Skip to main content

Showing 1–5 of 5 results for author: Fraczek, W

Searching in archive cs. Search in all archives.
.
  1. arXiv:1506.02311  [pdf

    cs.MM cs.CR

    StegBlocks: ensuring perfect undetectability of network steganography

    Authors: Wojciech Fraczek, Krzysztof Szczypiorski

    Abstract: The paper presents StegBlocks, which defines a new concept for performing undetectable hidden communication. StegBlocks is a general approach for constructing methods of network steganography. In StegBlocks, one has to determine objects with defined properties which will be used to transfer hidden messages. The objects are dependent on a specific network protocol (or application) used as a carrier… ▽ More

    Submitted 7 June, 2015; originally announced June 2015.

    Comments: 6 pages, 1 figure, Accepted to Fourth International Workshop on Cyber Crime (IWCC 2015), co-located with 10th International Conference on Availability, Reliability and Security (ARES 2015), Toulouse, France, 24-28 August 2015

  2. arXiv:1107.4065  [pdf

    cs.CR

    How Hidden Can Be Even More Hidden?

    Authors: Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided base… ▽ More

    Submitted 20 July, 2011; originally announced July 2011.

    Comments: 5 pages, 8 figures

  3. arXiv:1104.3333  [pdf

    cs.CR

    Hiding Information in a Stream Control Transmission Protocol

    Authors: Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: The STCP (Stream Control Transmission Protocol) is a candidate for a new transport layer protocol that may replace the TCP (Transmission Control Protocol) and the UDP (User Datagram Protocol) protocols in future IP networks. Currently, the SCTP is implemented in, or can be added to, many popular operating systems (Windows, BSD, Linux, HPUX or Sun Solaris). This paper identifies and presents all po… ▽ More

    Submitted 17 April, 2011; originally announced April 2011.

    Comments: 12 pages, 17 figures, 2 tables

  4. Multi-Level Steganography: Improving Hidden Communication in Networks

    Authors: Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the upper-level) serves as a carrier for the second one (called the lower-level). Such a relationship between two (or more) information hiding solutions… ▽ More

    Submitted 9 April, 2012; v1 submitted 25 January, 2011; originally announced January 2011.

    Comments: 18 pages, 13 figures

    Journal ref: Journal of Universal Computer Science (J. UCS), Vol. 18, No. 14, pp. 1967-1986

  5. arXiv:1006.0247  [pdf

    cs.CR

    Stream Control Transmission Protocol Steganography

    Authors: Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows.… ▽ More

    Submitted 1 June, 2010; originally announced June 2010.

    Comments: 6 pages, 6 figures, 2 tables