For underwater acoustic covert communications, biomimetic covert communications have been developed using dolphin whistles. The conventional biomimetic covert communication methods transmit slightly different signal patterns from real dolphin whistles ...
Jongmin Ahn +4 more
doaj +1 more source
Covert Communications Over Non-Orthogonal Multiple Overt Channels
The paper exploits overt information of non-orthogonal multiple access (NOMA) systems for camouflage to hide covert information. The optimum strategy of hiding information at the transmitter, accounting for the probability of the warden’s ...
Hien Quang Ta +4 more
doaj +1 more source
Covert Voice over Internet Protocol communications based on spatial model [PDF]
This paper presents a new spatial steganography model for covert communications over Voice over Internet Protocol (VoIP), providing a solution to the issue of increasing the capacity of covert VoIP channels without compromising the imperceptibility of ...
Huang, Yongfeng, Tang, Shanyu
core +1 more source
The Long-Range Biomimetic Covert Communication Method Mimicking Large Whale
Short-range biomimetic covert communications have been developed using dolphin whistles for underwater acoustic covert communications. Due to a channel characteristics difference by range, the conventional short-range methods cannot be directly applied ...
Jongmin Ahn, Deawon Do, Wanjin Kim
doaj +1 more source
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography [PDF]
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.
Jiang, Y, Meziane, F, Peng, J, Tang, S
core +3 more sources
Implementation of hybrid artificial intelligence technique to detect covert channels in new generation network protocol IPv6 [PDF]
Intrusion detection systems offer monolithic way to detect attacks through monitoring, searching for abnormal characteristics and malicious behavior in network communications.
Ma, X, Peytchev, E, Salih, A
core +1 more source
Shining a Light on Policing of the Dark Web: An analysis of UK investigatory Powers [PDF]
The dark web and the proliferation of criminals who have exploited its cryptographic protocols to commit crimes anonymously has created major challenges for law enforcement around the world. Traditional policing techniques have required amendment and new
Davies, Gemma
core +2 more sources
Covert underwater acoustic communications
Low probability of detection (LPD) communications are conducted at a low received signal-to-noise ratio (SNR) to deter eavesdroppers to sense the presence of the transmitted signal. Successful detection at intended receiver heavily relies on the processing gain achieved by employing the direct-sequence spread-spectrum (DSSS) technique.
Jun Ling +4 more
openaire +2 more sources
Covert Marketing Unmasked: A Legal and Regulatory Guide for Practices that Mask Marketing Messages [PDF]
Masked marketing—one form of covert marketing—involves marketing communications that appear to be from independent third parties rather than from product marketers. This article presents a typology of masked marketing practices, illustrating whether they
Andrews, J. Craig, Petty, Ross D
core +2 more sources
Detection of Size Modulation Covert Channels Using Countermeasure Variation [PDF]
Network covert channels enable stealthy communications for malware and data exfiltration. For this reason, developing effective countermeasures for these threats is important for the protection of individuals and organizations.
Steffen Wendzel +3 more
doaj +3 more sources

