CERG Seminars are held in the Engineering Building on the GMU Fairfax campus unless noted otherwise. Parking is available in the Sandy Creek parking deck near the Engineering Building. Directions to the campus can be found here. The seminar talks are usually 45 to 60 minutes long and are open to the public. If you wish to be notified about future seminars, please send an e-mail to Jens-Peter Kaps.

[Current] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007]


Trends in Network Steganography

Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Date: Monday, October 6th, 4:00 PM - 5:00 PM
Location: Engineering Building, Room 3507

Network steganography is the youngest branch of information hiding. It is a fast-developing field: recent years have resulted in multiple new information hiding methods, which can be exploited in various types of networks. The exploitation of protocols belonging to the Open Systems Interconnection (OSI) reference model is the essence of network steganography. This family of methods may utilize one or more protocols simultaneously or the relationships between them — relying on the modification of their intrinsic properties for the embedding of steganograms.

Network steganography is on the rise because embedding secret data into digital media files (old school of information hiding) has been found to possess two serious drawbacks: it permits hiding only a limited amount of data per one file and the modified picture may be accessible for forensics experts (for example, because it was uploaded to some kind of server). Network-level embedding changes the state of things diametrically; it allows for leakage of information (even very slow) during long periods of time and, if all the exchanged traffic is not captured, then there is nothing left for forensics experts to analyze. As a result, such methods are more difficult to detect and eliminate from networks.

The talk will give a general overview in this area and will be a chance to present algorithms proposed by Network Security Group (secgroup.pl) from Warsaw University of Technology, Poland. (Full Announcement)