Trends and challenges in network covert channels countermeasures

L Caviglione - Applied Sciences, 2021 - mdpi.com
Network covert channels are increasingly used to endow malware with stealthy behaviors,
for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner …

Steganography in modern smartphones and mitigation techniques

W Mazurczyk, L Caviglione - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …

The new threats of information hiding: The road ahead

K Cabaj, L Caviglione, W Mazurczyk, S Wendzel… - IT …, 2018 - ieeexplore.ieee.org
A recent trend involves exploiting various information-hiding techniques to empower
malware-for example, to bypass mobile device security frameworks or to exfiltrate sensitive …

AHCM: Adaptive Huffman code mapping for audio steganography based on psychoacoustic model

X Yi, K Yang, X Zhao, Y Wang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Most current audio steganographic methods are content non-adaptive which have poor
security and low embedding capacity. This paper proposes a generalized adaptive Huffman …

A firewall concept for both control-flow and data-flow in regression integration testing

LJ White, HKN Leung - Proceedings Conference on Software …, 1992 - computer.org
Due to improvements in defensive systems, network threats are becoming increasingly
sophisticated and complex as cybercriminals are using various methods to cloak their …

High capacity speech steganography for the G723. 1 coder based on quantised line spectral pairs interpolation and CNN auto-encoding

H Kheddar, D Megías - Applied Intelligence, 2022 - Springer
In this paper, a novel steganographic method for Voice over IP applications—called
Steganography-based Interpolation and Auto-Encoding (SIAE)—is proposed. The aim of the …

Steganography and steganalysis in voice over IP: A review

Z Wu, J Guo, C Zhang, C Li - Sensors, 2021 - mdpi.com
The rapid advance and popularization of VoIP (Voice over IP) has also brought security
issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the …

Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords

Y Qiu, H Tian, L Tang, W Mazurczyk… - Journal of Information …, 2022 - Elsevier
With the wide application of adaptive multi-rate (AMR) speech coder, steganography and
steganalysis based on AMR coded speech streams have become a hot spot in the field of …

Generative high-capacity image hiding based on residual CNN in wavelet domain

X Zhu, Z Lai, Y Liang, J Xiong, J Wu - Applied Soft Computing, 2022 - Elsevier
Image hiding is the process of hiding a secret image in another meaningful image or other
carriers so that the secret image remains imperceptible and can be recovered securely at …

VoIP network covert channels to enhance privacy and information sharing

J Saenger, W Mazurczyk, J Keller… - Future Generation …, 2020 - Elsevier
Abstract Information hiding is increasingly used to implement covert channels, to exfiltrate
data or to perform attacks in a stealthy manner. Another important usage deals with privacy …