Conference Paper

Transmission of Secret Information Based on Time Instances

Volume: 16 December 31, 2021
EN

Transmission of Secret Information Based on Time Instances

Abstract

This Paper presents improvement and extension of previous methodology about timing steganography based on network steganography. The previous article uses time interval between two successive time instances of transmissions mixed with cryptography prior to hiding. However, this improvement tends to extend and provide new methods based on single time instance unlike the previous methodology which depend on two-time instances such as hours, minutes, second, millisecond etc. It further examines how to handle effect of different time zone and high precision timing for ultrafast timing such as millisecond, and many more which human actions is too slow for perfect timing. In addition, the extension based on Transmission Control Protocol and Internet Protocol (TCP-IP) status codes where each element of set of status code are index and the index represents certain numeric of combination for hiding. Finally, the cryptography method is improved and extended to series-based cryptography with any defined number of different cryptography methods combined altogether with multiple keys generated dynamically. The methods for both cryptography and steganography were integrated and each module carefully tested for their feasibility and appropriate analysis, comparisons presented too. A brief discussion of possible extension or application of Time Interval and Instance Steganography from network based to Video and Audio time Steganography are presented which depends on time such as rate of change of features in Video, or in Audio as well. However, these video and audio Time steganography are considered as out of scope for this article which is mainly about network Steganography.

Keywords

References

  1. Cvejic, N., & Seppanen, T. (2002, December). Increasing the capacity of LSB-based audio steganography. In 2002 IEEE Workshop on Multimedia Signal Processing.
  2. Djebbar, F., Ayad, B., Hamam, H., & Abed-Meraim, K. (2011, April). A view on latest audio steganography techniques. In 2011 International Conference on Innovations in Information Technology (pp. 409-414). IEEE Transactions on Information Forensics and Security, 9(5), 741-751.
  3. Johri, P., Mishra, A., Das, S., & Kumar, A. (2016, March). Survey on steganography methods (text, image, audio, video, protocol and network steganography). In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 2906-2909).
  4. Jonathan, K., & Yehuda, L. (2015). Introduction to Modern Cryptography.-2nd. http://203.162.10.101/jspui/handle/123456789/723
  5. Kadhim, I. J., Premaratne, P., Vial, P. J., & Halloran, B. (2019). Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. Neurocomputing, 335, 299-326.
  6. Liu, G., Zhai, J., & Dai, Y. (2012). Network covert timing channel with distribution matching. Telecommunication Systems, 49(2), 199-205.
  7. Mazurczyk, W., Wendzel, S., Azagra Villares, I., & Szczypiorski, K. (2016). On importance of steganographic cost for network steganography. Security and Communication Networks, 9(8), 781-790.
  8. Narayana, V. L., Gopi, A. P., & Kumar, N. A. (2018). Different techniques for hiding the text information using text steganography techniques. Neurocomputing, 335, 299-326.

Details

Primary Language

English

Subjects

Engineering

Journal Section

Conference Paper

Authors

Publication Date

December 31, 2021

Submission Date

August 10, 2021

Acceptance Date

October 1, 2021

Published in Issue

Year 2021 Volume: 16

APA
Okello, M. O. (2021). Transmission of Secret Information Based on Time Instances. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 16, 209-218. https://doi.org/10.55549/epstem.1068612