Home > Research > Publications & Outputs > SOAP message-based steganography
View graph of relations

SOAP message-based steganography

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

SOAP message-based steganography. / Alrouh, Bachar; Almohammad, Adel; Ghinea, Gheorghita.
Internet Technology and Secured Transactions (ICITST), 2010 International Conference for . IEEE Press, 2010. p. 1-6.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Alrouh, B, Almohammad, A & Ghinea, G 2010, SOAP message-based steganography. in Internet Technology and Secured Transactions (ICITST), 2010 International Conference for . IEEE Press, pp. 1-6. <http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5678538>

APA

Alrouh, B., Almohammad, A., & Ghinea, G. (2010). SOAP message-based steganography. In Internet Technology and Secured Transactions (ICITST), 2010 International Conference for (pp. 1-6). IEEE Press. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5678538

Vancouver

Alrouh B, Almohammad A, Ghinea G. SOAP message-based steganography. In Internet Technology and Secured Transactions (ICITST), 2010 International Conference for . IEEE Press. 2010. p. 1-6

Author

Alrouh, Bachar ; Almohammad, Adel ; Ghinea, Gheorghita. / SOAP message-based steganography. Internet Technology and Secured Transactions (ICITST), 2010 International Conference for . IEEE Press, 2010. pp. 1-6

Bibtex

@inproceedings{85a84a34fec94c1a8823a07a32743da0,
title = "SOAP message-based steganography",
abstract = "Steganography is the art of hiding secret data in public information. Hence, it is a kind of covert communication and information security. In this paper, we propose a novel steganography method to be used for SOAP messages within Web services environments. The method is based on rearranging the order of specific XML elements according to a secret message. This method has a high imperceptibility; it leaves almost no trail because of using the communication protocol as a cover medium, and since it keeps the structure and size of the SOAP message intact. The method is empirically validated using a feasible scenario so as to indicate its utility and value.",
author = "Bachar Alrouh and Adel Almohammad and Gheorghita Ghinea",
year = "2010",
language = "English",
isbn = "9781424488629 ",
pages = "1--6",
booktitle = "Internet Technology and Secured Transactions (ICITST), 2010 International Conference for",
publisher = "IEEE Press",

}

RIS

TY - GEN

T1 - SOAP message-based steganography

AU - Alrouh, Bachar

AU - Almohammad, Adel

AU - Ghinea, Gheorghita

PY - 2010

Y1 - 2010

N2 - Steganography is the art of hiding secret data in public information. Hence, it is a kind of covert communication and information security. In this paper, we propose a novel steganography method to be used for SOAP messages within Web services environments. The method is based on rearranging the order of specific XML elements according to a secret message. This method has a high imperceptibility; it leaves almost no trail because of using the communication protocol as a cover medium, and since it keeps the structure and size of the SOAP message intact. The method is empirically validated using a feasible scenario so as to indicate its utility and value.

AB - Steganography is the art of hiding secret data in public information. Hence, it is a kind of covert communication and information security. In this paper, we propose a novel steganography method to be used for SOAP messages within Web services environments. The method is based on rearranging the order of specific XML elements according to a secret message. This method has a high imperceptibility; it leaves almost no trail because of using the communication protocol as a cover medium, and since it keeps the structure and size of the SOAP message intact. The method is empirically validated using a feasible scenario so as to indicate its utility and value.

M3 - Conference contribution/Paper

SN - 9781424488629

SP - 1

EP - 6

BT - Internet Technology and Secured Transactions (ICITST), 2010 International Conference for

PB - IEEE Press

ER -