| Peer-Reviewed

About Software Implementation of Network Steganography Retransmission Based Algorithm

Received: 2 October 2014     Accepted: 15 October 2014     Published: 23 January 2015
Views:       Downloads:
Abstract

Hybrid network steganography method RSTEG was implemented for Windows TCP/IP stack. The implementation description is provided, including further development prospects.

Published in American Journal of Networks and Communications (Volume 4, Issue 1)
DOI 10.11648/j.ajnc.20150401.11
Page(s) 1-4
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2015. Published by Science Publishing Group

Keywords

Steganography, Retransmission Mechanism, RSTEG Algorithm

References
[1] W. Mazurczyk, M.Smolarczyk, K.Szczypiorski, “Retransmission steganography and its detection,” Soft Computing, ISSN: 1432-7643 (print version), ISSN: 1433-7479 (electronic version), Journal no. 500, Springer, November 2009.
[2] D. Wetherall, A. Tanenbaum, (2011). Computer networks. Upper Saddle River, NJ: Pearson Prentice Hall. ISBN 0-13-212695-8.
[3] SharpPcap library, http://sourceforge.net/projects/sharppcap/
[4] WinDivert library, http://reqrypt.org/windivert.html
[5] C. Chen, M. Mangrulkar, N. Ramos and M. Sarkar. Trends in TCP/IP Retransmissions and Resets, Technical Report, http://cseweb.ucsd.edu/classes/wi01/cse222/projects/reports/tcp-flags-13.pdf
[6] Jiangtao Zhai, Guangjie Liu, Yuewei Dai. An Improved Retransmission-based Network Steganography: Design and Detection. Journal of Networks, Vol. 8, No 1 (2013), 182-188, Jan 2013.
Cite This Article
  • APA Style

    D. Pavlin, A. Makosiy. (2015). About Software Implementation of Network Steganography Retransmission Based Algorithm. American Journal of Networks and Communications, 4(1), 1-4. https://doi.org/10.11648/j.ajnc.20150401.11

    Copy | Download

    ACS Style

    D. Pavlin; A. Makosiy. About Software Implementation of Network Steganography Retransmission Based Algorithm. Am. J. Netw. Commun. 2015, 4(1), 1-4. doi: 10.11648/j.ajnc.20150401.11

    Copy | Download

    AMA Style

    D. Pavlin, A. Makosiy. About Software Implementation of Network Steganography Retransmission Based Algorithm. Am J Netw Commun. 2015;4(1):1-4. doi: 10.11648/j.ajnc.20150401.11

    Copy | Download

  • @article{10.11648/j.ajnc.20150401.11,
      author = {D. Pavlin and A. Makosiy},
      title = {About Software Implementation of Network Steganography Retransmission Based Algorithm},
      journal = {American Journal of Networks and Communications},
      volume = {4},
      number = {1},
      pages = {1-4},
      doi = {10.11648/j.ajnc.20150401.11},
      url = {https://doi.org/10.11648/j.ajnc.20150401.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajnc.20150401.11},
      abstract = {Hybrid network steganography method RSTEG was implemented for Windows TCP/IP stack. The implementation description is provided, including further development prospects.},
     year = {2015}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - About Software Implementation of Network Steganography Retransmission Based Algorithm
    AU  - D. Pavlin
    AU  - A. Makosiy
    Y1  - 2015/01/23
    PY  - 2015
    N1  - https://doi.org/10.11648/j.ajnc.20150401.11
    DO  - 10.11648/j.ajnc.20150401.11
    T2  - American Journal of Networks and Communications
    JF  - American Journal of Networks and Communications
    JO  - American Journal of Networks and Communications
    SP  - 1
    EP  - 4
    PB  - Science Publishing Group
    SN  - 2326-8964
    UR  - https://doi.org/10.11648/j.ajnc.20150401.11
    AB  - Hybrid network steganography method RSTEG was implemented for Windows TCP/IP stack. The implementation description is provided, including further development prospects.
    VL  - 4
    IS  - 1
    ER  - 

    Copy | Download

Author Information
  • Siberian State Aerospace University , Institute of Informatics and Telecommunications/ Faculty of Informatics and Computer Science. Krasnoyarsk, Russia

  • Khakas State University, Republic of Khakassia,Abakan,Russia

  • Sections