
A Multi-Layer Network Steganography Framework Using ICMP and NTFS Alternative Data Streams for Secure Covert Communication | IJET â Volume 12 Issue 1 | IJET-V12I1P6

Table of Contents
ToggleInternational Journal of Engineering and Techniques (IJET)
Open Access ⢠Peer Reviewed ⢠High Citation & Impact Factor ⢠ISSN: 2395-1303
Volume 12, Issue 1 | Published: January 2026
Author:Salam Ghanim Najeeb, Noor Alhuda fadhil
DOI: https://doi.org/{{doi}} ⢠PDF: Download
Abstract
With the rapid expansion of digital communication networks, protecting sensitive information against interception, traffic analysis, and cyber surveillance has become increasingly challenging. While cryptography secures the content of messages, it does not hide the existence of communication, making encrypted traffic vulnerable to detection and blocking. Network steganography addresses this limitation by embedding secret data into legitimate network traffic using covert channels. However, most existing network steganography techniques rely on single layer hiding mechanisms, which suffer from limited bandwidth, low robustness, and high detectability under modern intrusion detection systems.
This paper proposes a multi-layer network steganography framework that integrates ICMP-based covert channels with NTFS Alternative Data Streams (ADS) to significantly enhance capacity, security, and stealth. The proposed approach hides secret files and messages inside ADS at the file-system level and then encapsulates the ADS-based payload within ICMP packets at the network level, forming a hierarchical covert communication architecture. This layered model is inspired by multi-layer steganography principles and onion-routing-style security, where each layer provides an additional level of protection.
Experimental analysis demonstrates that the proposed multi-layer framework achieves higher hidden data capacity and stronger resistance to detection compared to conventional ICMP-based covert channels, while maintaining normal network behavior. The results confirm that combining file-system-level and network-level steganography offers a powerful mechanism for secure covert communication in modern networks.
Keywords
Network steganography, covert channels, ICMP, NTFS Alternative Data Streams, multi-layer security, information hiding.
Conclusion
This paper presented a multi-layer network steganography framework that integrates NTFS Alternative Data Streams (ADS) with ICMP-based covert channels to provide a secure, high-capacity, and stealthy method for hidden communication. By combining file-system-level hiding and network-level hiding, the proposed architecture introduces two independent layers of protection, making detection, extraction, and forensic reconstruction significantly more difficult than in traditional single-layer covert channels. Even if one layer is compromised, the second layer continues to conceal the hidden information, reflecting a defense-in-depth and onion-style security architecture.
The proposed model demonstrated superior performance in terms of capacity, robustness, and resistance to detection. ADS allows large volumes of data to be hidden without altering the observable properties of files, while ICMP provides a legitimate and widely accepted transport mechanism that blends naturally into network traffic. This dual-layer strategy reduces the statistical footprint of the covert channel, increases resilience against packet loss and traffic normalization, and enhances the overall stealth of the communication. As a result, the framework is well suited for applications in secure communications, cyber defense, covert data exchange, and digital forensics research.
Future extensions of this work will focus on expanding the multi-layer framework to additional network protocols such as TCP, DNS, and HTTPS, enabling covert communication over encrypted and high-volume application traffic. Furthermore, integrating cryptographic protection within the ADS layer will provide confidentiality and integrity even in the event of partial exposure. Additional research will also explore adaptive and intelligent embedding strategies, using machine learning to dynamically optimize protocol selection and embedding behavior, further strengthening resistance against advanced network steganalysis techniques.
References
1. Utama, S., et al., Analytical and Empirical Insights into Wireless Sensor Network Longevity: The Role MAC Protocols and Adaptive Strategies. Journal of Advanced Research in Computing and Applications, 2024. 36(1): p. 52-60.
2. Qasim Almaliki, A.J., et al., Application of the Canny Filter in Digital Steganography. Journal of Advanced Research in Computing and Applications, 2024. 35(1): p. 21-30.
3. Din, R., et al., Exploring Steganographic Techniques for Enhanced Data Protection in Digital Files. International Journal of Advanced Research in Computational Thinking and Data Science, 2024. 1(1): p. 1-9.
4. Qasim, A.J., R. Din, and F.Q.A. Alyousuf, Review on techniques and file formats of image compression. Bulletin of Electrical Engineering and Informatics, 2020. 9(2): p. 602-610.
5. Alyousuf, F.Q.A., R. Din, and A.J. Qasim, Analysis review on spatial and transform domain technique in digital steganography. Bulletin of Electrical Engineering and Informatics, 2020. 9(2): p. 573-581.
6. Al-Yousuf, F.Q.A., R.J.I.J.o.E.E. Din, and C. Science, Review on secured data capabilities of cryptography, steganography, and watermarking domain. 2020. 17(2): p. 1053-1059.
7. Tao, J., et al., Towards robust image steganography. IEEE Transactions on Circuits and Systems for Video Technology, 2019. 29(2): p. 594-600.
8. Din, R., A.J.J.B.o.E.E. Qasim, and Informatics, Steganography analysis techniques applied to audio and image files. 2019. 8(4): p. 1297â1302.
9. Din, R., et al., Review on steganography methods in multi-media domain. 2019. 8(1.7): p. 288-292.
10. Roshidi Din, O.G., Alaa Jabbar Qasim, Analytical Review on Graphical Formats Used in Image Steganographic Compression. Indonesian Journal of Electrical Engineering and Computer Science, 2018. Vol 12, No 2: p. pp. 441~446.
11. Poljicak, A., et al., Portable real-time DCT-based steganography using OpenCL. Journal of Real-Time Image Processing, 2018. 14(1): p. 87-99.
12. Hussain, M., et al., Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 2018. 65: p. 46-66.
13. Alaa Jabbar, Q., D. Roshidi, and A. Farah Qasim Ahmed, Extended Method of Least Significant Bits on Colour Images in Steganography. QALAAI ZANIST SCIENTIFIC JOURNAL, 2024. 9(3): p. 1146-1158.
14. Alaa Jabbar, Q. and A. Farah Qasim Ahmed, History of Image Digital Formats Using in Information Technology. QALAAI ZANIST SCIENTIFIC JOURNAL, 2021. 6(2): p. 1098-1112.
15. Qasim, A.J., et al., Review on techniques and file formats of image compression. 2020. 9(2): p. 602â610.
16. Altaay, A.A.J., S.B. Sahib, and M. Zamani. An introduction to image steganography techniques. in 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT). 2012. IEEE.
17. Qasim, A.J. and R. Din, Capacity Performance of LSB Method On Multi-Layer Images in Steganography.
18. Sai Virali Tummala, V.M., Comparison of Image Compression and Enhancement Techniques for Image Quality in Medical Images. 2017.
19. Sedighi, V., R. Cogranne, and J. Fridrich, Content-adaptive steganography by minimizing statistical detectability. IEEE Transactions on Information Forensics and Security, 2016. 11(2): p. 221-234.
20. Swetha, V., V. Prajith, and V. Kshema, Data Hiding Using Video Steganography-A Survey. International Journal of Science, Engineering and Computer Technology, 2015. 5(6): p. 206.
21. Sidhik, S., S. Sudheer, and V.M. Pillai, Performance and analysis of high capacity steganography of color images involving wavelet transform. Optik, 2015. 126(23): p. 3755-3760.
22. QASSIM, A.J. and Y. SUDHAKAR, Information Security with Image through Reversible Room by using Advanced Encryption Standard and Least Significant Bit Algorithm. 2015.
23. Nasreen, S.M., G. Jalewal, and S. Sutradhar, A Study on Video Steganographic Techniques. Internatinal Journal of Computational Engineering Research, 2015. 5(10).
24. Samagh, R. and S. Rani, Data Hiding using Image Steganography. 2015.
25. Rani, N. and J. Chaudhary, Text steganography techniques: A review. International Journal of Engineering Trends and Technology (IJETT), 2013. 4(7): p. 3013-3015.
26. Qian, Z., X. Han, and X. Zhang. Separable reversible data hiding in encrypted images by n-nary histogram modification. in International Conference on Multimedia Technology (ICMT 2013), Guangzhou. 2013.
27. Preeti Hooda , K.R., Steganography in Multiple Data: Review. International Journal of Latest Trends in Engineering and Technology (IJLTET), 2013.
28. Patel, K., S. Utareja, and H. Gupta, Information hiding using least significant bit steganography and blowfish algorithm. International Journal of Computer Applications, 2013. 63(13).
29. Neufeld, A. and A.D. Ker. A study of embedding operations and locations for steganography in H. 264 video. in IS&T/SPIE Electronic Imaging. 2013. International Society for Optics and Photonics.
30. Mulla, A., N. Gunjikar, and R. Naik, Comparison of Different Image Compression Techniques. International Journal of Computer Applications, 2013. 70(28).
31. Sunariya Utama Alaa Jabbar Qasim Almaliki, O.G., Roshidi Din, Comparative Analysis of LSB, PVD, and EMD-Based Stenographic Methods with Hybrid Optimization in Digital Images. International Journal of Engineering and Techniques, 2025. 11: p. 351-357.
32. Satyavathy, G. and M. Punithavalli, LSB, 3D-DCT and Huffman Encoding based Steganography in Safe Message Routing and Delivery for Structured Peer-to-Peer Systems. IJCA Special Issue on Artificial Intelligence Techniques, 2011: p. 1-5.
33. Raval, M., et al., Image Tampering Detection Using Compressive Sensing Based Watermarking Scheme. Proceedings of MVIP 2011, 2011.
34. Sharma, M., Compression using Huffman coding. IJCSNS International Journal of Computer Science and Network Security, 2010. 10(5): p. 133-141.
35. Kumar, K.S., et al. Coherent steganography using Segmentation and DCT. in Computational Intelligence and Computing Research (ICCIC), 2010 IEEE International Conference on. 2010. IEEE.
Cite this article
APA
Salam Ghanim Najeeb, Noor Alhuda fadhil (January 2026). A Multi-Layer Network Steganography Framework Using ICMP and NTFS Alternative Data Streams for Secure Covert. International Journal of Engineering and Techniques (IJET), 12(1). https://doi.org/{{doi}}
Salam Ghanim Najeeb, Noor Alhuda fadhil, âA Multi-Layer Network Steganography Framework Using ICMP and NTFS Alternative Data Streams for Secure Covert,â International Journal of Engineering and Techniques (IJET), vol. 12, no. 1, January 2026, doi: {{doi}}.
