I have recently wrote a research paper on Covert Channel and Data HIding in TCP/IP and demonstrated them practically with Scapy and custom scripts. Can you evaluate and publish in exploit db white paper. Thanks ROshan