Search For:

Displaying 1-10 out of 10 total
How Hidden Can be Even More Hidden?
Found in: Multimedia Information Networking and Security, International Conference on
By Wojciech Fraczek,Wojciech Mazurczyk,Krzysztof Szczypiorski
Issue Date:November 2011
pp. 581-585
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques ...
 
Stream Control Transmission Protocol Steganography
Found in: Multimedia Information Networking and Security, International Conference on
By Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski
Issue Date:November 2010
pp. 829-834
Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating system...
 
Multi-segment Green Light Optimal Speed Advisory
Found in: 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW)
By Marcin Seredynski,Wojciech Mazurczyk,Djamel Khadraoui
Issue Date:May 2013
pp. 459-465
The problem of how to adjust speed of vehicles so that they can arrive at the intersection when the light is green can be solved by means of Green Light Optimal Speed Advisory (GLOSA). The existing GLOSA approaches are single segment, that is, they conside...
 
Is Cloud Computing Steganography-proof?
Found in: Multimedia Information Networking and Security, International Conference on
By Wojciech Mazurczyk,Krzysztof Szczypiorski
Issue Date:November 2011
pp. 441-442
The paper focuses on characterisation of information hiding possibilities in Cloud Computing. After general introduction to cloud computing and its security we move to brief description of steganography. In particular we introduce classification of stegano...
 
Retransmission Steganography Applied
Found in: Multimedia Information Networking and Security, International Conference on
By Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski
Issue Date:November 2010
pp. 846-850
This paper presents experimental results of the implementation of network steganography method called RSTEG (Retransmission Steganography). The main idea of RSTEG is to not acknowledge a successfully received packet to intentionally invoke retransmission. ...
 
Hiding Data in OFDM Symbols of IEEE 802.11 Networks
Found in: Multimedia Information Networking and Security, International Conference on
By Krzysztof Szczypiorski, Wojciech Mazurczyk
Issue Date:November 2010
pp. 835-840
This paper presents a new steganographic method called WiPad (Wireless Padding). It is based on the insertion of hidden data into the padding of frames at the physical layer of WLANs (Wireless Local Area Networks). A performance analysis based on a Markov ...
 
Steganography in Handling Oversized IP Packets
Found in: Multimedia Information Networking and Security, International Conference on
By Wojciech Mazurczyk, Krzysztof Szczypiorski
Issue Date:November 2009
pp. 559-564
This paper identifies new class of network steganography methods that utilize mechanisms for handling oversized IP packets: IP fragmentation, PMTUD (Path MTU Discovery) and PLPMTUD (Packetization Layer Path MTU Discovery). In particular, for these mechanis...
 
StegTorrent: A Steganographic Method for the P2P File Sharing Service
Found in: 2013 IEEE CS Security and Privacy Workshops (SPW2013)
By Pawel Kopiczko,Wojciech Mazurczyk,Krzysztof Szczypiorski
Issue Date:May 2013
pp. 151-157
The paper proposes StegTorrent a new network steganographic method for the popular P2P file transfer service-BitTorrent. It is based on modifying the order of data packets in the peer-peer data exchange protocol. Unlike other existing steganographic method...
   
Trends in steganography
Found in: Communications of the ACM
By Elżbieta Zielińska, Krzysztof Szczypiorski, Wojciech Mazurczyk
Issue Date:March 2014
pp. 86-95
Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged.
     
VoIP steganography and its Detection—A survey
Found in: ACM Computing Surveys (CSUR)
By Wojciech Mazurczyk
Issue Date:November 2013
pp. 1-21
Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to embed secret information into a carrier message. Steganographic methods are usually aimed at hiding the very existence of the communication. D...
     
 1