4.5 Article

A comprehensive survey of covert communication techniques, limitations and future challenges

Journal

COMPUTERS & SECURITY
Volume 120, Issue -, Pages -

Publisher

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2022.102784

Keywords

Covert communication; Hidden messages; Data hiding; Data encapsulation

Ask authors/readers for more resources

Data encryption aims to protect data confidentiality during storage, transmission, and processing, but it may not always be the best choice as attackers can exploit weaknesses in encryption algorithms for decryption. Users of proprietary applications are vulnerable to security and privacy threats due to reliance on vendor security measures. Covert communication techniques achieve security through hidden communication channels and have seen significant advancements, but existing literature does not cover all aspects comprehensively.
Data encryption aims to protect the confidentiality of data at storage, during transmission, or while in processing. However, it is not always the optimum choice as attackers know the existence of the ciphertext. Hence, they can exploit various weaknesses in the implementation of encryption algorithms and can thus decrypt or guess the related cryptographic primitives. Moreover, in the case of proprietary applications such as online social networks, users are at the mercy of the vendor's security measures. Therefore, users are vulnerable to various security and privacy threats. Contrary to this, covert communication techniques hide the existence of communication and thus achieve security through obscurity and hidden communication channels. Over the period, there has been a significant advancement in this field. However, existing literature fails to encompass all the aspects of covert communications in a single document. This survey thus endeavors to highlight the latest trends in covert communication techniques, related challenges, and future directions. (c) 2022 Published by Elsevier Ltd.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available