Pattern-based survey and categorization of network covert channel techniques

S Wendzel, S Zander, B Fechner, C Herdin - ACM Computing Surveys …, 2015 - dl.acm.org
Network covert channels are used to hide communication inside network protocols. Various
techniques for covert channels have arisen in the past few decades. We surveyed and …

Video steganography: a comprehensive review

MM Sadek, AS Khalifa, MGM Mostafa - Multimedia tools and applications, 2015 - Springer
Steganography is the art and science of secret communication, concealing the very
existence of a communication. Modern cover types can take many forms such as text …

Image steganography in spatial domain: A survey

M Hussain, AWA Wahab, YIB Idris, ATS Ho… - Signal Processing: Image …, 2018 - Elsevier
This paper presents a literature review of image steganography techniques in the spatial
domain for last 5 years. The research community has already done lots of noteworthy …

Principles and overview of network steganography

J Lubacz, W Mazurczyk… - IEEE Communications …, 2014 - ieeexplore.ieee.org
Principles and overview of network steganography Page 1 IEEE Communications
Magazine • May 2014 225 0163-6804/14/$25.00 © 2014 IEEE Józef Lubacz, Wojciech …

[HTML][HTML] Hiding patients' medical reports using an enhanced wavelet steganography algorithm in DICOM images

MA Ahmad, M Elloumi, AH Samak… - Alexandria Engineering …, 2022 - Elsevier
In the latest years, there is an increasing emphasis on DICOM medical images, especially in
digital medical images transmission to e-health services. Besides, the confidentiality and …

A survey of key technologies for constructing network covert channel

J Tian, G Xiong, Z Li, G Gou - Security and Communication …, 2020 - Wiley Online Library
In order to protect user privacy or guarantee free access to the Internet, the network covert
channel has become a hot research topic. It refers to an information channel in which the …

网络隐蔽信道关键技术研究综述

李彦峰, 丁丽萍, 吴敬征, 崔强, 刘雪花, 关贝, 王永吉 - 软件学报, 2019 - jos.org.cn
网络隐蔽信道是在网络环境下违反通信限制规则进行隐蔽信息传输的信息通道,
为网络信息安全带来了新的挑战, 也为数据传输的安全性和隐私性带来了新的研究方向 …

Covert timing channels for IoT over mobile networks

Y Tan, X Zhang, K Sharif, C Liang… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
Various security threats have prompted covert timing channels to become an important
alternative for the transmission of confidential information in an untrusted Internet of Things …

A secure stop and wait communication protocol for disturbed networks

V Shukla, A Chaturvedi, N Srivastava - Wireless personal communications, 2020 - Springer
Secure data communication is the need of hour today specifically when the wireless
communication channel is insecure. We are proposing a protocol which can be customized …

PadSteg: Introducing inter-protocol steganography

B Jankowski, W Mazurczyk, K Szczypiorski - Telecommunication Systems, 2013 - Springer
Hiding information in network traffic may lead to leakage of confidential information. In this
paper we introduce a new steganographic system: the PadSteg (Padding Steganography) …