Trends in steganography

E Zielińska, W Mazurczyk, K Szczypiorski - Communications of the ACM, 2014 - dl.acm.org
Trends in steganography Page 1 86 communications of the acm | march 2014 | vol. 57 | no. 3
review articles ar t b y an D ri J bor ys a ssocia te s the Mass Media anointed 2011 as the "year …

Machine Learning and Software Defined Network to secure communications in a swarm of drones

C Guerber, M Royer, N Larrieu - Journal of information security and …, 2021 - Elsevier
As drones become more and more frequent in industry and perhaps tomorrow in everyday
life, the variety and sensitivity of their missions will increase. Securing the communication …

Principles and overview of network steganography

J Lubacz, W Mazurczyk… - IEEE Communications …, 2014 - ieeexplore.ieee.org
Principles and overview of network steganography Page 1 IEEE Communications
Magazine • May 2014 225 0163-6804/14/$25.00 © 2014 IEEE Józef Lubacz, Wojciech …

Network steganography using the overflow field of timestamp option in an IPv4 packet

P Bedi, A Dua - Procedia Computer Science, 2020 - Elsevier
Steganography is a technique of hiding secret data inside a cover. The most popularly used
cover media include images, videos, audios, documents and network protocols. Network …

A secure stop and wait communication protocol for disturbed networks

V Shukla, A Chaturvedi, N Srivastava - Wireless personal communications, 2020 - Springer
Secure data communication is the need of hour today specifically when the wireless
communication channel is insecure. We are proposing a protocol which can be customized …

[PDF][PDF] SmartSteg: A new android based steganography application.

D Bucerzan, C Ratiu, MJ Manolescu - Int. J. Comput. Commun …, 2013 - academia.edu
With the development of mobile devices the security issue migrates from the PC platform to
this new technology. Securing confidential information on the mobile platforms has been, is …

Detecting covert channels in computer networks based on chaos theory

H Zhao, YQ Shi - IEEE transactions on information forensics …, 2012 - ieeexplore.ieee.org
Covert channels via the widely used TCP/IP protocols have become a new challenging
issue for network security. In this paper, we analyze the information hiding in TCP/IP …

Hidden and uncontrolled–on the emergence of network steganographic threats

S Wendzel, W Mazurczyk, L Caviglione… - ISSE 2014 Securing …, 2014 - Springer
Network steganography is the art of hiding secret information within innocent network
transmissions. Recent findings indicate that novel malware is increasingly using network …

Imparting cryptographic information in network communications

A Whillock, E Chan, S Manapragada… - US Patent …, 2013 - Google Patents
This specification describes technologies relating to imparting cryptographic information in
network communications. In general, aspects of the subject matter described in this …

Hiding information in a stream control transmission protocol

W Frączek, W Mazurczyk, K Szczypiorski - Computer Communications, 2012 - Elsevier
The STCP (Stream Control Transmission Protocol) is a candidate for a new transport layer
protocol that may replace the TCP (Transmission Control Protocol) and the UDP (User …