Research output: Contribution to Journal/Magazine › Journal article › peer-review
Research output: Contribution to Journal/Magazine › Journal article › peer-review
}
TY - JOUR
T1 - Information hiding in SOAP messages
T2 - a steganographic method for web services
AU - Alrouh, Bachar
AU - Almohammad, Adel
AU - Ghinea, Gheorghita
PY - 2011/3
Y1 - 2011/3
N2 - Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so asnot to arouse an eavesdropper’s suspicion. Hence, it is a kind of covert communication and information security. There are still very limited methods ofsteganography to be used with communication protocols, which represent unconventional but promising steganography mediums. In this paper, wediscuss and analyze a number of steganographic studies in text, XML as well as SOAP messages. Then, we propose a novel steganography method to be used for SOAP messages within Web services environments. The method is based on rearranging the order of specific XML elements according to a secret message. This method has a high imperceptibility; it leaves almost no trail because ofusing the communication protocol as a cover medium, and since it keeps the structure and size of the SOAP message intact. The method is empiricallyvalidated using a feasible scenario so as to indicate its utility and value.
AB - Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so asnot to arouse an eavesdropper’s suspicion. Hence, it is a kind of covert communication and information security. There are still very limited methods ofsteganography to be used with communication protocols, which represent unconventional but promising steganography mediums. In this paper, wediscuss and analyze a number of steganographic studies in text, XML as well as SOAP messages. Then, we propose a novel steganography method to be used for SOAP messages within Web services environments. The method is based on rearranging the order of specific XML elements according to a secret message. This method has a high imperceptibility; it leaves almost no trail because ofusing the communication protocol as a cover medium, and since it keeps the structure and size of the SOAP message intact. The method is empiricallyvalidated using a feasible scenario so as to indicate its utility and value.
M3 - Journal article
VL - 1
SP - 61
EP - 70
JO - International Journal for Information Security Research (IJISR)
JF - International Journal for Information Security Research (IJISR)
IS - 1-2
ER -