Steganography in modern smartphones and mitigation techniques

W Mazurczyk, L Caviglione - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …

Android-Stego: a novel service provider imperceptible MMS Steganography technique robust to message loss

A Srinivasan, J Wu, J Shi - EAI Endorsed Transactions on Ambient Systems, 2015 - eudl.eu
Abstract Information hiding techniques, especially steganography, have been extensively
researched for over two decades. Nonetheless, steganography on smartphones over …

[PDF][PDF] 二进制差分随机过程键控的结构与性能分析

徐志江, 凌晓, 王亢, 孟利民 - 通信学报, 2014 - infocomm-journal.com
提出了一种二进制差分随机过程键控的调制解调结构, 推导出了在高斯信道和准静态衰落信道下
的误比特率理论计算公式, 并对系统进行了误比特率和二阶循环谱检测的仿真. 仿真结果表明 …

Secure android covert channel with robust survivability to service provider restrictions

A Srinivasan, J Wu, J Shi - International Journal of Security …, 2017 - inderscienceonline.com
The overarching field of information hiding has been extensively researched. However, the
potential for use of smartphones-communicating over cellular service provider networks-has …

Third Quarter 2013, IEEE Communications Surveys & Tutorials

E Hossain - IEEE Communications Surveys & Tutorials, 2013 - ieeexplore.ieee.org
This issue includes twenty five articles covering different aspects of communication
networks. In particular, issues related to energy efficient multimedia transmission …

[PDF][PDF] Structure and performance analysis of binary differential stochastic process shift keying

XU Zhi-jiang, L Xiao, W Kang… - Journal on …, 2014 - researchgate.net
A novel modulation and demodulation structure based on binary differential stochastic
process shift keying (BDSPSK) is proposed. The theoretical bit error rates (BER) under the …

[引用][C] 基于均值方差评价系数与多分类器的AMR 语音隐写分析方法

吴彦鹏, 吴倩, 陈明辉, 张辉极 - 计算机科学, 2016