Implementation of an Optimized Steganography Technique over TCP/IP and Tests Against Well-Known Security Equipment

Journal Title: Engineering, Technology & Applied Science Research - Year 2018, Vol 8, Issue 6

Abstract

Nowadays we are witnessing a total convergence towards a digital world where information is digitized, conveyed and processed using highly developed techniques and tools. The development of broadband networks, including the internet, has made easy the manipulation, transmission and sharing of information. However, new security issues arise and they are particularly related to integrity, confidentiality and traceability of data. Facing this situation, network security has become very important and challenges related to the protection of exchanged data over the internet against unauthorized access and use have increased. In the current work, we propose to implement an optimized steganography technique over TCP/IP protocol [1]. We have also tested it against well-known security equipment using latest versions. We will see that they are inefficient to stop this kind of cover channels. Our work is like an alarm to every IT administrator to change their thinking about data lost prevention (DLP) and exfiltration of sensitive information.

Authors and Affiliations

M. Tarhda, R. E. Gouri, L. Hlou

Keywords

Related Articles

Perspectives on a Big Data Application: What Database Engineers and IT Students Need to Know

Cloud Computing and Big Data are important and related current trends in the world of information technology. They will have significant impact on the curricula of computer engineering and information systems at universi...

An Appraisal of Asia-Pacific Cities as Control and Command Centres Embedded in World City Network

Since the globalization trend is proliferating at a staggering rate, world cities have emerged as the most dominant vanguard incorporated into global economy. Control and command function is one of the robust integral pa...

Enhancing the HVRT and LVRT Capabilities of DFIG-based Wind Turbine in an Islanded Microgrid

Doubly fed induction generator (DFIG) based wind turbines are very sensitive to grid voltage variations. Therefore, low-voltage-ride-through (LVRT) and high-voltage-ride-through (HVRT) capabilities are employed to improv...

Quality Improvement of a Small Water Supply. A Practical Application of a Full System of Nanofiltration

The THM level in the Spanish drinking water is limited to less than 0.100 mg/L, due to its potential toxicological effect on humans. This paper investigates the comparison of the results obtained in a small supply of wat...

An Image Fusion Technique Based on Hadamard Transform and HVS

The main endeavor of image fusion is to obtain an image that contains more visual quality information than any one of the source images. In general, the source images may be multi focus, multi modality, multi resolution,...

Download PDF file
  • EP ID EP283657
  • DOI -
  • Views 272
  • Downloads 0

How To Cite

M. Tarhda, R. E. Gouri, L. Hlou (2018). Implementation of an Optimized Steganography Technique over TCP/IP and Tests Against Well-Known Security Equipment. Engineering, Technology & Applied Science Research, 8(6), -. https://europub.co.uk/articles/-A-283657