Trends and challenges in network covert channels countermeasures

L Caviglione - Applied Sciences, 2021 - mdpi.com
Network covert channels are increasingly used to endow malware with stealthy behaviors,
for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner …

Digital audio steganography: Systematic review, classification, and analysis of the current state of the art

AA AlSabhany, AH Ali, F Ridzuan, AH Azni… - Computer Science …, 2020 - Elsevier
Audio steganography is the process of hiding a message inside an audio container. This
study aims to present a systematic review of audio steganography methods. Existing reviews …

[图书][B] Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures

W Mazurczyk, S Wendzel, S Zander, A Houmansadr… - 2016 - books.google.com
Describes Information Hiding in communication networks, and highlights their important
issues, challenges, trends, and applications. Highlights development trends and potential …

VoIP steganography and its detection—a survey

W Mazurczyk - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Steganography is an ancient art that encompasses various techniques of information hiding,
the aim of which is to embed secret information into a carrier message. Steganographic …

Steganography and steganalysis in voice over IP: A review

Z Wu, J Guo, C Zhang, C Li - Sensors, 2021 - mdpi.com
The rapid advance and popularization of VoIP (Voice over IP) has also brought security
issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the …

VoIP network covert channels to enhance privacy and information sharing

J Saenger, W Mazurczyk, J Keller… - Future Generation …, 2020 - Elsevier
Abstract Information hiding is increasingly used to implement covert channels, to exfiltrate
data or to perform attacks in a stealthy manner. Another important usage deals with privacy …

Audio steganalysis using deep belief networks

C Paulin, SA Selouani, E Hervet - International Journal of Speech …, 2016 - Springer
This paper presents a new steganalysis method that uses a deep belief network (DBN) as a
classifier for audio files. It has been tested on three steganographic techniques: StegHide …

Pitch and fourier magnitude based steganography for hiding 2.4 kbps melp bitstream

H Kheddar, M Bouzid, D Megías - IET Signal Processing, 2019 - Wiley Online Library
In this study, the authors present a new steganographic technique called random least
significant bits of pitch and Fourier magnitude steganography (RLPFS). It is based on hiding …

Hiding information into voice-over-IP streams using adaptive bitrate modulation

H Tian, J Sun, CC Chang, J Qin… - IEEE Communications …, 2017 - ieeexplore.ieee.org
Information hiding based on bitrate switching is a novel steganographic scheme for voice
over IP, which can resist traditional steganalysis methods. However, the state-of-the-art …

Pitch‐based steganography for Speex voice codec

A Janicki - Security and communication networks, 2016 - Wiley Online Library
This paper presents an improved version of a steganographic algorithm for IP telephony
called HideF0. It is based on approximating the F0 parameter, which is responsible for …