Retransmission steganography and its detection

  • Authors:
  • Wojciech Mazurczyk;Miłosz Smolarczyk;Krzysztof Szczypiorski

  • Affiliations:
  • Warsaw University of Technology, Institute of Telecommunications, ul. Nowowiejska 15/19, 00-665, Warsaw, Poland;Warsaw University of Technology, Institute of Telecommunications, ul. Nowowiejska 15/19, 00-665, Warsaw, Poland;Warsaw University of Technology, Institute of Telecommunications, ul. Nowowiejska 15/19, 00-665, Warsaw, Poland

  • Venue:
  • Soft Computing - A Fusion of Foundations, Methodologies and Applications - Special issue on Digital Information Forensics
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms. The main innovation of RSTEG is to not acknowledge a successfully received packet in order to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead of user data in the payload field. RSTEG is presented in the broad context of network steganography, and the utilisation of RSTEG for TCP (transmission control protocol) retransmission mechanisms is described in detail. Simulation results are also presented with the main aim of measuring and comparing the steganographic bandwidth of the proposed method for different TCP retransmission mechanisms, as well as to determine the influence of RSTEG on the network retransmission level.