Computer Science – Cryptography and Security
Scientific paper
2011-07-20
Computer Science
Cryptography and Security
5 pages, 8 figures
Scientific paper
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram extraction harder to perform.
Fraczek Wojciech
Mazurczyk Wojciech
Szczypiorski Krzysztof
No associations
LandOfFree
How Hidden Can Be Even More Hidden? does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with How Hidden Can Be Even More Hidden?, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and How Hidden Can Be Even More Hidden? will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-36363