Bitmap-based Steganographic Handshake and Hidden Communication in BitTorrent Network

被引:1
|
作者
Li, Yongjun [1 ]
Bao, Xudong [1 ]
机构
[1] Northwestern Polytech Univ, Sch Comp, Xian 710072, Shaanxi, Peoples R China
关键词
steganography; secret handshake; hidden communication; bitmap; BitTorrent network;
D O I
10.1002/tee.22458
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In BitTorrent network, the bitmap is used to indicate the state of data blocks of file owned by a peer. Before the downloading of the file starts, the file provider first sends its corresponding bitmap to the requester to show which data blocks it owns. This provides the possibility for hiding the identity information in the bitmap and exchanging the identity information secretly. In this paper, we propose a bitmap-based steganographic handshake approach and implement a prototype system based on the BitTorrent network. In our prototype system, the network can operate normally. More importantly, hidden peers successfully exchange their identity information and accurately identify the other hidden peers without being detected by the regular peers. (C) 2017 Institute of Electrical Engineers of Japan. Published by John Wiley & Sons, Inc.
引用
收藏
页码:721 / 727
页数:7
相关论文
共 50 条
  • [41] Secure steganographic communication algorithm based on self-organizing patterns
    Saunoriene, Loreta
    Ragulskis, Minvydas
    PHYSICAL REVIEW E, 2011, 84 (05):
  • [42] Network coordinate based BitTorrent Multi-Tracker scheme
    Lin, Yuan
    Chen, Yang
    Zhang, Zengbin
    Deng, Beixing
    Li, Xing
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (10): : 1672 - 1675
  • [43] A review on image steganographic techniques based on optimization algorithms for secret communication
    Gnanalakshmi, V
    Indumathi, G.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (28) : 44245 - 44258
  • [44] A review on image steganographic techniques based on optimization algorithms for secret communication
    Gnanalakshmi V
    Indumathi G
    Multimedia Tools and Applications, 2023, 82 : 44245 - 44258
  • [45] Watermarks for Generative Adversarial Network Based on Steganographic Invisible Backdoor
    Zeng, Yuwei
    Tan, Jingxuan
    You, Zhengxin
    Qian, Zhenxing
    Zhang, Xinpeng
    2023 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, ICME, 2023, : 1211 - 1216
  • [46] Performance Impact of Header-Based Network Steganographic Countermeasures
    Flowers, Robert
    IEEE ACCESS, 2022, 10 : 92446 - 92453
  • [47] Traffic Classification of Power Communication Network Based on Improved Hidden Naive Bayes Algorithm
    Lv, Lei
    Zhang, Qing
    Zeng, Shilun
    Wu, Hong
    Chen, Liang
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 981 - 985
  • [48] A Low Communication Overhead Breadth-First Search Based on Global Bitmap
    Peng, Ziwei
    Lu, Yutong
    Cheng, Zhiguang
    Du, Yunfei
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT II, 2018, 11335 : 114 - 129
  • [49] An efficient metaheuristic method based on the BitTorrent communication protocol (EM-BT)
    Abir Betka
    Abida Toumi
    Amel Terki
    Madina Hamiane
    Evolutionary Intelligence, 2023, 16 : 1115 - 1134
  • [50] Detection and Traceback of Illegal Users based on Anonymous Network in BitTorrent Environment
    Young Hwan Lim
    Dong Hwi Lee
    Won Hyung Park
    Kwang Ho Kook
    Wireless Personal Communications, 2013, 73 : 319 - 328