Implementation and Comparison of Three Network Steganography Methods based on Transmission Control Protocol

Abstract:

This paper describes two network steganography methods using the transport layer TCP protocol and one method using the network layer IPv4 protocol and the transport layer TCP protocol. The aim of the research is to develop a method that provides the highest possible throughput and is resistant to steganalysis.