[HTML][HTML] An authentication scheme for FANET packet payload using data hiding

D Mallikarachchi, KS Wong, JMY Lim - Journal of Information Security and …, 2023 - Elsevier
Flying ad hoc networks (FANETs) are gaining much traction in recent years due to their wide
range of applications, resulting in the emergence of a number of studies on the facilitation of …

A Walk-through towards network steganography techniques

U Pilania, M Kumar, T Rohit, N Nandal - Информатика и …, 2023 - ia.spcras.ru
2D and 3D digital multimedia files offer numerous benefits like excellent quality,
compression, editing, reliable copying, etc. These qualities of the multimedia files, on the …

WISE: Waveform Independent Signal Embedding for Covert Communication

X Wei, D Saha - IEEE Transactions on Machine Learning in …, 2023 - ieeexplore.ieee.org
Wireless signals are vulnerable to various security threats, like eavesdropping and jamming,
due to the inherent broadcast nature of the wireless channel. Encryption may ensure the …

Security and Trust for Wireless Integrated Circuits

ARD Rizo - 2023 - hal.science
The origin of the hardware security threats is the massively globalized and outsourcing-
based Integrated Circuit (IC) supply chain that we see today. The prohibitively cost of owning …