RSTEG in TCP Protocol: A Novel Approach in Information Hiding DOI

P. Karthika,

P. Hemalatha,

V. Sujitha

и другие.

Опубликована: Апрель 2, 2024

Steganography is a method that has been used for years to communicate information in secret. These covert communications are placed into truthful carriers. Digital photos, music files, video data, and so on may all be The study introduces RSTEG (Retransmission STEGanography), novel stenographic technique meant wide range of protocols make use rebroadcast techniques. RSTEG's primary novelty its deliberate retransmission force packet acknowledged even after it completely acknowledged. payload field the transmitted contains steganogram rather than user data. We examine properties this study. As part recipient's communication strategy, selected segment's an Identifying Sequence (IS) strategically inserted within it. After delivery successful, recipient does not send back acknowledgment (ACK). sending phase includes queuing steganograms from application layer, upon cover data arrival, IS identification. In receiving phase, receiver identifies IS-containing segments, withholding ACK requests acknowledging non-RSTEG crucial involves creating counters marked segments; if triggered, occurs with place or unchanged based counter status. experimentation client/server architecture basic TCP implementation relying Retransmission Time Outs (RTO), incorporating functionalities by implementing compensating algorithm increase stealthiness RSTEG.

Язык: Английский

RSTEG in TCP Protocol: A Novel Approach in Information Hiding DOI

P. Karthika,

P. Hemalatha,

V. Sujitha

и другие.

Опубликована: Апрель 2, 2024

Steganography is a method that has been used for years to communicate information in secret. These covert communications are placed into truthful carriers. Digital photos, music files, video data, and so on may all be The study introduces RSTEG (Retransmission STEGanography), novel stenographic technique meant wide range of protocols make use rebroadcast techniques. RSTEG's primary novelty its deliberate retransmission force packet acknowledged even after it completely acknowledged. payload field the transmitted contains steganogram rather than user data. We examine properties this study. As part recipient's communication strategy, selected segment's an Identifying Sequence (IS) strategically inserted within it. After delivery successful, recipient does not send back acknowledgment (ACK). sending phase includes queuing steganograms from application layer, upon cover data arrival, IS identification. In receiving phase, receiver identifies IS-containing segments, withholding ACK requests acknowledging non-RSTEG crucial involves creating counters marked segments; if triggered, occurs with place or unchanged based counter status. experimentation client/server architecture basic TCP implementation relying Retransmission Time Outs (RTO), incorporating functionalities by implementing compensating algorithm increase stealthiness RSTEG.

Язык: Английский

Процитировано

0