Covert data transmission using secret-sharing and network steganography
This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2024.
المؤلفون الرئيسيون: | , , , |
---|---|
مؤلفون آخرون: | |
التنسيق: | أطروحة |
اللغة: | English |
منشور في: |
Brac University
2024
|
الموضوعات: | |
الوصول للمادة أونلاين: | http://hdl.handle.net/10361/22914 |
id |
10361-22914 |
---|---|
record_format |
dspace |
spelling |
10361-229142024-05-26T21:01:41Z Covert data transmission using secret-sharing and network steganography Islam, Mohammad Ariful Simran, Shahrin Shafiq Aseef, Mahir Rahman, Labiba Shakil, Arif Hossain, Muhammad Iqbal Department of Computer Science and Engineering, Brac University Covert transmission Network steganography IP steganography Secret-sharing ARP Computer security Data transmission systems Confidential communications Data encryption (Computer science) This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2024. Cataloged from PDF version of thesis. Includes bibliographical references (pages 36-38). The present has made us more dependent on technology than ever before. As technology develops and new fields emerge, it has become more complicated to maintain a safe, secure, and covert environment for transmitting valuable information. Although cryptographic techniques are pretty strong in communication systems, they cannot be used as a standalone tool to communicate covertly. Covert transmission is vital for those who require extreme privacy and security, such as national defense organizations. Over the years, much research has been done based on covert data sent over a network. Our research has produced a new model to provide secure and hidden data transmission in a LAN. Our system model will be divided into secret sharing, network steganography, and hashing for integrity checks. The model will split the secret message into shares using Shamir’s secret sharing scheme to add redundancy to our model so that even if some shares are lost during transmission, the message can still be reconstructed. Each share is hashed, and selected bits from the hash are appended to the corresponding share to provide integrity. Finally, we have used an ARP steganography technique and an IP steganography algorithm to send the shares, where each share is sent through one of the covert channels but not both. The steganographic algorithms provide a covert transmission channel and confidentiality for the transmission. A comprehensive security analysis of the overall model has been provided, highlighting how it provides security and covertness, potential vulnerabilities and weaknesses, and possible solutions. Mohammad Ariful Islam Shahrin Shafiq Simran Mahir Aseef Labiba Rahman B.Sc in Computer Science 2024-05-26T03:31:35Z 2024-05-26T03:31:35Z ©2024 2024-01 Thesis ID: 23241083 ID: 20101358 ID: 20101338 ID: 20141014 http://hdl.handle.net/10361/22914 en Brac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. 49 pages application/pdf Brac University |
institution |
Brac University |
collection |
Institutional Repository |
language |
English |
topic |
Covert transmission Network steganography IP steganography Secret-sharing ARP Computer security Data transmission systems Confidential communications Data encryption (Computer science) |
spellingShingle |
Covert transmission Network steganography IP steganography Secret-sharing ARP Computer security Data transmission systems Confidential communications Data encryption (Computer science) Islam, Mohammad Ariful Simran, Shahrin Shafiq Aseef, Mahir Rahman, Labiba Covert data transmission using secret-sharing and network steganography |
description |
This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2024. |
author2 |
Shakil, Arif |
author_facet |
Shakil, Arif Islam, Mohammad Ariful Simran, Shahrin Shafiq Aseef, Mahir Rahman, Labiba |
format |
Thesis |
author |
Islam, Mohammad Ariful Simran, Shahrin Shafiq Aseef, Mahir Rahman, Labiba |
author_sort |
Islam, Mohammad Ariful |
title |
Covert data transmission using secret-sharing and network steganography |
title_short |
Covert data transmission using secret-sharing and network steganography |
title_full |
Covert data transmission using secret-sharing and network steganography |
title_fullStr |
Covert data transmission using secret-sharing and network steganography |
title_full_unstemmed |
Covert data transmission using secret-sharing and network steganography |
title_sort |
covert data transmission using secret-sharing and network steganography |
publisher |
Brac University |
publishDate |
2024 |
url |
http://hdl.handle.net/10361/22914 |
work_keys_str_mv |
AT islammohammadariful covertdatatransmissionusingsecretsharingandnetworksteganography AT simranshahrinshafiq covertdatatransmissionusingsecretsharingandnetworksteganography AT aseefmahir covertdatatransmissionusingsecretsharingandnetworksteganography AT rahmanlabiba covertdatatransmissionusingsecretsharingandnetworksteganography |
_version_ |
1814307747334717440 |