Please use this identifier to cite or link to this item:
https://repository.sustech.edu/handle/123456789/10425
Title: | MULTI-LEVEL STEGANOGRAPHY OVER THE TCP/IP |
Other Titles: | TCP/IPإخفاء متعدد الطبقات على بروتوكول |
Authors: | SAYED, MUTWKIL FAISAL SUPERVISOR - TALAT WAHBI |
Keywords: | TCP/IP MULTI-LEVEL STEGANOGRAPHY network protocols MLS |
Issue Date: | Sep-2014 |
Publisher: | Sudan University of Science and Technology |
Citation: | SAYED, MUTWKIL FAISAL. MULTI-LEVEL STEGANOGRAPHY OVER THE TCP/IP/ MUTWKIL FAISAL SAYED؛ TALAT WAHBI .-Khartoum : sudan university of science and technology,computer science,2014.-409p:ill;28cm.M.Sc. |
Abstract: | To perform hidden communication through the network, network protocols and/or relationships between them have been utilized as a carrier to transmit secret data. For each network steganography method there is always a trade-off necessary between maximizing steganographic bandwidth (how much data we are able to send using this particular method) and still remaining undetected. In this work a new steganographic method is developed that aims to achieve undetectability and relatively increase steganographic bandwidth. This method depends completely on concept called Multi Level steganography (MLS). In MLS, at least two steganographic methods are utilized simultaneously in such a way that one method’s (the upper-level) network traffic serves as a carrier for the second method (the lower-level). Experimental results were obtained demonstrating that the average transmission time of network decreased by 14.8% due to using of MLS, and the time required to transfer steganogram file of size equal to 50 bytes through the system is 166.43 seconds, about (2 minutes and 46 seconds). |
Description: | Thesis |
URI: | http://repository.sustech.edu/handle/123456789/10425 |
Appears in Collections: | Masters Dissertations : Computer Science and Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Multi-level steganography.pdf | Research | 609.96 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.