Results 191 to 200 of about 155,128 (235)
Some of the next articles are maybe not open access.

Covert Communication With Cognitive Jammer

IEEE Wireless Communications Letters, 2020
This letter studied the covert communication with the help of the cognitive jammer over an additive white Gaussian noise (AWGN) channel. The cognitive jammer first senses Alice’s transmission; then, based on its sensing results, it determines whether to transmit the jamming signal.
Wenhui Xiong   +3 more
openaire   +1 more source

Keyless asynchronous covert communication

2016 IEEE Information Theory Workshop (ITW), 2016
We consider a scenario in which Alice asynchronously communicates with Bob over a Discrete Memoryless Channel (DMC) while escaping detection from an adversary who observes their communication through another DMC. Specifically, Alice transmits codewords of length n and chooses the transmission epoch T uniformly at random among N available time epochs ...
Keerthi Suria Kumar Arumugam   +1 more
openaire   +1 more source

Covert and Deniable Communications

Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
At the first Information Hiding Workshop in 1996 we tried to clarify the models and assumptions behind information hiding. We agreed the terminology of cover text and stego text against a background of the game proposed by our keynote speaker Gus Simmons: that Alice and Bob are in jail and wish to hatch an escape plan without the fact of their ...
openaire   +1 more source

Covert Communication in Backscatter Radio

ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019
Covert communication in backscatter radio systems is considered, where the transmitter controls its transmit power to keep the transponder's response hidden, while a warden tries to detect this covert communication. To achieve covertness, we propose a non-conventional transmission scheme where the transmitter emits noise-like signal with transmit power
Khurram Shahzad 0003, Xiangyun Zhou 0001
openaire   +1 more source

Detecting covert communication on Android

37th Annual IEEE Conference on Local Computer Networks, 2012
Using covert channels, malicious applications on Android-based smartphones are able to subvert the permission system and share data in a potentially untraceable manner. These channels are easy to exploit today, and have enough bandwidth to transmit sensitive information in real-time between collaborating applications.
Michael Hansen   +2 more
openaire   +1 more source

On Covert Communication with Interference Uncertainty

2018 IEEE International Conference on Communications (ICC), 2018
Covert communication can prevent the opponent from knowing that a wireless communication has occurred. If only the additive white Gaussian noise (AWGN) channels and ambient noise are taken into consideration, a square root law was obtained and the result shows that the privacy rate approaches zero asymptotically.
Zhihong Liu   +4 more
openaire   +1 more source

Jamming Strategies in Covert Communication

2019
Consider the communication problem where Alice tries to send a message towards Bob while trying to conceal the presence of communication from a watchful adversary, Willie, which tries to determine if a transmission took place or not. Under the basic settings, where all variables are known to Willie, the total amount of information bits that can be ...
Ori Shmuel   +2 more
openaire   +1 more source

Concurrent Covert Communication Channels

2010
This paper introduces a new steganographic technique in which a set of concurrent hidden channels are established between a sender and multiple receivers. Each channel is protected by a separate key. The method can work with JPEG blocks in which an 8 × 8 block is divided into four non-overlapping sets, each consisting a covert channel that hides a ...
Md. Amiruzzaman   +3 more
openaire   +1 more source

Quantifying and Classifying Covert Communications on Android

Mobile Networks and Applications, 2013
By exploiting known covert channels, Android applications today are able to bypass the built-in permission system and share data in a potentially untraceable manner. These channels have sufficient bandwidth to transmit sensitive information, such as GPS locations, in real-time to collaborating applications with Internet access. In this paper, we extend
Raquel Hill, Michael Hansen, Veer Singh
openaire   +1 more source

Home - About - Disclaimer - Privacy