Results 21 to 30 of about 84,456 (273)
Joint Hovering Height, Power, and Rate Optimization for Air-to-Ground UAV-RSMA Covert Communications
In this paper, we investigate covert communications for an unmanned aerial vehicle (UAV)-aided rate-splitting multiple access (RSMA) system in which the UAV transmits to the covert and public users separately while shielding covert transmissions from a ...
Kang Ma +4 more
doaj +1 more source
For underwater acoustic covert communications, biomimetic covert communications have been developed using dolphin whistles. The conventional biomimetic covert communication methods transmit slightly different signal patterns from real dolphin whistles ...
Jongmin Ahn +4 more
doaj +1 more source
Covert Communications Over Non-Orthogonal Multiple Overt Channels
The paper exploits overt information of non-orthogonal multiple access (NOMA) systems for camouflage to hide covert information. The optimum strategy of hiding information at the transmitter, accounting for the probability of the warden’s ...
Hien Quang Ta +4 more
doaj +1 more source
Covert Voice over Internet Protocol communications based on spatial model [PDF]
This paper presents a new spatial steganography model for covert communications over Voice over Internet Protocol (VoIP), providing a solution to the issue of increasing the capacity of covert VoIP channels without compromising the imperceptibility of ...
Huang, Yongfeng, Tang, Shanyu
core +1 more source
The Long-Range Biomimetic Covert Communication Method Mimicking Large Whale
Short-range biomimetic covert communications have been developed using dolphin whistles for underwater acoustic covert communications. Due to a channel characteristics difference by range, the conventional short-range methods cannot be directly applied ...
Jongmin Ahn, Deawon Do, Wanjin Kim
doaj +1 more source
Encryption prevents unauthorized decoding, but does not ensure stealth---a security demand that a mere presence of a message be undetectable. We characterize the ultimate limit of covert communication that is secure against the most powerful physically-permissible adversary.
Boulat A. Bash +6 more
openaire +2 more sources
Gaussian Signalling for Covert Communications [PDF]
In this work, we examine the optimality of Gaussian signalling for covert communications with an upper bound on $\mathcal{D}(p_{_1}||p_{_0})$ or $\mathcal{D}(p_{_0}||p_{_1})$ as the covertness constraint, where $\mathcal{D}(p_{_1}||p_{_0})$ and $\mathcal{D}(p_{_0}||p_{_1})$ are different due to the asymmetry of Kullback-Leibler divergence, $p_{_0}(y ...
Shihao Yan +3 more
openaire +3 more sources
Covert Marketing Unmasked: A Legal and Regulatory Guide for Practices that Mask Marketing Messages [PDF]
Masked marketing—one form of covert marketing—involves marketing communications that appear to be from independent third parties rather than from product marketers. This article presents a typology of masked marketing practices, illustrating whether they
Andrews, J. Craig, Petty, Ross D
core +2 more sources
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography [PDF]
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.
Jiang, Y, Meziane, F, Peng, J, Tang, S
core +3 more sources
Detection of Size Modulation Covert Channels Using Countermeasure Variation [PDF]
Network covert channels enable stealthy communications for malware and data exfiltration. For this reason, developing effective countermeasures for these threats is important for the protection of individuals and organizations.
Steffen Wendzel +3 more
doaj +3 more sources

