Results 241 to 250 of about 84,456 (273)
Some of the next articles are maybe not open access.
Concurrent Covert Communication Channels
2010This paper introduces a new steganographic technique in which a set of concurrent hidden channels are established between a sender and multiple receivers. Each channel is protected by a separate key. The method can work with JPEG blocks in which an 8 × 8 block is divided into four non-overlapping sets, each consisting a covert channel that hides a ...
Md. Amiruzzaman +3 more
openaire +1 more source
Quantifying and Classifying Covert Communications on Android
Mobile Networks and Applications, 2013By exploiting known covert channels, Android applications today are able to bypass the built-in permission system and share data in a potentially untraceable manner. These channels have sufficient bandwidth to transmit sensitive information, such as GPS locations, in real-time to collaborating applications with Internet access. In this paper, we extend
Raquel Hill, Michael Hansen, Veer Singh
openaire +1 more source
Exact Throughput-Covertness Relation for Covert Communications
GLOBECOM 2022 - 2022 IEEE Global Communications Conference, 2022Daizhong Yu +3 more
openaire +1 more source
Covert computer and network communications
Proceedings of the 4th annual conference on Information security curriculum development, 2007The ex-filtration of confidential information across communication networks is a challenging problem. It is possible for transmissions to be hidden or masked in such a way to circumvent the security policies of an organization. An objective might be to make contacts "invisible" to all parties except designates.
openaire +1 more source
Covert Communication for DTD Documents Slicing
2010 International Conference on E-Business and E-Government, 2010In this work, a novel covert communication method for DTD documents is introduced. The relationship is found between an arbitrary 0,1 string and DTD documents. According to some slicing criterion, a secret communication is completed. Furthermore, a covert communication model is also proposed and an algorithm is discussed in detail.
Fu Dong-lai, Chen Gou-xi
openaire +1 more source
Covert Communications in a Dynamic Interference Environment
2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2018Much of security research focuses on preventing an adversary from deciphering a message's content, but there are a number of applications that motivate the more challenging goal of “covert” communications: transmitter Alice conveying information to legitimate receiver Bob while preventing a capable and attentive adversary Willie from detecting the ...
Dennis Goeckel +5 more
openaire +1 more source
On covert communication in advertising
Journal of Pragmatics, 2004Abstract This paper investigates the notion of covert communication in advertisements. I begin by discussing the role of intentions in communication, outlining the relevance-theoretic view. Taking the work of Keiko Tanaka (1994/1999. Advertising Language: A Pragmatic Approach to Advertisements in Britain and Japan.
openaire +1 more source
Covert Communications: A Comprehensive Survey
IEEE Communications Surveys & Tutorials, 2023Xinying Chen +6 more
openaire +2 more sources
Covert Communications in Intelligent Reflecting Surface-Assisted Two-Way Relaying Networks
IEEE Transactions on Vehicular Technology, 2022Dan Deng, Xingwang Li, Shuping Dang
exaly
Covert Wireless Communications Under Quasi-Static Fading With Channel Uncertainty
IEEE Transactions on Information Forensics and Security, 2021Khurram Shahzad, Xiangyun Zhou
exaly

