无线隐蔽通信研究综述.

戴跃伟, 刘光杰, 曹鹏程, 刘伟伟… - Journal of Nanjing …, 2020 - search.ebscohost.com
摘要无线隐蔽通信是将消息隐藏在无线通信数据帧和信号中进行隐蔽传输的技术,
属于无线通信和信息隐藏技术的交叉领域, 其理论与技术的研究方兴未艾. 本文分析了无线隐蔽 …

Information hiding: challenges for forensic experts

W Mazurczyk, S Wendzel - Communications of the ACM, 2017 - dl.acm.org
Information hiding: Challenges for forensic experts Page 1 86 COMMUNICATIONS OF THE
ACM | JANUARY 2018 | VOL. 61 | NO. 1 review articles IMA GE B Y ANDRIJ BOR YS A SSOCIA …

A survey of wireless covert communications

Y Dai, G Liu, P Cao, W Liu… - Nanjing Xinxi Gongcheng …, 2020 - search.proquest.com
Wireless covert communication is the technology of hiding messages in wireless
communication data frames and signals for covert transmission, which belongs to the cross …

Fundamental limits of covert packet insertion

R Soltani, D Goeckel, D Towsley… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Covert communication conceals the existence of the transmission from a watchful adversary.
We consider the fundamental limits for covert communications via packet insertion over …

Hybrid covert channel in LTE-A: modeling and analysis

G Xu, W Yang, L Huang - Journal of Network and Computer Applications, 2018 - Elsevier
As a major approach to information leakage, covert channels are rapidly gaining popularity
with the exponentially growing of cloud computing and network resources. Long Term …

Steganography in long term evolution systems

I Grabska, K Szczypiorski - 2014 IEEE Security and Privacy …, 2014 - ieeexplore.ieee.org
This paper contains a description and analysis of a new steganographic method, called
LaTEsteg, designed for LTE (Long Term Evolution) systems. The LaTEsteg uses physical …

[HTML][HTML] Design and Evaluation of Steganographic Channels in Fifth-Generation New Radio

M Walter, J Keller - Future Internet, 2024 - mdpi.com
Mobile communication is ubiquitous in everyday life. The fifth generation of mobile networks
(5G) introduced 5G New Radio as a radio access technology that meets current bandwidth …

[PDF][PDF] Sensing Danger: Exploiting Sensors to Build Covert Channels.

T Ulz, M Feldbacher, TW Pieber, C Steger - ICISSP, 2019 - scitepress.org
Recent incidents have shown that sensor-equipped devices can be used by adversaries to
perform malicious activities, such as spying on end-users or for industrial espionage. In this …

Disrupting and preventing late-packet covert communication using sequence number tracking

F Rezaei, M Hempel, D Peng… - MILCOM 2013-2013 …, 2013 - ieeexplore.ieee.org
Modern covert channel communication is the art of hiding secret information in legitimate
network traffic in a way that cannot normally be detected by anyone other than the intended …

Stealthy protocols: Metrics and open problems

O Chen, C Meadows, G Trivedi - … Dedicated to Andrew William Roscoe on …, 2017 - Springer
This paper is a survey of both methods that could be used to support stealthy communication
over both wired and wireless networks and techniques for evaluating them. By stealthy …