+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Information Hiding in Communication Networks. Fundamentals, Mechanisms, Applications, and Countermeasures. IEEE Press Series on Information and Communication Networks Security

  • ID: 3615575
  • Book
  • 296 Pages
  • John Wiley and Sons Ltd
1 of 3

Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications.

This book provides the fundamental concepts, terminology, and classifications of information hiding in communication networks along with its historical background. Information Hiding In Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures begins with introducing data concealment methods and their evolution. Chapter two discusses the existing terminology and describes the model for hidden communication and related communication scenarios. Chapters three to five present the main classes of information hiding in communication networks accompanied by a discussion of their robustness and undetectability. The book concludes with a discussion of potential countermeasures against information hiding techniques, which includes different types of mechanisms for the detection, limitation and prevention of covert communication channels.

  • Highlights development trends and potential future directions of Information Hiding
  • Introduces a new classification and taxonomy for modern data hiding techniques
  • Presents different types of network steganography mechanisms
  • Introduces several example applications of information hiding in communication networks including some recent covert communication techniques in popular Internet services

This book is intended for academics, graduate students, professionals, and researchers working in the fields of network security, networking, and communications.

Wojciech Mazurczyk is an Associate Professor at the Institute of Telecommunications, Faculty of Electronics and Information Technology, Warsaw University, Poland. He is also a senior member of IEEE.

Steffen Wendzel is Head of Secure Building Automation at the Fraunhofer Institute for Communication, Information Processing, and Ergonomics (FKIE) in Bonn, Germany. 

Sebastian Zander is a Lecturer at the School of Engineering and Information Technology, Murdoch University, Australia.

Amir Houmansadr is an Assistant Professor within the College of Information and Computer Sciences at the University of Massachusetts Amherst.

Krzysztof Szczypiorski is a Professor of Telecommunications at the Institute of Telecommunications, Faculty of Electronics and Information Technology at Warsaw University of Technology, Poland.

Note: Product cover images may vary from those shown
2 of 3

List of Figures xv

List of Tables xxi

Foreword xxiii

Preface xxv

Acknowledgments xxix

Acronyms xxxi

1 Introduction 1

2 Background Concepts, Definitions, and Classification 39

3 Network Steganography 59

4 Control Protocols for Reliable Network Steganography 89

5 Traffic Type Obfuscation 117

6 Network Flow Watermarking 139

7 Examples of Information Hiding Methods for Popular Internet Services 163

8 Network Steganography Countermeasures 207

9 Closing Remarks 243

Glossary 247

Index 253

Note: Product cover images may vary from those shown
3 of 3


4 of 3
Wojciech Mazurczyk
Steffen Wendzel
Sebastian Zander
Amir Houmansadr
Krzysztof Szczypiorski
Note: Product cover images may vary from those shown