By Topic

A Steganography Scheme in P2P Network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Zishuai Li ; Sch. of Comput. & Commun., Hunan Univ., Changsha ; Xingming Sun ; Baowei Wang ; Xiaoliang Wang

With the extensive application of the peer-to-peer (P2P) network, the torrent file, a vital part of the BitTorrent P2P network, has become a very popular file format over the Internet. Through detailed analysis, we found that the torrent files are ideal host carriers of steganography. In this paper, we propose a steganography scheme for torrent files, in which two approaches, namely Letter Case Change (LCC) and Field Reusage (FR), are adopted to produce stego-torrent. In LCC, the insensitivity of letter case in torrent files is used to hide data. The approach doesn't change the size of the torrent files, which allows for a high level of transparency and security. In FR, the structure redundancy of torrent files is exploited to embed information. The approach has a tremendous capacity. The flexible use of these two approaches can meet different needs. The experimental results show these methods are highly efficient and imperceptible.

Published in:

Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on

Date of Conference:

15-17 Aug. 2008