TY - JOUR T1 - Transmission of Secret Information Based on Time Instances AU - Okello, Moses Oyaro PY - 2021 DA - December DO - 10.55549/epstem.1068612 JF - The Eurasia Proceedings of Science Technology Engineering and Mathematics JO - EPSTEM PB - ISRES Publishing WT - DergiPark SN - 2602-3199 SP - 209 EP - 218 VL - 16 LA - en AB - This Paper presents improvement and extension of previous methodology about timing steganography based on network steganography. The previous article uses time interval between two successive time instances of transmissions mixed with cryptography prior to hiding. However, this improvement tends to extend and provide new methods based on single time instance unlike the previous methodology which depend on two-time instances such as hours, minutes, second, millisecond etc. It further examines how to handle effect of different time zone and high precision timing for ultrafast timing such as millisecond, and many more which human actions is too slow for perfect timing. In addition, the extension based on Transmission Control Protocol and Internet Protocol (TCP-IP) status codes where each element of set of status code are index and the index represents certain numeric of combination for hiding. Finally, the cryptography method is improved and extended to series-based cryptography with any defined number of different cryptography methods combined altogether with multiple keys generated dynamically. The methods for both cryptography and steganography were integrated and each module carefully tested for their feasibility and appropriate analysis, comparisons presented too. A brief discussion of possible extension or application of Time Interval and Instance Steganography from network based to Video and Audio time Steganography are presented which depends on time such as rate of change of features in Video, or in Audio as well. However, these video and audio Time steganography are considered as out of scope for this article which is mainly about network Steganography. KW - Steganography KW - Cryptography KW - Cyber Security KW - Time CR - Cvejic, N., & Seppanen, T. (2002, December). Increasing the capacity of LSB-based audio steganography. In 2002 IEEE Workshop on Multimedia Signal Processing. CR - Djebbar, F., Ayad, B., Hamam, H., & Abed-Meraim, K. (2011, April). A view on latest audio steganography techniques. In 2011 International Conference on Innovations in Information Technology (pp. 409-414). IEEE Transactions on Information Forensics and Security, 9(5), 741-751. CR - Johri, P., Mishra, A., Das, S., & Kumar, A. (2016, March). Survey on steganography methods (text, image, audio, video, protocol and network steganography). In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 2906-2909). CR - Jonathan, K., & Yehuda, L. (2015). Introduction to Modern Cryptography.-2nd. http://203.162.10.101/jspui/handle/123456789/723 CR - Kadhim, I. J., Premaratne, P., Vial, P. J., & Halloran, B. (2019). Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. Neurocomputing, 335, 299-326. CR - Liu, G., Zhai, J., & Dai, Y. (2012). Network covert timing channel with distribution matching. Telecommunication Systems, 49(2), 199-205. CR - Mazurczyk, W., Wendzel, S., Azagra Villares, I., & Szczypiorski, K. (2016). On importance of steganographic cost for network steganography. Security and Communication Networks, 9(8), 781-790. CR - Narayana, V. L., Gopi, A. P., & Kumar, N. A. (2018). Different techniques for hiding the text information using text steganography techniques. Neurocomputing, 335, 299-326. CR - Okello, M. (2018, October). A New Timing Steganography Algorithm in Real-Time Transmission Devices. In 2018 IEEE 18th International Conference on Communication Technology (ICCT) (pp. 880-884). CR - Okello, M. (2020). A mixture of timing steganography and series. https://www.techrxiv.org/articles/preprint/A_Mixture_of_Timing_Steganography_and_Series_Cryptography/13134992 CR - Okello, M. A (2019). Secure and optimal method of steganography using bit combination and dynamical rotation. Over Addresses. Preprints 2019, 2019020252. CR - https://www.preprints.org/manuscript/201902.0252/v2 CR - Papapanagiotou, K., Kellinis, E., Marias, G. F., & Georgiadis, P. (2005, December). Alternatives for multimedia messaging system steganography. In International Conference on Computational and Information Science (pp. 589-596). Springer, Berlin, Heidelberg. CR - Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97-102. CR - Wang, H., & Wang, S. (2004). Cyber warfare: steganography vs. steganalysis. Communications of the ACM, 47(10), 76-82. CR - Wang, K., Zhao, H., & Wang, H. (2014). Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Transactions on Information Forensics and Security, 9(5), 741-751. UR - https://doi.org/10.55549/epstem.1068612 L1 - https://dergipark.org.tr/en/download/article-file/2234200 ER -