Results 21 to 30 of about 83,946 (258)

Machine Learning Based Biomimetic Underwater Covert Acoustic Communication Method Using Dolphin Whistle Contours

open access: yesSensors, 2020
For underwater acoustic covert communications, biomimetic covert communications have been developed using dolphin whistles. The conventional biomimetic covert communication methods transmit slightly different signal patterns from real dolphin whistles ...
Jongmin Ahn   +4 more
doaj   +1 more source

Covert Communications Over Non-Orthogonal Multiple Overt Channels

open access: yesIEEE Access, 2022
The paper exploits overt information of non-orthogonal multiple access (NOMA) systems for camouflage to hide covert information. The optimum strategy of hiding information at the transmitter, accounting for the probability of the warden’s ...
Hien Quang Ta   +4 more
doaj   +1 more source

Covert Voice over Internet Protocol communications based on spatial model [PDF]

open access: yes, 2015
This paper presents a new spatial steganography model for covert communications over Voice over Internet Protocol (VoIP), providing a solution to the issue of increasing the capacity of covert VoIP channels without compromising the imperceptibility of ...
Huang, Yongfeng, Tang, Shanyu
core   +1 more source

The Long-Range Biomimetic Covert Communication Method Mimicking Large Whale

open access: yesSensors, 2022
Short-range biomimetic covert communications have been developed using dolphin whistles for underwater acoustic covert communications. Due to a channel characteristics difference by range, the conventional short-range methods cannot be directly applied ...
Jongmin Ahn, Deawon Do, Wanjin Kim
doaj   +1 more source

Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography [PDF]

open access: yes, 2019
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.
Jiang, Y, Meziane, F, Peng, J, Tang, S
core   +3 more sources

Implementation of hybrid artificial intelligence technique to detect covert channels in new generation network protocol IPv6 [PDF]

open access: yes, 2016
Intrusion detection systems offer monolithic way to detect attacks through monitoring, searching for abnormal characteristics and malicious behavior in network communications.
Ma, X, Peytchev, E, Salih, A
core   +1 more source

Shining a Light on Policing of the Dark Web: An analysis of UK investigatory Powers [PDF]

open access: yes, 2020
The dark web and the proliferation of criminals who have exploited its cryptographic protocols to commit crimes anonymously has created major challenges for law enforcement around the world. Traditional policing techniques have required amendment and new
Davies, Gemma
core   +2 more sources

Covert underwater acoustic communications

open access: yesThe Journal of the Acoustical Society of America, 2010
Low probability of detection (LPD) communications are conducted at a low received signal-to-noise ratio (SNR) to deter eavesdroppers to sense the presence of the transmitted signal. Successful detection at intended receiver heavily relies on the processing gain achieved by employing the direct-sequence spread-spectrum (DSSS) technique.
Jun Ling   +4 more
openaire   +2 more sources

Covert Marketing Unmasked: A Legal and Regulatory Guide for Practices that Mask Marketing Messages [PDF]

open access: yes, 2008
Masked marketing—one form of covert marketing—involves marketing communications that appear to be from independent third parties rather than from product marketers. This article presents a typology of masked marketing practices, illustrating whether they
Andrews, J. Craig, Petty, Ross D
core   +2 more sources

Detection of Size Modulation Covert Channels Using Countermeasure Variation [PDF]

open access: yesJournal of Universal Computer Science, 2019
Network covert channels enable stealthy communications for malware and data exfiltration. For this reason, developing effective countermeasures for these threats is important for the protection of individuals and organizations.
Steffen Wendzel   +3 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy