Search For:

Displaying 1-12 out of 12 total
Performance Evaluation of Trust-Based Collaborative Sanctioning in MANETs
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Marcin Seredynski,Riad Aggoune,Krzysztof Szczypiorski,Djamel Khadraoui
Issue Date:July 2013
pp. 81-88
Collaborative sanctioning (CS) is necessary in mobile ad hoc networks (MANETs), as cooperation in packet forwarding of network members is crucial. CS provides incentives for good behaviour, hence, it induces nodes with self regarding preferences to act coo...
 
How Hidden Can be Even More Hidden?
Found in: Multimedia Information Networking and Security, International Conference on
By Wojciech Fraczek,Wojciech Mazurczyk,Krzysztof Szczypiorski
Issue Date:November 2011
pp. 581-585
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques ...
 
Direct Sequence Spread Spectrum Steganographic Scheme for IEEE 802.15.4
Found in: Multimedia Information Networking and Security, International Conference on
By Elzbieta Zielinska,Krzysztof Szczypiorski
Issue Date:November 2011
pp. 586-590
This work addresses the issues related to network steganography in IEEE 802.15.4 Wireless Personal Area Networks (WPAN). The proposed communication scheme employs illicit Direct Sequence Spread Spectrum code sequences for the transmission of steganographic...
 
Is Cloud Computing Steganography-proof?
Found in: Multimedia Information Networking and Security, International Conference on
By Wojciech Mazurczyk,Krzysztof Szczypiorski
Issue Date:November 2011
pp. 441-442
The paper focuses on characterisation of information hiding possibilities in Cloud Computing. After general introduction to cloud computing and its security we move to brief description of steganography. In particular we introduce classification of stegano...
 
Retransmission Steganography Applied
Found in: Multimedia Information Networking and Security, International Conference on
By Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski
Issue Date:November 2010
pp. 846-850
This paper presents experimental results of the implementation of network steganography method called RSTEG (Retransmission Steganography). The main idea of RSTEG is to not acknowledge a successfully received packet to intentionally invoke retransmission. ...
 
Stream Control Transmission Protocol Steganography
Found in: Multimedia Information Networking and Security, International Conference on
By Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski
Issue Date:November 2010
pp. 829-834
Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating system...
 
Hiding Data in OFDM Symbols of IEEE 802.11 Networks
Found in: Multimedia Information Networking and Security, International Conference on
By Krzysztof Szczypiorski, Wojciech Mazurczyk
Issue Date:November 2010
pp. 835-840
This paper presents a new steganographic method called WiPad (Wireless Padding). It is based on the insertion of hidden data into the padding of frames at the physical layer of WLANs (Wireless Local Area Networks). A performance analysis based on a Markov ...
 
A Performance Analysis of HICCUPS--A Steganographic System for WLAN
Found in: Multimedia Information Networking and Security, International Conference on
By Krzysztof Szczypiorski
Issue Date:November 2009
pp. 569-572
The paper presents an analysis of performance features of the HICCUPS (HIdden Communication system for CorrUPted networkS) including the efficiency and the cost of the system in WLANs (Wireless Local Area Networks). The analysis relies on the original CSMA...
 
Steganography in Handling Oversized IP Packets
Found in: Multimedia Information Networking and Security, International Conference on
By Wojciech Mazurczyk, Krzysztof Szczypiorski
Issue Date:November 2009
pp. 559-564
This paper identifies new class of network steganography methods that utilize mechanisms for handling oversized IP packets: IP fragmentation, PMTUD (Path MTU Discovery) and PLPMTUD (Packetization Layer Path MTU Discovery). In particular, for these mechanis...
 
StegTorrent: A Steganographic Method for the P2P File Sharing Service
Found in: 2013 IEEE CS Security and Privacy Workshops (SPW2013)
By Pawel Kopiczko,Wojciech Mazurczyk,Krzysztof Szczypiorski
Issue Date:May 2013
pp. 151-157
The paper proposes StegTorrent a new network steganographic method for the popular P2P file transfer service-BitTorrent. It is based on modifying the order of data packets in the peer-peer data exchange protocol. Unlike other existing steganographic method...
   
Steganography in OFDM Symbols of Fast IEEE 802.11n Networks
Found in: 2013 IEEE CS Security and Privacy Workshops (SPW2013)
By Szymon Grabski,Krzysztof Szczypiorski
Issue Date:May 2013
pp. 158-164
This paper presents a proposal of covert steganographic channels in high-speed IEEE 802.11n networks. The method is based on the modification of cyclic prefixes in OFDM (Orthogonal Frequency-Division Multiplexing) symbols. This proposal provides the highes...
   
Trends in steganography
Found in: Communications of the ACM
By Elżbieta Zielińska, Krzysztof Szczypiorski, Wojciech Mazurczyk
Issue Date:March 2014
pp. 86-95
Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged.
     
 1