NOVEL NETWORK STEGANOGRAPHY APPROACHES FOR CONFIDENTIAL TRANSMISSION OF INFORMATION
dc.authorid | Das, Resul/0000-0002-6113-4649 | |
dc.authorid | Karci, Ali/0000-0002-8489-8617 | |
dc.authorwosid | Das, Resul/V-9202-2018 | |
dc.authorwosid | KARCI, Ali/A-9604-2019 | |
dc.authorwosid | Karci, Ali/AAG-5337-2019 | |
dc.contributor.author | Karadogan, Ismail | |
dc.contributor.author | Das, Resul | |
dc.contributor.author | Karci, Ali | |
dc.date.accessioned | 2024-08-04T21:00:03Z | |
dc.date.available | 2024-08-04T21:00:03Z | |
dc.date.issued | 2017 | |
dc.department | İnönü Üniversitesi | en_US |
dc.description | 2017 International Artificial Intelligence and Data Processing Symposium (IDAP) -- SEP 16-17, 2017 -- Malatya, TURKEY | en_US |
dc.description.abstract | In this paper, two different packet timing and IP ID based network steganography approaches have been proposed to provide confidential transmission of information. In the proposed packet timing approach, it is seen that the bandwidth is higher than the previous methods. The proposed IP ID field based approach has been found to be more effective than previous methods in ensuring the uniqueness of the ID field and is suitable for sending confidential data over the Internet. In addition, comprehensive information on this study was presented by examining methods of information hiding, hidden channels and secret data transmission in the network environment. | en_US |
dc.description.sponsorship | IEEE Turkey Sect,Anatolian Sci | en_US |
dc.identifier.isbn | 978-1-5386-1880-6 | |
dc.identifier.uri | https://hdl.handle.net/11616/103769 | |
dc.identifier.wos | WOS:000426868700144 | en_US |
dc.identifier.wosquality | N/A | en_US |
dc.indekslendigikaynak | Web of Science | en_US |
dc.language.iso | tr | en_US |
dc.publisher | Ieee | en_US |
dc.relation.ispartof | 2017 International Artificial Intelligence and Data Processing Symposium (Idap) | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Network steganography | en_US |
dc.subject | covert channels | en_US |
dc.subject | network security | en_US |
dc.subject | communication protocols | en_US |
dc.title | NOVEL NETWORK STEGANOGRAPHY APPROACHES FOR CONFIDENTIAL TRANSMISSION OF INFORMATION | en_US |
dc.type | Conference Object | en_US |