使用TCP / IP的序列号进行隐写

J. M. Kadhim, Abeer E Abed
{"title":"使用TCP / IP的序列号进行隐写","authors":"J. M. Kadhim, Abeer E Abed","doi":"10.22401/JNUS.20.4.16","DOIUrl":null,"url":null,"abstract":"The exchanging process inside LAN or through the Internet may be exposed to be stolen, altered or damaged by a baleful person who was represented as real threats to transport process and also to information especially if this information was sensitive, important and must be accessed by only authorized person. Therefore this data must be secured against such threats. Steganography is classified as the art of hiding information in a suitable carrier like image, text, audio and video. It can also be applied to network protocols whether to header or payload of the packet. In this paper, steganography was implemented on the header of IP packet protocol and/or TCP segment protocol by exploiting the sequence number field of this header for hiding information inside it. In addition, four characters would be sent in every connection. So to increase the amount of information which could be sent, the number of connections must be increased.","PeriodicalId":14922,"journal":{"name":"Journal of Al-Nahrain University-Science","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Steganography Using TCP / IP's Sequence Number\",\"authors\":\"J. M. Kadhim, Abeer E Abed\",\"doi\":\"10.22401/JNUS.20.4.16\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The exchanging process inside LAN or through the Internet may be exposed to be stolen, altered or damaged by a baleful person who was represented as real threats to transport process and also to information especially if this information was sensitive, important and must be accessed by only authorized person. Therefore this data must be secured against such threats. Steganography is classified as the art of hiding information in a suitable carrier like image, text, audio and video. It can also be applied to network protocols whether to header or payload of the packet. In this paper, steganography was implemented on the header of IP packet protocol and/or TCP segment protocol by exploiting the sequence number field of this header for hiding information inside it. In addition, four characters would be sent in every connection. So to increase the amount of information which could be sent, the number of connections must be increased.\",\"PeriodicalId\":14922,\"journal\":{\"name\":\"Journal of Al-Nahrain University-Science\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Al-Nahrain University-Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.22401/JNUS.20.4.16\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Al-Nahrain University-Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22401/JNUS.20.4.16","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

局域网内或通过互联网的交换过程可能会被恶意的人窃取,更改或损坏,这些恶意的人被认为是对传输过程和信息的真正威胁,特别是如果这些信息是敏感的,重要的并且必须由授权人员访问。因此,必须保护这些数据免受此类威胁。隐写术是将信息隐藏在合适的载体中,如图像、文本、音频和视频。它也可以应用于网络协议,无论是报头还是包的有效载荷。本文通过对IP包协议和/或TCP段协议的报头进行隐写,利用报头的序列号字段隐藏其中的信息。此外,在每次连接中将发送四个字符。因此,为了增加可以发送的信息量,必须增加连接的数量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Steganography Using TCP / IP's Sequence Number
The exchanging process inside LAN or through the Internet may be exposed to be stolen, altered or damaged by a baleful person who was represented as real threats to transport process and also to information especially if this information was sensitive, important and must be accessed by only authorized person. Therefore this data must be secured against such threats. Steganography is classified as the art of hiding information in a suitable carrier like image, text, audio and video. It can also be applied to network protocols whether to header or payload of the packet. In this paper, steganography was implemented on the header of IP packet protocol and/or TCP segment protocol by exploiting the sequence number field of this header for hiding information inside it. In addition, four characters would be sent in every connection. So to increase the amount of information which could be sent, the number of connections must be increased.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Reducing Data Sparsity in Recommender Systems Synthesis and Characterization of Hetrocyclic Compounds Derived from ethyl-4-aminobenzoate The Consequences of Heavy Metals Resulting from Terrorist Operations in Three Regions of Baghdad, Iraq on Thyroid Function Synthesis and Characterization of Palladium (II) Complexes Containing Mixed Ligands with Pyrrolidine Dithiocarbamate and Phosphines An Ecological Assessment for Water Quality of Some Water Bodies in Koysenjaq-Erbil, Iraq.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1