{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T14:48:57Z","timestamp":1777128537791,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540242079","type":"print"},{"value":"9783540301141","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30114-1_12","type":"book-chapter","created":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T18:47:16Z","timestamp":1284662836000},"page":"164-179","source":"Crossref","is-referenced-by-count":27,"title":["Syntax and Semantics-Preserving Application-Layer Protocol Steganography"],"prefix":"10.1007","author":[{"given":"Norka B.","family":"Lucena","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"James","family":"Pease","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Payman","family":"Yadollahpour","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Steve J.","family":"Chapin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"12_CR1","volume-title":"Information Hiding: Techniques for Steganography and Digital Watermarking","author":"S. Katzenbeisser","year":"2000","unstructured":"Katzenbeisser, S., Petitcolas, F.A.: Information Hiding: Techniques for Steganography and Digital Watermarking. Artech House, Norwood (2000)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Johnson, N.F., Jajodia, S.: Steganalysis: The investigation of hidden information. In: Proceedings of the IEEE Information Technology Conference, Syracuse, New York, USA, pp. 113\u2013116 (1998)","DOI":"10.1109\/IT.1998.713394"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Information Hiding","year":"1996","unstructured":"Anderson, R. (ed.): IH 1996. LNCS, vol.\u00a01174. Springer, Heidelberg (1996)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-49380-8_1","volume-title":"Information Hiding","year":"1998","unstructured":"Aucsmith, D. (ed.): IH 1998. LNCS, vol.\u00a01525, p. 1. Springer, Heidelberg (1998)"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","volume-title":"Information Hiding","year":"2001","unstructured":"Moskowitz, I.S. (ed.): IH 2001. LNCS, vol.\u00a02137. Springer, Heidelberg (2001)"},{"key":"12_CR6","unstructured":"Oostveen, J. (ed.): Information Hiding. Preproceedings of the Fifth International Workshop, Noordwijkerhout, The Netherlands (2002)"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","volume-title":"Information Hiding","year":"1999","unstructured":"Pfitzmann, A. (ed.): Information Hiding. Proceedings of the Third International Workshop, Dresden, Germany. LNCS, vol.\u00a01768. Springer, Heidelberg (1999)"},{"key":"12_CR8","unstructured":"Chapin, S.J., Ostermann, S.: Information hiding through semantics-preserving application-layer protocol steganography. Technical report, Center for Systems Assurance, Syracuse University (2002)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Kemmerer, R.: A practical approach to identify storage and timing channels: Twenty years later. In: Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), San Diego, California, pp. 109\u2013118 (2002)","DOI":"10.1109\/CSAC.2002.1176284"},{"key":"12_CR10","unstructured":"Dunigan, T.: Internet steganography. Technical report, Oak Ridge National Laboratory (Contract No. DE-AC05-96OR22464), Oak Ridge, Tennessee (1998) [ORNL\/TM-limited distribution]"},{"key":"12_CR11","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/3-540-61996-8_29","volume-title":"Information Hiding: Proceedings of the First International Workshop","author":"T. Handel","year":"1996","unstructured":"Handel, T., Sandford, M.: Hiding data in the OSI network model. In: Anderson, R. (ed.) Information Hiding: Proceedings of the First International Workshop, Cambridge, U.K, pp. 23\u201338. Springer, Heidelberg (1996)"},{"key":"12_CR12","unstructured":"route@infonexus.com, alhambra@infornexus.com: Article 6. Phrack Magazine, 49 (1996), Retrieved on (August 27, 2002) from the World Wide Web: http:\/\/www.phrack.com\/phrack\/49\/P49-06"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Rowland, C.H.: Covert channels in the TCP\/IP protocol suite. Psionics Technologies (1996), Retrieved on August 23 (2002) from the World Wide Web: http:\/\/www.psionic.com\/papers\/whitep03.html","DOI":"10.5210\/fm.v2i5.528"},{"key":"12_CR14","unstructured":"CAIDA.org: Characterization of internet traffic loads, segregated by application - OC48 analysis (2002), Retrieved on October 15 (2003) from the World Wide Web: http:\/\/www.caida.org\/analysis\/workload\/byapplication\/oc48\/20020305\/appsperc20020305\/index.xml"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petitcolas, F.A.: Defining security in steganographic systems. In: Electronic Imaging, Photonics West (SPIE). Security and Watermarking of Multimedia Contents IV, vol.\u00a04675, pp. 50\u201356 (2002)","DOI":"10.1117\/12.465313"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Moskowitz, I.S., Longdon, G.E., WuChang, L.: A new paradigm hidden in steganography. In: Proceedings of the New Security Paradigm Workshop, Cork, Ireland, pp. 41\u201350 (2000)","DOI":"10.21236\/ADA462825"},{"key":"12_CR17","unstructured":"Cachin, C.: An information-theoreic model for steganography. Technical Report Report 2000\/028 (2002), http:\/\/www.zurich.ibm.com\/cca\/papers\/stego.pdf"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.A.: On the limits of steganography. IEEE Journal of Selected Areas in Communications\u00a016, 474\u2013481 (1998)","journal-title":"IEEE Journal of Selected Areas in Communications"},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/10719724_1","volume-title":"Information Hiding","author":"T. Mittelholzer","year":"1999","unstructured":"Mittelholzer, T.: An information-theoretic approach to steganography and watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 1\u201316. Springer, Heidelberg (1999)"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-49380-8_24","volume-title":"Information Hiding","author":"J. Z\u00f6llner","year":"1998","unstructured":"Z\u00f6llner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 344\u2013354. Springer, Heidelberg (1998)"},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/3-540-49380-8_22","volume-title":"Information Hiding","author":"J.M. Ettinger","year":"1998","unstructured":"Ettinger, J.M.: Steganalysis and game equilibria. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 319\u2013328. Springer, Heidelberg (1998)"},{"key":"12_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/3-540-45708-9_6","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"N. Hopper","year":"2002","unstructured":"Hopper, N., Langford, J., von Ahn, L.: Provably secure steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 77\u201392. Springer, Heidelberg (2002)"},{"key":"12_CR23","unstructured":"Reyzin, L., Russell, S.: More efficient provably secure steganography. Cryptology ePrint Archive: Report 2003\/093 (2003), http:\/\/eprint.iacr.org\/2003\/093\/"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Practical steganalysis of digital images - state of the art. In: Proceedings of the SPIE Photonics West (Security and Watermarking of Multimedia Contents IV), San Jose, California, USA, vol.\u00a04675, pp. 1\u201313 (2002)","DOI":"10.1117\/12.465263"},{"key":"12_CR25","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N. Provos","year":"2003","unstructured":"Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Security & Privacy Magazine\u00a01, 32\u201344 (2003)","journal-title":"IEEE Security & Privacy Magazine"},{"key":"12_CR26","first-page":"51","volume-title":"Proceedings of CRYPTO 1983","author":"G.J. Simmons","year":"1983","unstructured":"Simmons, G.J.: The prisoners\u2019 problem and the subliminal channel. In: Proceedings of CRYPTO 1983, pp. 51\u201367. Plenum Press, New York (1983)"},{"key":"12_CR27","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography. John Wiley & Sons, Inc., Chichester (1996)"},{"key":"12_CR28","first-page":"347","volume-title":"Information Hiding","author":"B. Pfitzmann","year":"1996","unstructured":"Pfitzmann, B.: Information hiding terminology. In: Anderson, R. (ed.) Information Hiding. Proceedings of the First International Workshop, pp. 347\u2013349. Springer, Cambridge (1996)"},{"key":"12_CR29","series-title":"Demonstration Session","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1145\/872757.872868","volume-title":"Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data","author":"F. Korn","year":"2003","unstructured":"Korn, F., Muthukrishnan, S., Zhu, Y.: Ipsofacto: A visual correlation tool for aggregate network traffic data. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, San Diego, California. Demonstration Session, pp. 677\u2013677. ACM Press, New York (2003)"},{"key":"12_CR30","unstructured":"Ka0ticSH: Diggin em walls (part 3) - advanced\/other techniques for bypassing firewalls. New Order (2002), Retrieved on August 28 (2002) from the World Wide Web: http:\/\/neworder.box.sk\/newsread.php?newsid=3957"},{"key":"12_CR31","first-page":"29","volume-title":"Information Hiding","author":"G. Fisk","year":"2002","unstructured":"Fisk, G., Fisk, M., Papadopoulos, C., Neil, J.: Eliminating steganography in Internet traffic with active wardens. In: Oostveen, J. (ed.) Information Hiding. Preproceedings of the Fifth International Workshop, Noordwijkerhout, The Netherlands, pp. 29\u201346. Springer, Heidelberg (2002)"},{"key":"12_CR32","unstructured":"Bowyer, L.: Firewall bypass via protocol steganography. Network Penetration (2002), Retrieved on January 05 (2003) from the World Wide Web: http:\/\/www.networkpenetration.com\/protocolsteg.html"},{"key":"12_CR33","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/1005140.1005152","volume-title":"Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society","author":"M. Bauer","year":"2003","unstructured":"Bauer, M.: New covert channels in HTTP - adding unwitting web browsers to anonymity sets. In: Samarati, P., Syverson, P. (eds.) Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, Washington, DC, USA, pp. 72\u201378. ACM Press, New York (2003) ISBN 1-58113-776-1"},{"key":"12_CR34","unstructured":"Secure Shell Working Group, I.E.T.F.I.: The secure shell (2003), Retrieved on October 26 (2003) from the World Wide Web: http:\/\/www.ietf.org\/html.charters\/secshcharter.html"},{"key":"12_CR35","volume-title":"The Secure Shell: The Definitive Guide","author":"D.J. Barrett","year":"2001","unstructured":"Barrett, D.J., Silverman, R.: SSH. In: The Secure Shell: The Definitive Guide, O\u2019Reilly, Sebastopol (2001)"},{"key":"12_CR36","unstructured":"Watterson, B.: Something Under the Bed is Drooling. Andrews and McMeel, Kansas City, MO, pp. 101\u2013104 (1988)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30114-1_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:46:00Z","timestamp":1620013560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30114-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540242079","9783540301141"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30114-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}