Results 21 to 30 of about 84,456 (273)

Joint Hovering Height, Power, and Rate Optimization for Air-to-Ground UAV-RSMA Covert Communications

open access: yesDrones, 2023
In this paper, we investigate covert communications for an unmanned aerial vehicle (UAV)-aided rate-splitting multiple access (RSMA) system in which the UAV transmits to the covert and public users separately while shielding covert transmissions from a ...
Kang Ma   +4 more
doaj   +1 more source

Machine Learning Based Biomimetic Underwater Covert Acoustic Communication Method Using Dolphin Whistle Contours

open access: yesSensors, 2020
For underwater acoustic covert communications, biomimetic covert communications have been developed using dolphin whistles. The conventional biomimetic covert communication methods transmit slightly different signal patterns from real dolphin whistles ...
Jongmin Ahn   +4 more
doaj   +1 more source

Covert Communications Over Non-Orthogonal Multiple Overt Channels

open access: yesIEEE Access, 2022
The paper exploits overt information of non-orthogonal multiple access (NOMA) systems for camouflage to hide covert information. The optimum strategy of hiding information at the transmitter, accounting for the probability of the warden’s ...
Hien Quang Ta   +4 more
doaj   +1 more source

Covert Voice over Internet Protocol communications based on spatial model [PDF]

open access: yes, 2015
This paper presents a new spatial steganography model for covert communications over Voice over Internet Protocol (VoIP), providing a solution to the issue of increasing the capacity of covert VoIP channels without compromising the imperceptibility of ...
Huang, Yongfeng, Tang, Shanyu
core   +1 more source

The Long-Range Biomimetic Covert Communication Method Mimicking Large Whale

open access: yesSensors, 2022
Short-range biomimetic covert communications have been developed using dolphin whistles for underwater acoustic covert communications. Due to a channel characteristics difference by range, the conventional short-range methods cannot be directly applied ...
Jongmin Ahn, Deawon Do, Wanjin Kim
doaj   +1 more source

Covert Optical Communication

open access: yesCoRR, 2014
Encryption prevents unauthorized decoding, but does not ensure stealth---a security demand that a mere presence of a message be undetectable. We characterize the ultimate limit of covert communication that is secure against the most powerful physically-permissible adversary.
Boulat A. Bash   +6 more
openaire   +2 more sources

Gaussian Signalling for Covert Communications [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2019
In this work, we examine the optimality of Gaussian signalling for covert communications with an upper bound on $\mathcal{D}(p_{_1}||p_{_0})$ or $\mathcal{D}(p_{_0}||p_{_1})$ as the covertness constraint, where $\mathcal{D}(p_{_1}||p_{_0})$ and $\mathcal{D}(p_{_0}||p_{_1})$ are different due to the asymmetry of Kullback-Leibler divergence, $p_{_0}(y ...
Shihao Yan   +3 more
openaire   +3 more sources

Covert Marketing Unmasked: A Legal and Regulatory Guide for Practices that Mask Marketing Messages [PDF]

open access: yes, 2008
Masked marketing—one form of covert marketing—involves marketing communications that appear to be from independent third parties rather than from product marketers. This article presents a typology of masked marketing practices, illustrating whether they
Andrews, J. Craig, Petty, Ross D
core   +2 more sources

Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography [PDF]

open access: yes, 2019
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.
Jiang, Y, Meziane, F, Peng, J, Tang, S
core   +3 more sources

Detection of Size Modulation Covert Channels Using Countermeasure Variation [PDF]

open access: yesJournal of Universal Computer Science, 2019
Network covert channels enable stealthy communications for malware and data exfiltration. For this reason, developing effective countermeasures for these threats is important for the protection of individuals and organizations.
Steffen Wendzel   +3 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy