (2008) Tcp covert timing channels: Design and detection [C]. In: IEEE International Conference on Dependable Systems and Networks with Ftcs and Dcc Luo X, Chan EWW, Chang RKC (2008) Tcp covert timing channels: Design and detection [C]. In: IEEE International Conference on Dependable Systems and Networks with Ftcs and Dcc
18.
Zurück zum Zitat Wu CW (2008) Research on stealth detection technology of network protocol [D]. Nanjing University of Science and Technology, Nanjing Wu CW (2008) Research on stealth detection technology of network protocol [D]. Nanjing University of Science and Technology, Nanjing
19.
Zurück zum Zitat Mingji Yu, Yuchen Liu Hu, Sun HY, Qiao T (2020) Adaptive and separable multiary reversible data hiding in encryption domain. EURASIP J Image Video Process 2020(1):16CrossRef Mingji Yu, Yuchen Liu Hu, Sun HY, Qiao T (2020) Adaptive and separable multiary reversible data hiding in encryption domain. EURASIP J Image Video Process 2020(1):16CrossRef
20.
Zurück zum Zitat Kim H-W, Mu H, Park JH, Sangaiah AK, Jeong Y-S (2020) Video transcoding scheme of multimedia data-hiding for multiform resources based on intra-cloud. J Ambient Intell Humaniz Comput 11(5):1809–1819CrossRef Kim H-W, Mu H, Park JH, Sangaiah AK, Jeong Y-S (2020) Video transcoding scheme of multimedia data-hiding for multiform resources based on intra-cloud. J Ambient Intell Humaniz Comput 11(5):1809–1819CrossRef
21.
Zurück zum Zitat Anushiadevi R, Pravinkumar P, Rayappan JBB, Amirtharajan R (2020) A high payload separable reversible data hiding in cipher image with good decipher image quality. J Intell Fuzzy Syst 38(5):6403–6414CrossRef Anushiadevi R, Pravinkumar P, Rayappan JBB, Amirtharajan R (2020) A high payload separable reversible data hiding in cipher image with good decipher image quality. J Intell Fuzzy Syst 38(5):6403–6414CrossRef
22.
Zurück zum Zitat Bazyar M, Sudirman R (2014) A recen treview of mp3 based steganography methods [J]. Intern J Secur Its Appl 8(6):405–414 Bazyar M, Sudirman R (2014) A recen treview of mp3 based steganography methods [J]. Intern J Secur Its Appl 8(6):405–414
23.
Zurück zum Zitat Binny A, Koilakuntla M (2014) Hiding secret information using lsb based audio steganography [C]. In: 2014 International Conferenceon Soft Computing and Machine Intelligence Binny A, Koilakuntla M (2014) Hiding secret information using lsb based audio steganography [C]. In: 2014 International Conferenceon Soft Computing and Machine Intelligence
25.
Zurück zum Zitat Meng T, Wolter K, Wu H, Wang Q (2018) A secure and cost-efficient offloading policy for mobile cloud computing against timing attacks. Pervasive Mob Comput 45:4–18CrossRef Meng T, Wolter K, Wu H, Wang Q (2018) A secure and cost-efficient offloading policy for mobile cloud computing against timing attacks. Pervasive Mob Comput 45:4–18CrossRef
Metadaten
Titel
Research on information steganography based on network data stream
verfasst von
Jiazhong Lu
Weisha Zhang
Ziye Deng
Shibin Zhang
Yan Chang
Xiaolei Liu
Publikationsdatum
04.08.2020
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 3/2021
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-020-05260-4

Weitere Artikel der Ausgabe 3/2021

Neural Computing and Applications 3/2021 Zur Ausgabe