{"title":"使用TCP / IP的序列号进行隐写","authors":"J. M. Kadhim, Abeer E Abed","doi":"10.22401/JNUS.20.4.16","DOIUrl":null,"url":null,"abstract":"The exchanging process inside LAN or through the Internet may be exposed to be stolen, altered or damaged by a baleful person who was represented as real threats to transport process and also to information especially if this information was sensitive, important and must be accessed by only authorized person. Therefore this data must be secured against such threats. Steganography is classified as the art of hiding information in a suitable carrier like image, text, audio and video. It can also be applied to network protocols whether to header or payload of the packet. In this paper, steganography was implemented on the header of IP packet protocol and/or TCP segment protocol by exploiting the sequence number field of this header for hiding information inside it. In addition, four characters would be sent in every connection. So to increase the amount of information which could be sent, the number of connections must be increased.","PeriodicalId":14922,"journal":{"name":"Journal of Al-Nahrain University-Science","volume":"3164 1","pages":"102-108"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Steganography Using TCP / IP's Sequence Number\",\"authors\":\"J. M. Kadhim, Abeer E Abed\",\"doi\":\"10.22401/JNUS.20.4.16\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The exchanging process inside LAN or through the Internet may be exposed to be stolen, altered or damaged by a baleful person who was represented as real threats to transport process and also to information especially if this information was sensitive, important and must be accessed by only authorized person. Therefore this data must be secured against such threats. Steganography is classified as the art of hiding information in a suitable carrier like image, text, audio and video. It can also be applied to network protocols whether to header or payload of the packet. In this paper, steganography was implemented on the header of IP packet protocol and/or TCP segment protocol by exploiting the sequence number field of this header for hiding information inside it. In addition, four characters would be sent in every connection. So to increase the amount of information which could be sent, the number of connections must be increased.\",\"PeriodicalId\":14922,\"journal\":{\"name\":\"Journal of Al-Nahrain University-Science\",\"volume\":\"3164 1\",\"pages\":\"102-108\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Al-Nahrain University-Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.22401/JNUS.20.4.16\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Al-Nahrain University-Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22401/JNUS.20.4.16","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The exchanging process inside LAN or through the Internet may be exposed to be stolen, altered or damaged by a baleful person who was represented as real threats to transport process and also to information especially if this information was sensitive, important and must be accessed by only authorized person. Therefore this data must be secured against such threats. Steganography is classified as the art of hiding information in a suitable carrier like image, text, audio and video. It can also be applied to network protocols whether to header or payload of the packet. In this paper, steganography was implemented on the header of IP packet protocol and/or TCP segment protocol by exploiting the sequence number field of this header for hiding information inside it. In addition, four characters would be sent in every connection. So to increase the amount of information which could be sent, the number of connections must be increased.