SCIRP Mobile Website
Paper Submission

Why Us? >>

  • - Open Access
  • - Peer-reviewed
  • - Rapid publication
  • - Lifetime hosting
  • - Free indexing service
  • - Free promotion service
  • - More citations
  • - Search engine friendly

Free SCIRP Newsletters>>

Add your e-mail address to receive free newsletters from SCIRP.

 

Contact Us >>

Article citations

More>>

Mazurczyk, W., Lubacz, J. and Szczypiorski, K. (2008) Hiding Data in VoIP. Proceedings of the 26th Army Science Conference (ASC 2008), Orlando, 1-4 December 2008.

has been cited by the following article:

  • TITLE: Steganography of Hypertext Transfer Protocol Version 2 (HTTP/2)

    AUTHORS: Biljana Dimitrova, Aleksandra Mileva

    KEYWORDS: Network Steganography, Network Security, Information Hiding, Covert Channels

    JOURNAL NAME: Journal of Computer and Communications, Vol.5 No.5, March 31, 2017

    ABSTRACT: Network steganography consists of different steganographic technics that utilize network protocols for hiding data. We present nine new covert channels which utilize the new standard, HTTP/2, and which can be used regardless its transport carrier (TLS or clear TCP). These covert channels use a protocol feature that has dual nature (for example, no padding can be represented in two ways); or a feature that is not mandatory (as streams prioritization and dependencies); or random value field (as PING frame payload field); or there is no strict rule how to obtain new values for some fields (as stream identifiers). As far as we know, this is the first research about hiding data in HTTP/2. Also, we give a small survey of existing covert channels that can be created using HTTP/1.x, with the analysis do they work or not work with the HTTP/2.