Skip to main content

Showing 1–41 of 41 results for author: Szczypiorski, K

.
  1. SHAH: Hash Function based on Irregularly Decimated Chaotic Map

    Authors: Mihaela Todorova, Borislav Stoyanov, Krzysztof Szczypiorski, Krasimir Kordov

    Abstract: In this paper, we propose a novel hash function based on irregularly decimated chaotic map. The hash function called SHAH is based on two Tinkerbell maps filtered with irregular decimation rule. Exact study has been provided on the novel scheme using distribution analysis, sensitivity analysis, static analysis of diffusion and confusion, and collision analysis. The experimental data show that SHAH… ▽ More

    Submitted 19 August, 2018; v1 submitted 29 July, 2018; originally announced August 2018.

    Comments: accepted for publication in International Journal of Electronics and Telecommunications, vol. 64

  2. arXiv:1706.09641  [pdf

    cs.CR cs.MM

    SocialStegDisc: Application of steganography in social networks to create a file system

    Authors: Jedrzej Bieniasz, Krzysztof Szczypiorski

    Abstract: The concept named SocialStegDisc was introduced as an application of the original idea of StegHash method. This new kind of mass-storage was characterized by unlimited space. The design also attempted to improve the operation of StegHash by trade-off between memory requirements and computation time. Applying the mechanism of linked list provided the set of operations on files: creation, reading, d… ▽ More

    Submitted 29 June, 2017; originally announced June 2017.

    Comments: 5 pages, 5 figures

  3. arXiv:1705.07788  [pdf, other

    cs.MM

    StegIbiza: Steganography in Club Music Implemented in Python

    Authors: Krzysztof Szczypiorski, Wojciech Zydecki

    Abstract: This paper introduces the implementation of steganography method called StegIbiza, which uses tempo modulation as hidden message carrier. With the use of Python scripting language, a bit string was encoded and decoded using WAV and MP3 files. Once the message was hidden into a music files, an internet radio was created to evaluate broadcast possibilities. No dedicated music or signal processing eq… ▽ More

    Submitted 22 May, 2017; originally announced May 2017.

    Comments: 4 pages, 4 figures, 1 table

  4. Yet Another Pseudorandom Number Generator

    Authors: Borislav Stoyanov, Krzysztof Szczypiorski, Krasimir Kordov

    Abstract: We propose a novel pseudorandom number generator based on Rössler attractor and bent Boolean function. We estimated the output bits properties by number of statistical tests. The results of the cryptanalysis show that the new pseudorandom number generation scheme provides a high level of data security.

    Submitted 24 February, 2017; originally announced February 2017.

    Comments: 5 pages, 7 figures; to be published in International Journal of Electronics and Telecommunications, vol.63, no.4

  5. arXiv:1611.00306  [pdf

    cs.CR cs.NI

    StegHash: New Method for Information Hiding in Open Social Networks

    Authors: Krzysztof Szczypiorski

    Abstract: In this paper a new method for information hiding in open social networks is introduced. The method, called StegHash, is based on the use of hashtags in various open social networks to connect multimedia files (like images, movies, songs) with embedded hidden messages. The evaluation of the system was performed on two social media services (Twitter and Instagram) with a simple environment as a pro… ▽ More

    Submitted 1 November, 2016; originally announced November 2016.

    Comments: 6 pages, 8 figures, 1 table

  6. arXiv:1610.01955  [pdf

    cs.MM cs.CR

    MoveSteg: A Method of Network Steganography Detection

    Authors: Krzysztof Szczypiorski, Tomasz Tyl

    Abstract: This article presents a new method for detecting a source point of time based network steganography - MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods. The presented analysis describes a method that allows finding the source of steganography st… ▽ More

    Submitted 6 October, 2016; originally announced October 2016.

    Comments: 7 pages, 7 figures, 3 tables

  7. YouSkyde: Information Hiding for Skype Video Traffic

    Authors: Wojciech Mazurczyk, Maciej Karas, Krzysztof Szczypiorski, Artur Janicki

    Abstract: In this paper a new information hiding method for Skype videoconference calls - YouSkyde - is introduced. A Skype traffic analysis revealed that introducing intentional losses into the Skype video traffic stream to provide the means for clandestine communication is the most favourable solution. A YouSkyde proof-of-concept implementation was carried out and its experimental evaluation is presented.… ▽ More

    Submitted 25 August, 2016; originally announced August 2016.

    Comments: 16 pages, 10 figures

    Journal ref: Multimedia Tools and Applications, 2015

  8. arXiv:1608.02988  [pdf

    cs.CR cs.MM

    StegIbiza: New Method for Information Hiding in Club Music

    Authors: Krzysztof Szczypiorski

    Abstract: In this paper a new method for information hiding in club music is introduced. The method called StegIbiza is based on using the music tempo as a carrier. The tempo is modulated by hidden messages with a 3-value coding scheme, which is an adoption of Morse code for StegIbiza. The evaluation of the system was performed for several music samples (with and without StegIbiza enabled) on a selected gro… ▽ More

    Submitted 9 August, 2016; originally announced August 2016.

    Comments: 5 pages, 4 figures, 1 table

  9. arXiv:1508.04978  [pdf

    cs.MM cs.CR

    "The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography

    Authors: Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel

    Abstract: In this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of "the moving observer". We considered three levels of undetectability named: "good", "bad", and "ugly". To illustrate this method we chose Wi-Fi steganography as a solid family of information hiding protocols. We present the state of the art in this area covering well-known hidin… ▽ More

    Submitted 9 September, 2015; v1 submitted 20 August, 2015; originally announced August 2015.

    Comments: 6 pages, 6 figures, to appear in Proc. of: ICNIT 2015 - 6th International Conference on Networking and Information Technology, Tokyo, Japan, November 5-6, 2015

  10. arXiv:1506.02311  [pdf

    cs.MM cs.CR

    StegBlocks: ensuring perfect undetectability of network steganography

    Authors: Wojciech Fraczek, Krzysztof Szczypiorski

    Abstract: The paper presents StegBlocks, which defines a new concept for performing undetectable hidden communication. StegBlocks is a general approach for constructing methods of network steganography. In StegBlocks, one has to determine objects with defined properties which will be used to transfer hidden messages. The objects are dependent on a specific network protocol (or application) used as a carrier… ▽ More

    Submitted 7 June, 2015; originally announced June 2015.

    Comments: 6 pages, 1 figure, Accepted to Fourth International Workshop on Cyber Crime (IWCC 2015), co-located with 10th International Conference on Availability, Reliability and Security (ARES 2015), Toulouse, France, 24-28 August 2015

  11. arXiv:1506.02071  [pdf

    cs.MM cs.CR

    Using Facebook for Image Steganography

    Authors: Jason Hiney, Tejas Dakve, Krzysztof Szczypiorski, Kris Gaj

    Abstract: Because Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held devices running iOS, Android, or Windows Phone), it would seem to be the perfect place to conduct steganography. On Facebook, information hidden in ima… ▽ More

    Submitted 5 June, 2015; originally announced June 2015.

    Comments: 6 pages, 4 figures, 2 tables. Accepted to Fourth International Workshop on Cyber Crime (IWCC 2015), co-located with 10th International Conference on Availability, Reliability and Security (ARES 2015), Toulouse, France, 24-28 August 2015

  12. arXiv:1406.2519  [pdf

    cs.MM cs.CR

    On Importance of Steganographic Cost For Network Steganography

    Authors: Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares, Krzysztof Szczypiorski

    Abstract: Network steganography encompasses the information hiding techniques that can be applied in communication network environments and that utilize hidden data carriers for this purpose. In this paper we introduce a characteristic called steganographic cost which is an indicator for the degradation or distortion of the carrier caused by the application of the steganographic method. Based on exemplary c… ▽ More

    Submitted 10 June, 2014; originally announced June 2014.

    Comments: 15 pages, 14 figures, 3 tables

  13. arXiv:1402.0239  [pdf

    cs.CR cs.DC

    Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment

    Authors: Bartosz Lipinski, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: Steganographic methods allow the covert exchange of secret data between parties aware of the procedure. The cloud computing environment is a new and hot target for steganographers, and currently not many solutions have been proposed. This paper proposes CloudSteg which is a steganographic method that allows the creation of a covert channel based on hard disk contention between the two cloud instan… ▽ More

    Submitted 2 February, 2014; originally announced February 2014.

    Comments: 8 pages, 9 figures, 1 table

  14. arXiv:1303.4264  [pdf

    cs.MM cs.CR

    StegTorrent: a Steganographic Method for the P2P File Sharing Service

    Authors: Pawel Kopiczko, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: The paper proposes StegTorrent a new network steganographic method for the popular P2P file transfer service-BitTorrent. It is based on modifying the order of data packets in the peer-peer data exchange protocol. Unlike other existing steganographic methods that modify the packets' order it does not require any synchronization. Experimental results acquired from prototype implementation proved tha… ▽ More

    Submitted 18 March, 2013; originally announced March 2013.

    Comments: 7 pages, 7 figures, 1 table

  15. arXiv:1301.3632  [pdf

    cs.CR cs.MM

    SkyDe: a Skype-based Steganographic Method

    Authors: Wojciech Mazurczyk, Maciej Karas, Krzysztof Szczypiorski

    Abstract: This paper introduces SkyDe (Skype Hide), a new steganographic method that utilizes Skype encrypted packets with silence to provide the means for clandestine communication. It is possible to reuse packets that do not carry voice signals for steganographic purposes because Skype does not use any silence suppression mechanism. The method's proof-of-concept implementation and first experimental resul… ▽ More

    Submitted 16 January, 2013; originally announced January 2013.

    Comments: 7 pages, 6 figures, 1 table. The paper is submitted to 1st ACM Information Hiding and Multimedia Security Workshop (IH and ACM MMSec conferences merged into a single event), June 17-19, 2013, Montpellier, France

    Journal ref: International Journal of Computers, Communications & Control (IJCCC), ISSN: 1841- 9836, 8(3), June 2013, pp. 389-400

  16. arXiv:1210.5888  [pdf

    cs.CR cs.MM

    Steganalysis of Transcoding Steganography

    Authors: Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: TranSteg (Trancoding Steganography) is a fairly new IP telephony steganographic method that functions by compressing overt (voice) data to make space for the steganogram by means of transcoding. It offers high steganographic bandwidth, retains good voice quality and is generally harder to detect than other existing VoIP steganographic methods. In TranSteg, after the steganogram reaches the receive… ▽ More

    Submitted 22 October, 2012; originally announced October 2012.

    Comments: 13 pages, 7 figures, 2 tables

  17. arXiv:1208.2861  [pdf

    cs.CR

    Towards Steganography Detection Through Network Traffic Visualisation

    Authors: Wojciech Mazurczyk, Krzysztof Szczypiorski, Bartosz Jankowski

    Abstract: The paper presents initial step toward new network anomaly detection method that is based on traffic visualisation. The key design principle of the proposed approach is the lack of direct, linear time dependencies for the created network traffic visualisations. The method's feasibility is demonstrated in network steganography environment by presenting steg-tomography methodology and develo** the… ▽ More

    Submitted 14 August, 2012; originally announced August 2012.

    Comments: 8 pages, 11 figures

  18. arXiv:1207.0917  [pdf

    cs.CR

    Principles and Overview of Network Steganography

    Authors: Jozef Lubacz, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: The paper presents basic principles of network steganography, which is a comparatively new research subject in the area of information hiding, followed by a concise overview and classification of network steganographic methods and techniques.

    Submitted 4 July, 2012; originally announced July 2012.

    Comments: 7 pages, 3 figures

  19. arXiv:1202.5289  [pdf

    cs.MM

    Development Trends in Steganography

    Authors: Elzbieta Zielinska, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: Steganography is a general term referring to all methods for the embedding of additional secret content into some form of carrier, with the aim of concealment of the introduced alterations. The choice of the carrier is nearly unlimited, it may be an ancient piece of parchment, as well as a network protocol header. Inspired by biological phenomena, adopted by man in the ancient times, it has been d… ▽ More

    Submitted 30 July, 2013; v1 submitted 23 February, 2012; originally announced February 2012.

    Comments: 13 pages, 1 figure, 1 table

  20. arXiv:1201.6218  [pdf

    cs.CR cs.MM

    Influence of Speech Codecs Selection on Transcoding Steganography

    Authors: Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: The typical approach to steganography is to compress the covert data in order to limit its size, which is reasonable in the context of a limited steganographic bandwidth. TranSteg (Trancoding Steganography) is a new IP telephony steganographic method that was recently proposed that offers high steganographic bandwidth while retaining good voice quality. In TranSteg, compression of the overt data i… ▽ More

    Submitted 30 January, 2012; originally announced January 2012.

    Comments: 17 pages, 5 figures, 4 tables

  21. arXiv:1111.1250  [pdf

    cs.CR cs.MM

    Using Transcoding for Hidden Communication in IP Telephony

    Authors: Wojciech Mazurczyk, Pawel Szaga, Krzysztof Szczypiorski

    Abstract: The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt data that is compressed to make space for the steganogram. The main innovation of TranSteg is to, for a chosen voice stream, find a codec that wi… ▽ More

    Submitted 4 November, 2011; originally announced November 2011.

    Comments: 17 pages, 16 figures, 4 tables

  22. arXiv:1107.4230  [pdf, other

    cs.CR

    Direct Sequence Spread Spectrum Steganographic Scheme for IEEE 802.15.4

    Authors: Elzbieta Zielinska, Krzysztof Szczypiorski

    Abstract: This work addresses the issues related to network steganography in IEEE 802.15.4 Wireless Personal Area Networks (WPAN). The proposed communication scheme employs illicit Direct Sequence Spread Spectrum code sequences for the transmission of steganographic data. The presented approach is a compromise between minimising the probability of covert channel disclosure and providing robustness against r… ▽ More

    Submitted 21 July, 2011; originally announced July 2011.

  23. arXiv:1107.4077  [pdf

    cs.CR

    Is Cloud Computing Steganography-proof?

    Authors: Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: The paper focuses on characterisation of information hiding possibilities in Cloud Computing. After general introduction to cloud computing and its security we move to brief description of steganography. In particular we introduce classification of steganographic communication scenarios in cloud computing which is based on location of the steganograms receiver. These scenarios as well as the threa… ▽ More

    Submitted 20 July, 2011; originally announced July 2011.

    Comments: 2 pages, 1 figure

  24. arXiv:1107.4065  [pdf

    cs.CR

    How Hidden Can Be Even More Hidden?

    Authors: Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided base… ▽ More

    Submitted 20 July, 2011; originally announced July 2011.

    Comments: 5 pages, 8 figures

  25. arXiv:1107.4062  [pdf

    cs.CR

    Sending Hidden Data via Google Suggest

    Authors: Piotr Bialczak, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while ty**. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data carrier. The detailed description of the method's idea is backed up… ▽ More

    Submitted 20 July, 2011; originally announced July 2011.

    Comments: 11 pages, 17 figures, 4 tables

  26. arXiv:1104.3333  [pdf

    cs.CR

    Hiding Information in a Stream Control Transmission Protocol

    Authors: Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: The STCP (Stream Control Transmission Protocol) is a candidate for a new transport layer protocol that may replace the TCP (Transmission Control Protocol) and the UDP (User Datagram Protocol) protocols in future IP networks. Currently, the SCTP is implemented in, or can be added to, many popular operating systems (Windows, BSD, Linux, HPUX or Sun Solaris). This paper identifies and presents all po… ▽ More

    Submitted 17 April, 2011; originally announced April 2011.

    Comments: 12 pages, 17 figures, 2 tables

  27. arXiv:1104.0422  [pdf

    cs.CR

    PadSteg: Introducing Inter-Protocol Steganography

    Authors: Bartosz Jankowski, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: Hiding information in network traffic may lead to leakage of confidential information. In this paper we introduce a new steganographic system: the PadSteg (Padding Steganography). To authors' best knowledge it is the first information hiding solution which represents inter-protocol steganography i.e. usage of relation between two or more protocols from the TCP/IP stack to enable secret communicati… ▽ More

    Submitted 3 April, 2011; originally announced April 2011.

    Comments: 9 pages, 12 figures, 5 tables

  28. arXiv:1102.0023  [pdf

    cs.CR cs.MM

    On Steganography in Lost Audio Packets

    Authors: Wojciech Mazurczyk, Jozef Lubacz, Krzysztof Szczypiorski

    Abstract: The paper presents a new hidden data insertion procedure based on estimated probability of the remaining time of the call for steganographic method called LACK (Lost Audio PaCKets steganography). LACK provides hidden communication for real-time services like Voice over IP. The analytical results presented in this paper concern the influence of LACK's hidden data insertion procedures on the method'… ▽ More

    Submitted 31 January, 2011; originally announced February 2011.

    Comments: 23 pages, 27 figures

  29. Multi-Level Steganography: Improving Hidden Communication in Networks

    Authors: Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the upper-level) serves as a carrier for the second one (called the lower-level). Such a relationship between two (or more) information hiding solutions… ▽ More

    Submitted 9 April, 2012; v1 submitted 25 January, 2011; originally announced January 2011.

    Comments: 18 pages, 13 figures

    Journal ref: Journal of Universal Computer Science (J. UCS), Vol. 18, No. 14, pp. 1967-1986

  30. arXiv:1007.0767  [pdf

    cs.CR

    Retransmission Steganography Applied

    Authors: Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski

    Abstract: This paper presents experimental results of the implementation of network steganography method called RSTEG (Retransmission Steganography). The main idea of RSTEG is to not acknowledge a successfully received packet to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead of user data in the payload field. RSTEG can be applied to many network protocols that ut… ▽ More

    Submitted 5 July, 2010; originally announced July 2010.

    Comments: 5 pages, 6 figures, 1 table

  31. arXiv:1006.0495  [pdf

    cs.CR

    Hiding Data in OFDM Symbols of IEEE 802.11 Networks

    Authors: Krzysztof Szczypiorski, Wojciech Mazurczyk

    Abstract: This paper presents a new steganographic method called WiPad (Wireless Padding). It is based on the insertion of hidden data into the padding of frames at the physical layer of WLANs (Wireless Local Area Networks). A performance analysis based on a Markov model, previously introduced and validated by the authors in [10], is provided for the method in relation to the IEEE 802.11 a/g standards. Its… ▽ More

    Submitted 2 June, 2010; originally announced June 2010.

    Comments: 6 pages, 8 figures, 1 table

  32. arXiv:1006.0247  [pdf

    cs.CR

    Stream Control Transmission Protocol Steganography

    Authors: Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows.… ▽ More

    Submitted 1 June, 2010; originally announced June 2010.

    Comments: 6 pages, 6 figures, 2 tables

  33. arXiv:1005.1925  [pdf

    cs.CR

    Information Hiding Using Improper Frame Padding

    Authors: Bartosz Jankowski, Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: Hiding information in network traffic may lead to leakage of confidential information. In this paper we introduce a new steganographic system: the PadSteg (Padding Steganography). To authors' best knowledge it is the first information hiding solution which represents interprotocol steganography i.e. usage of relation between two or more protocols from the TCP/IP stack to enable secret communicatio… ▽ More

    Submitted 5 July, 2010; v1 submitted 11 May, 2010; originally announced May 2010.

    Comments: 6 pages, 8 figures

  34. arXiv:1002.4303  [pdf

    cs.CR cs.MM

    What are suspicious VoIP delays?

    Authors: Wojciech Mazurczyk, Krzysztof Cabaj, Krzysztof Szczypiorski

    Abstract: Voice over IP (VoIP) is unquestionably the most popular real-time service in IP networks today. Recent studies have shown that it is also a suitable carrier for information hiding. Hidden communication may pose security concerns as it can lead to confidential information leakage. In VoIP, RTP (Real-time Transport Protocol) in particular, which provides the means for the successful transport of v… ▽ More

    Submitted 23 February, 2010; originally announced February 2010.

    Comments: 17 pages, 12 figures

  35. arXiv:0907.0313  [pdf

    cs.CR

    Steganography in Handling Oversized IP Packets

    Authors: Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: This paper identifies new class of network steganography methods that utilize mechanisms to handle oversized packets in IP networks: IP fragmentation, PMTUD (Path MTU Discovery) and PLPMTUD (Packetization Layer Path MTU Discovery). In particular, we propose two new steganographic methods and two extensions of existing ones. We show how IP fragmentation simplifies utilizing steganographic methods… ▽ More

    Submitted 2 July, 2009; originally announced July 2009.

    Comments: 10 pages, 7 figures, paper submitted to First International Workshop on Network Steganography - IWNS 2009

  36. arXiv:0906.4217  [pdf

    cs.CR cs.PF

    A Performance Analysis of HICCUPS - a Steganographic System for WLAN

    Authors: Krzysztof Szczypiorski

    Abstract: The paper presents an analysis of performance features of the HICCUPS (HIdden Communication system for CorrUPted networkS) including the efficiency and the cost of the system in WLANs (Wireless Local Area Networks). The analysis relies on the original CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) 802.11 Markov chain-based model.

    Submitted 23 June, 2009; originally announced June 2009.

    Comments: 5 pages, 5 figures, 3 tables. Submitted to the First International Workshop on Network Steganography - IWNS 2009, November 18-20, 2009, Wuhan (China)

  37. arXiv:0905.0363  [pdf

    cs.CR

    Hiding Information in Retransmissions

    Authors: Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski

    Abstract: The paper presents a new steganographic method called RSTEG (Retransmission Steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms. The main innovation of RSTEG is to not acknowledge a successfully received packet in order to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead of user data in the payload fi… ▽ More

    Submitted 14 May, 2009; v1 submitted 4 May, 2009; originally announced May 2009.

    Comments: 12 pages, 12 figures, 6 tables

  38. arXiv:0808.4060  [pdf

    cs.CR cs.MA

    TrustMAS: Trusted Communication Platform for Multi-Agent Systems

    Authors: Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk, Krzysztof Cabaj, Pawel Radziszewski

    Abstract: The paper presents TrustMAS - Trusted Communication Platform for Multi-Agent Systems, which provides trust and anonymity for mobile agents. The platform includes anonymous technique based on random-walk algorithm for providing general purpose anonymous communication for agents. All agents, which take part in the proposed platform, benefit from trust and anonymity that is provided for their inter… ▽ More

    Submitted 29 August, 2008; originally announced August 2008.

    Comments: 18 pages, 7 figures, accepted to The 3rd International Symposium on Information Security (IS'08), Monterrey, Mexico, November 10-11, 2008 (Proceedings will be published by Springer LNCS)

  39. arXiv:0806.0576  [pdf

    cs.CR cs.MA

    Steganographic Routing in Multi Agent System Environment

    Authors: Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk

    Abstract: In this paper we present an idea of trusted communication platform for Multi-Agent Systems (MAS) called TrustMAS. Based on analysis of routing protocols suitable for MAS we have designed a new proactive hidden routing. Proposed steg-agents discovery procedure, as well as further routes updates and hidden communication, are cryptographically independent. Steganographic exchange can cover heteroge… ▽ More

    Submitted 3 June, 2008; originally announced June 2008.

    Comments: 9 pages, 10 figures,

    Journal ref: "Secured Information Systems" of Journal of Information Assurance and Security (JIAS), Dynamic Publishers Inc., Atlanta, GA 30362, USA, Volume 2, Issue 3, September 2007, pp. 235-243, ISSN 1554-1010

  40. Covert Channels in SIP for VoIP signalling

    Authors: Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for ty… ▽ More

    Submitted 22 May, 2008; originally announced May 2008.

    Comments: 8 pages, 4 figures

  41. arXiv:0805.2938  [pdf

    cs.MM cs.CR

    Steganography of VoIP Streams

    Authors: Wojciech Mazurczyk, Krzysztof Szczypiorski

    Abstract: The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols' fields and is known for IP, UDP or TCP protoco… ▽ More

    Submitted 25 August, 2008; v1 submitted 19 May, 2008; originally announced May 2008.

    Comments: 18 pages, 9 figures, content changed, accepted to The 3rd International Symposium on Information Security (IS'08), Monterrey, Mexico, November 10-11, 2008 (Proceedings will be published by Springer LNCS)