I. Introduction
Over the past few decades, concern about information security has increased dramatically as private and federal businesses discover more frequent traces of data breaches and unauthorized information acquisition. Advances in hacking have made these breaches easier to hide and harder to detect. Attackers can transmit messages containing valuable information undetected through an interconnected network like Internet, using covert communication channels.