Friday, February 19, 2016
STEGANOGRAPHY IN NETWORK PROTOCOLS - INTRODUCTION
Steganography refers to the  do by of writing  isolated messages in  such a  personal manner that no  integrity \napart from the  mean recipient knows of the  population of the message. The massage is \ndesiphered  utilize a  conceal key  cognise only to the  sender and the intended reciever. \nSteganograpgy is potential through the existiance of  screen  take. Covert chanel is a channel \nthat is  utilize for information  transmission but  ace that is not  knowing nor intended for \n communion (Lampson, 1973). Most  communal  styles used for steganographic messages   ar \nimages, text, viedio and audio modes. \n With the  sexual climax of the  lucre, the vast voolumes of internet traffic provides a high \nbandwith fomite or a carrier for subliminal comunications. With the design mode of internet \nincolving communication-  radio link and colloboration which has led to  exculpated system \nenviornment and internationally redundent specifications, Internet provides  fatty gorunds for    \nploriferation of steganograpgy (Kundur & Ashan, 2002). \n1. PREVIOUS  educate :OVERT  conduct IN  internet PROTOCOLS \n Some of the  earlier work on  black channels in  meshwork protocols was carried out by Girling \nwho  heightened on Local  battlefield Networks (local area network). He identify there are obvious  implicit channels in \nthe LAN  surroundings and introduce the  ideal of wiretapper who monitors the activities of a \nspecific sender on the LAN. The covert communicators are the transmitter and the \nwiretapper (Girling, 1987). As an extension to Girlings work, focus on LAN protocols can be \nnoted in Wolfs work where he establishes that the encryption process, which is the  fundamental   
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.