Stego datagrams could be transmitted as a continuous traffic stream or they could be marked and mixed with normal datagrams, then transmitted from the steganogram sender to the steganogram receiver. The steganogram receiver would check for the mark to identify the stego datagrams and extract the hidden data from them. This paper suggests a new steganographic marking method with two scenarios to mark the IP stego datagrams using the IP ID field. This method could be used to mark the IP datagrams only and it requires from the packet source to be the steganogram sender. If this method is used to mark the IPv6 packets, then the IP packet fragmentation is required by the packet source.
Shehab, M., & Korany, N. (2012). New Steganographic Method for Marking IP Stego Datagrams Based on the IP ID Field. The International Conference on Electrical Engineering, 8(8th International Conference on Electrical Engineering ICEENG 2012), 1-8. doi: 10.21608/iceeng.2012.30647
MLA
Manal A. Shehab; Noha O. Korany. "New Steganographic Method for Marking IP Stego Datagrams Based on the IP ID Field". The International Conference on Electrical Engineering, 8, 8th International Conference on Electrical Engineering ICEENG 2012, 2012, 1-8. doi: 10.21608/iceeng.2012.30647
HARVARD
Shehab, M., Korany, N. (2012). 'New Steganographic Method for Marking IP Stego Datagrams Based on the IP ID Field', The International Conference on Electrical Engineering, 8(8th International Conference on Electrical Engineering ICEENG 2012), pp. 1-8. doi: 10.21608/iceeng.2012.30647
VANCOUVER
Shehab, M., Korany, N. New Steganographic Method for Marking IP Stego Datagrams Based on the IP ID Field. The International Conference on Electrical Engineering, 2012; 8(8th International Conference on Electrical Engineering ICEENG 2012): 1-8. doi: 10.21608/iceeng.2012.30647