SJ Murdoch, S Lewis - International Workshop on Information Hiding, 2005 - Springer
It is commonly believed that steganography within TCP/IP is easily achieved by embedding
data in header fields seemingly filled with “random” data, such as the IP identifier, TCP initial …