Show simple item record

dc.contributor.advisorShakil, Arif
dc.contributor.advisorHossain, Muhammad Iqbal
dc.contributor.authorIslam, Mohammad Ariful
dc.contributor.authorSimran, Shahrin Shafiq
dc.contributor.authorAseef, Mahir
dc.contributor.authorRahman, Labiba
dc.date.accessioned2024-05-26T03:31:35Z
dc.date.available2024-05-26T03:31:35Z
dc.date.copyright©2024
dc.date.issued2024-01
dc.identifier.otherID: 23241083
dc.identifier.otherID: 20101358
dc.identifier.otherID: 20101338
dc.identifier.otherID: 20141014
dc.identifier.urihttp://hdl.handle.net/10361/22914
dc.descriptionThis thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2024.en_US
dc.descriptionCataloged from PDF version of thesis.
dc.descriptionIncludes bibliographical references (pages 36-38).
dc.description.abstractThe present has made us more dependent on technology than ever before. As technology develops and new fields emerge, it has become more complicated to maintain a safe, secure, and covert environment for transmitting valuable information. Although cryptographic techniques are pretty strong in communication systems, they cannot be used as a standalone tool to communicate covertly. Covert transmission is vital for those who require extreme privacy and security, such as national defense organizations. Over the years, much research has been done based on covert data sent over a network. Our research has produced a new model to provide secure and hidden data transmission in a LAN. Our system model will be divided into secret sharing, network steganography, and hashing for integrity checks. The model will split the secret message into shares using Shamir’s secret sharing scheme to add redundancy to our model so that even if some shares are lost during transmission, the message can still be reconstructed. Each share is hashed, and selected bits from the hash are appended to the corresponding share to provide integrity. Finally, we have used an ARP steganography technique and an IP steganography algorithm to send the shares, where each share is sent through one of the covert channels but not both. The steganographic algorithms provide a covert transmission channel and confidentiality for the transmission. A comprehensive security analysis of the overall model has been provided, highlighting how it provides security and covertness, potential vulnerabilities and weaknesses, and possible solutions.en_US
dc.description.statementofresponsibilityMohammad Ariful Islam
dc.description.statementofresponsibilityShahrin Shafiq Simran
dc.description.statementofresponsibilityMahir Aseef
dc.description.statementofresponsibilityLabiba Rahman
dc.format.extent49 pages
dc.language.isoenen_US
dc.publisherBrac Universityen_US
dc.rightsBrac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission.
dc.subjectCovert transmissionen_US
dc.subjectNetwork steganographyen_US
dc.subjectIP steganographyen_US
dc.subjectSecret-sharingen_US
dc.subjectARPen_US
dc.subject.lcshComputer security
dc.subject.lcshData transmission systems
dc.subject.lcshConfidential communications
dc.subject.lcshData encryption (Computer science)
dc.titleCovert data transmission using secret-sharing and network steganographyen_US
dc.typeThesisen_US
dc.contributor.departmentDepartment of Computer Science and Engineering, Brac University
dc.description.degreeB.Sc in Computer Science


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record