Results 241 to 250 of about 84,456 (273)
Some of the next articles are maybe not open access.

Concurrent Covert Communication Channels

2010
This paper introduces a new steganographic technique in which a set of concurrent hidden channels are established between a sender and multiple receivers. Each channel is protected by a separate key. The method can work with JPEG blocks in which an 8 × 8 block is divided into four non-overlapping sets, each consisting a covert channel that hides a ...
Md. Amiruzzaman   +3 more
openaire   +1 more source

Quantifying and Classifying Covert Communications on Android

Mobile Networks and Applications, 2013
By exploiting known covert channels, Android applications today are able to bypass the built-in permission system and share data in a potentially untraceable manner. These channels have sufficient bandwidth to transmit sensitive information, such as GPS locations, in real-time to collaborating applications with Internet access. In this paper, we extend
Raquel Hill, Michael Hansen, Veer Singh
openaire   +1 more source

Exact Throughput-Covertness Relation for Covert Communications

GLOBECOM 2022 - 2022 IEEE Global Communications Conference, 2022
Daizhong Yu   +3 more
openaire   +1 more source

Covert computer and network communications

Proceedings of the 4th annual conference on Information security curriculum development, 2007
The ex-filtration of confidential information across communication networks is a challenging problem. It is possible for transmissions to be hidden or masked in such a way to circumvent the security policies of an organization. An objective might be to make contacts "invisible" to all parties except designates.
openaire   +1 more source

Covert Communication for DTD Documents Slicing

2010 International Conference on E-Business and E-Government, 2010
In this work, a novel covert communication method for DTD documents is introduced. The relationship is found between an arbitrary 0,1 string and DTD documents. According to some slicing criterion, a secret communication is completed. Furthermore, a covert communication model is also proposed and an algorithm is discussed in detail.
Fu Dong-lai, Chen Gou-xi
openaire   +1 more source

Covert Communications in a Dynamic Interference Environment

2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2018
Much of security research focuses on preventing an adversary from deciphering a message's content, but there are a number of applications that motivate the more challenging goal of “covert” communications: transmitter Alice conveying information to legitimate receiver Bob while preventing a capable and attentive adversary Willie from detecting the ...
Dennis Goeckel   +5 more
openaire   +1 more source

On covert communication in advertising

Journal of Pragmatics, 2004
Abstract This paper investigates the notion of covert communication in advertisements. I begin by discussing the role of intentions in communication, outlining the relevance-theoretic view. Taking the work of Keiko Tanaka (1994/1999. Advertising Language: A Pragmatic Approach to Advertisements in Britain and Japan.
openaire   +1 more source

Covert Communications: A Comprehensive Survey

IEEE Communications Surveys & Tutorials, 2023
Xinying Chen   +6 more
openaire   +2 more sources

Covert Communications in Intelligent Reflecting Surface-Assisted Two-Way Relaying Networks

IEEE Transactions on Vehicular Technology, 2022
Dan Deng, Xingwang Li, Shuping Dang
exaly  

Covert Wireless Communications Under Quasi-Static Fading With Channel Uncertainty

IEEE Transactions on Information Forensics and Security, 2021
Khurram Shahzad, Xiangyun Zhou
exaly  

Home - About - Disclaimer - Privacy