Информатика и автоматизация (Sep 2023)

A Walk-through towards Network Steganography Techniques

  • Urmila Pilania,
  • Manoj Kumar,
  • Tanwar Rohit,
  • Neha Nandal

DOI
https://doi.org/10.15622/ia.22.5.6
Journal volume & issue
Vol. 22, no. 5
pp. 1103 – 1151

Abstract

Read online

2D and 3D digital multimedia files offer numerous benefits like excellent quality, compression, editing, reliable copying, etc. These qualities of the multimedia files, on the other hand, are the cause of fear including the fear of getting access to data during communication. Steganography plays an important role in providing security to the data in communication. Changing the type of cover file from digital multimedia files to protocols improve the security of the communication system. Protocols are an integral part of the communication system and these protocols can also be used to hide secret data resulting in low chances of detection. This paper is intended to help improve existing network steganography techniques by enhancing bandwidth and decreasing detection rates through reviewing previous related work. Recent papers of the last 21 years on network steganography techniques have been studied, analyzed, and summarized. This review can help researchers to understand the existing trends in network steganography techniques to pursue further work in this area for algorithms’ improvement. The paper is divided according to the layers of the OSI model.

Keywords