Blockchain meets covert communication: A survey

Z Chen, L Zhu, P Jiang, C Zhang, F Gao… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Covert communication enables covert information transmission in an undetectable way to
prevent the exposure of communication behaviors. Blockchain-based covert communication …

Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions

T Zhang, B Li, Y Zhu, T Han, Q Wu - Computer Communications, 2023 - Elsevier
Traditional network covert channels have become insecure due to the continuous
improvement of traffic analysis techniques. As an emerging technology combined with …

Rethinking wireless communication security in semantic Internet of Things

H Du, J Wang, D Niyato, J Kang, Z Xiong… - IEEE Wireless …, 2023 - ieeexplore.ieee.org
Semantic communication is an important component in the next generation of wireless
networking. Enabled by this novel paradigm, the conventional Internet-of-Things (IoT) is …

A covert channel over blockchain based on label tree without long waiting times

Z Wang, L Zhang, R Guo, G Wang, J Qiu, S Su, Y Liu… - Computer Networks, 2023 - Elsevier
Blockchain, as a decentralized database, provides natural anonymity and tamper-
resistance, safeguarding the identity of both parties in covert communication and preventing …

Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-based Cryptography, and Chaotic Cryptography Techniques

AA Pekerti, A Sasongko, A Indrayanto - IEEE Access, 2024 - ieeexplore.ieee.org
Secure end-to-end voice communication is crucial, but it has several issues. Researchers in
this field can benefit from a review paper with broader evaluation parameters than existing …

Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages

W Wen, H Huang, S Qi, Y Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the rapid development of internet applications, privacy protection of secret messages in
covert communication has become increasingly important. To address the issue of attacks …

Sustainable electronic document security: A comprehensive framework integrating encryption, digital signature and watermarking algorithms

HR Penubadi, P Shah, R Sekhar… - Heritage and …, 2023 - hsd.ardascience.com
Protecting electronic documents, especially those containing sensitive data, is a major
challenge in an open web. The data security industry has long struggled to manage the …

无线隐蔽通信容量限与实现技术综述

陈炜宇, 骆俊杉, 王方刚, 丁海洋, 王世练… - 通信学报, 2022 - infocomm-journal.com
梳理无线隐蔽通信与相关概念的区别和联系, 聚焦基于假设检验理论和信息论的无线隐蔽通信
研究, 介绍了基本研究模型与具体模型分类, 分容量限和实现技术两部分对现有工作进行综述 …

区块链环境下隐蔽信道研究综述.

张璇, 李雷孝, 杜金泽, 史建平 - Journal of Frontiers of …, 2024 - search.ebscohost.com
隐蔽信道是将信息隐藏在公开的通信信道中进行隐蔽传输的方法, 旨在保证数据传输的安全性,
使第三方对隐蔽通信的过程毫无察觉. 然而, 随着流量分析技术的不断进步, 传统的网络隐蔽信道 …

Gaussian-Distributed Spread-Spectrum for Covert Communications

I Shakeel, J Hilliard, W Zhang, M Rice - Sensors, 2023 - mdpi.com
Covert communication techniques play a crucial role in military and commercial applications
to maintain the privacy and security of wireless transmissions from prying eyes. These …