Trends and challenges in network covert channels countermeasures
L Caviglione - Applied Sciences, 2021 - mdpi.com
Network covert channels are increasingly used to endow malware with stealthy behaviors,
for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner …
for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner …
Digital audio steganography: Systematic review, classification, and analysis of the current state of the art
Audio steganography is the process of hiding a message inside an audio container. This
study aims to present a systematic review of audio steganography methods. Existing reviews …
study aims to present a systematic review of audio steganography methods. Existing reviews …
[图书][B] Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures
Describes Information Hiding in communication networks, and highlights their important
issues, challenges, trends, and applications. Highlights development trends and potential …
issues, challenges, trends, and applications. Highlights development trends and potential …
VoIP steganography and its detection—a survey
W Mazurczyk - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Steganography is an ancient art that encompasses various techniques of information hiding,
the aim of which is to embed secret information into a carrier message. Steganographic …
the aim of which is to embed secret information into a carrier message. Steganographic …
Steganography and steganalysis in voice over IP: A review
Z Wu, J Guo, C Zhang, C Li - Sensors, 2021 - mdpi.com
The rapid advance and popularization of VoIP (Voice over IP) has also brought security
issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the …
issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the …
VoIP network covert channels to enhance privacy and information sharing
J Saenger, W Mazurczyk, J Keller… - Future Generation …, 2020 - Elsevier
Abstract Information hiding is increasingly used to implement covert channels, to exfiltrate
data or to perform attacks in a stealthy manner. Another important usage deals with privacy …
data or to perform attacks in a stealthy manner. Another important usage deals with privacy …
Audio steganalysis using deep belief networks
C Paulin, SA Selouani, E Hervet - International Journal of Speech …, 2016 - Springer
This paper presents a new steganalysis method that uses a deep belief network (DBN) as a
classifier for audio files. It has been tested on three steganographic techniques: StegHide …
classifier for audio files. It has been tested on three steganographic techniques: StegHide …
Pitch and fourier magnitude based steganography for hiding 2.4 kbps melp bitstream
In this study, the authors present a new steganographic technique called random least
significant bits of pitch and Fourier magnitude steganography (RLPFS). It is based on hiding …
significant bits of pitch and Fourier magnitude steganography (RLPFS). It is based on hiding …
Hiding information into voice-over-IP streams using adaptive bitrate modulation
Information hiding based on bitrate switching is a novel steganographic scheme for voice
over IP, which can resist traditional steganalysis methods. However, the state-of-the-art …
over IP, which can resist traditional steganalysis methods. However, the state-of-the-art …
Pitch‐based steganography for Speex voice codec
A Janicki - Security and communication networks, 2016 - Wiley Online Library
This paper presents an improved version of a steganographic algorithm for IP telephony
called HideF0. It is based on approximating the F0 parameter, which is responsible for …
called HideF0. It is based on approximating the F0 parameter, which is responsible for …