AIPISteg: An active IP identification based steganographic method
IP identification (IPID) is an IP header field which is designed to identify a packet in a communication session. The main purpose of IPID is to recover from IP fragmentation. To the best of our knowledge, most existing IPID based information hiding methods assume that the IPID number is a pseudo ra...
| Main Authors: | Abdullaziz, O., Goh, V., Ling, Huo Chong, Wong, K. |
|---|---|
| Format: | Journal Article |
| Published: |
Academic Press
2016
|
| Online Access: | http://hdl.handle.net/20.500.11937/16320 |
Similar Items
A survey of network protocol based steganographic techniques
by: Abdullaziz, O., et al.
Published: (2014)
by: Abdullaziz, O., et al.
Published: (2014)
Using IP identification for fragmentation resilient data embedding
by: Abdullaziz, O., et al.
Published: (2015)
by: Abdullaziz, O., et al.
Published: (2015)
Class Of Enhanced Capacity Secure Steganographic Systems Based On LSB Insertion Technique
by: Ling , Huo Chong
Published: (2002)
by: Ling , Huo Chong
Published: (2002)
A Class of Enhanced Capacity Secure Steganographic Systems Based On LSB Insertion Technique
by: Ling , Huo Chong
Published: (2002)
by: Ling , Huo Chong
Published: (2002)
Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
by: Ling, Huo-Chong, et al.
Published: (2007)
by: Ling, Huo-Chong, et al.
Published: (2007)
A review of steganographic methods and techniques
by: Beroual, Abdessalam, et al.
Published: (2018)
by: Beroual, Abdessalam, et al.
Published: (2018)
Comparative study of different steganographic techniques
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Recovering and restoring tampered RFID data using steganographic principles
by: Mohan, M., et al.
Published: (2006)
by: Mohan, M., et al.
Published: (2006)
Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Design and development of dynamic queue storage and floating IP active measurement in IP networks
by: Tabbakh Farizani, Seyed Reza Kamel
Published: (2011)
by: Tabbakh Farizani, Seyed Reza Kamel
Published: (2011)
Active RFID-based Indoor Positioning System (IPS) for Industrial Environment
by: Abdul Alif Wafi, Ab Razak, et al.
Published: (2015)
by: Abdul Alif Wafi, Ab Razak, et al.
Published: (2015)
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
by: Ibrahim, Mohammed, et al.
Published: (2012)
by: Ibrahim, Mohammed, et al.
Published: (2012)
Malaysian IP Laws: Promoting IP commercialisation and challenges
by: Abdul Ghani Azmi, Ida Madieha
Published: (2016)
by: Abdul Ghani Azmi, Ida Madieha
Published: (2016)
TCP/IP based networking for telemedicine
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2013)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2013)
A BBN-based framework for adaptive IP-reuse
by: Azman, Amelia Wong, et al.
Published: (2009)
by: Azman, Amelia Wong, et al.
Published: (2009)
IP multicast
by: Mahfodh, Abdulrhman Mohammed, et al.
Published: (2011)
by: Mahfodh, Abdulrhman Mohammed, et al.
Published: (2011)
IP-based Positioning at Varying Geographic Scales
by: Delfos, Jacob, et al.
Published: (2007)
by: Delfos, Jacob, et al.
Published: (2007)
Speech codec for a Voice over IP (VoIP) systems
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Is the future in VoIP
Published: (2008)
Published: (2008)
Prepaid And Postpaid Voice Over IP (VoIP) Architecture For Rural Areas
by: Ismail, Mohd Nazri
Published: (2007)
by: Ismail, Mohd Nazri
Published: (2007)
Packet based echo cancellation for VoIP networks
by: Abdul Rashid, Hairul Azhar
Published: (2007)
by: Abdul Rashid, Hairul Azhar
Published: (2007)
Scale-dependency in IP-based positioning of network clusters
by: Delfos, Jacob, et al.
Published: (2008)
by: Delfos, Jacob, et al.
Published: (2008)
Lambda-Based Prioritisation In Multichannel Optical Ip Network
by: Yahya, Wan Salman
Published: (2003)
by: Yahya, Wan Salman
Published: (2003)
Is the IP system gender bias?
by: Abdul Ghani Azmi, Ida Madieha
Published: (2016)
by: Abdul Ghani Azmi, Ida Madieha
Published: (2016)
IP To ATM Conversion Scheme
by: Yap , Lee Fueng
Published: (2004)
by: Yap , Lee Fueng
Published: (2004)
Secure mobile VoIP
by: Talevski, Alex, et al.
Published: (2007)
by: Talevski, Alex, et al.
Published: (2007)
Online VLSM IP calculator
by: Mohd Azuwan, Efendy Mail
Published: (2010)
by: Mohd Azuwan, Efendy Mail
Published: (2010)
Demand for IP services to grow
Published: (2008)
Published: (2008)
Mobile IP implementation and testing
by: Pui, Chen Yung
Published: (2006)
by: Pui, Chen Yung
Published: (2006)
IP spoofing defense: an introduction
by: Lee, Soon, et al.
Published: (2009)
by: Lee, Soon, et al.
Published: (2009)
A dynamic approach for location management in IP-based networks
by: Hassan, Wan Hazlina, et al.
Published: (2008)
by: Hassan, Wan Hazlina, et al.
Published: (2008)
AMP – a novel architecture for IP-based Mobility management
by: Wan Hazlina, Hassan, et al.
Published: (2008)
by: Wan Hazlina, Hassan, et al.
Published: (2008)
IP Subnet Based Vlan: Issues, Protocol, Implementation And Solutions
by: Chan , Wai Kok
Published: (2002)
by: Chan , Wai Kok
Published: (2002)
IP Subnet Based Vlan: Issues, Protocol, Implementation And Solutions
by: Chan, Wai Kok
Published: (2002)
by: Chan, Wai Kok
Published: (2002)
Wireless IP camera based on motion detection surveillance system
by: Shahid, Zeeshan, et al.
Published: (2011)
by: Shahid, Zeeshan, et al.
Published: (2011)
IP based network public address for intelligent building environment
by: Chui, Yew Leong, et al.
Published: (2014)
by: Chui, Yew Leong, et al.
Published: (2014)
A dynamic approach for location management in IP-based networks
by: Hassan, W. H., et al.
Published: (2008)
by: Hassan, W. H., et al.
Published: (2008)
AMP - a novel architecture for IP-based mobility management
by: Hassan, Wan H., et al.
Published: (2008)
by: Hassan, Wan H., et al.
Published: (2008)
Fast watermarking scheme for real-time spatial scalable video coding
by: Buhari, A., et al.
Published: (2016)
by: Buhari, A., et al.
Published: (2016)
Low complexity watermarking scheme for scalable video coding
by: Buhari, A., et al.
Published: (2016)
by: Buhari, A., et al.
Published: (2016)
Similar Items
-
A survey of network protocol based steganographic techniques
by: Abdullaziz, O., et al.
Published: (2014) -
Using IP identification for fragmentation resilient data embedding
by: Abdullaziz, O., et al.
Published: (2015) -
Class Of Enhanced Capacity Secure Steganographic Systems Based On LSB Insertion Technique
by: Ling , Huo Chong
Published: (2002) -
A Class of Enhanced Capacity Secure Steganographic Systems Based On LSB Insertion Technique
by: Ling , Huo Chong
Published: (2002) -
Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
by: Ling, Huo-Chong, et al.
Published: (2007)