dc.contributor.advisor | Shakil, Arif | |
dc.contributor.advisor | Hossain, Muhammad Iqbal | |
dc.contributor.author | Islam, Mohammad Ariful | |
dc.contributor.author | Simran, Shahrin Shafiq | |
dc.contributor.author | Aseef, Mahir | |
dc.contributor.author | Rahman, Labiba | |
dc.date.accessioned | 2024-05-26T03:31:35Z | |
dc.date.available | 2024-05-26T03:31:35Z | |
dc.date.copyright | ©2024 | |
dc.date.issued | 2024-01 | |
dc.identifier.other | ID: 23241083 | |
dc.identifier.other | ID: 20101358 | |
dc.identifier.other | ID: 20101338 | |
dc.identifier.other | ID: 20141014 | |
dc.identifier.uri | http://hdl.handle.net/10361/22914 | |
dc.description | This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2024. | en_US |
dc.description | Cataloged from PDF version of thesis. | |
dc.description | Includes bibliographical references (pages 36-38). | |
dc.description.abstract | The present has made us more dependent on technology than ever before. As technology
develops and new fields emerge, it has become more complicated to maintain
a safe, secure, and covert environment for transmitting valuable information. Although
cryptographic techniques are pretty strong in communication systems, they
cannot be used as a standalone tool to communicate covertly. Covert transmission
is vital for those who require extreme privacy and security, such as national defense
organizations. Over the years, much research has been done based on covert data
sent over a network. Our research has produced a new model to provide secure and
hidden data transmission in a LAN. Our system model will be divided into secret
sharing, network steganography, and hashing for integrity checks. The model will
split the secret message into shares using Shamir’s secret sharing scheme to add
redundancy to our model so that even if some shares are lost during transmission,
the message can still be reconstructed. Each share is hashed, and selected bits from
the hash are appended to the corresponding share to provide integrity. Finally, we
have used an ARP steganography technique and an IP steganography algorithm to
send the shares, where each share is sent through one of the covert channels but
not both. The steganographic algorithms provide a covert transmission channel and
confidentiality for the transmission. A comprehensive security analysis of the overall
model has been provided, highlighting how it provides security and covertness,
potential vulnerabilities and weaknesses, and possible solutions. | en_US |
dc.description.statementofresponsibility | Mohammad Ariful Islam | |
dc.description.statementofresponsibility | Shahrin Shafiq Simran | |
dc.description.statementofresponsibility | Mahir Aseef | |
dc.description.statementofresponsibility | Labiba Rahman | |
dc.format.extent | 49 pages | |
dc.language.iso | en | en_US |
dc.publisher | Brac University | en_US |
dc.rights | Brac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. | |
dc.subject | Covert transmission | en_US |
dc.subject | Network steganography | en_US |
dc.subject | IP steganography | en_US |
dc.subject | Secret-sharing | en_US |
dc.subject | ARP | en_US |
dc.subject.lcsh | Computer security | |
dc.subject.lcsh | Data transmission systems | |
dc.subject.lcsh | Confidential communications | |
dc.subject.lcsh | Data encryption (Computer science) | |
dc.title | Covert data transmission using secret-sharing and network steganography | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Department of Computer Science and Engineering, Brac University | |
dc.description.degree | B.Sc in Computer Science | |