相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。MSCCS: A Monero-based security-enhanced covert communication system
Liang Liu et al.
COMPUTER NETWORKS (2022)
A Novel Covert Communication Method Based on Bitcoin Transaction
Xiangyang Luo et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)
Covert Communication Over VoIP Streaming Media With Dynamic Key Distribution and Authentication
Jinghui Peng et al.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2021)
A double steganography model combining blockchain and interplanetary file system
Wei She et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)
An approach of covert communication based on the Ethereum whisper protocol in blockchain
Lejun Zhang et al.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)
Covert communication integrates into wavelet packet transform OFDM system over Rayleigh fading channel
Sanjeev Kumar et al.
WIRELESS NETWORKS (2020)
Achieving a Covert Channel over an Open Blockchain Network
Feng Gao et al.
IEEE NETWORK (2020)
Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens
Moslem Forouzesh et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2020)
Covert timing channel detection method based on time interval and payload length analysis
Jiaxuan Han et al.
COMPUTERS & SECURITY (2020)
A Survey of Key Technologies for Constructing Network Covert Channel
Jing Tian et al.
SECURITY AND COMMUNICATION NETWORKS (2020)
Intelligent Reflecting Surface Enabled Covert Communications in Wireless Networks
Xiao Lu et al.
IEEE NETWORK (2020)
Covert Communication via the QR Code Image by a Data Hiding Technique Based on Module Shape Adjustments
Da-Chun Wu et al.
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY (2020)
Keyless Covert Communication in the Presence of Channel State Information
Hassan ZivariFard et al.
2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) (2020)
Covert Communication in Downlink NOMA Systems With Random Transmit Power
Liwei Tao et al.
IEEE WIRELESS COMMUNICATIONS LETTERS (2020)
Mimicking Ship-Radiated Noise With Chaos Signal for Covert Underwater Acoustic Communication
Shuhua Huang et al.
IEEE ACCESS (2020)
Multi-Antenna Covert Communications in Random Wireless Networks
Tong-Xing Zheng et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2019)
ZombieCoin 2.0: managing next-generation botnets using Bitcoin
Syed Taha Ali et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2018)
Image steganography using uncorrelated color space and its application for security of visual contents in online social networks
Khan Muhammad et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain
Ahmed Hussain Ali et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2018)
Image steganography in spatial domain: A survey
Mehdi Hussain et al.
SIGNAL PROCESSING-IMAGE COMMUNICATION (2018)
Covert Wireless Communication With Artificial Noise Generation
Ramin Soltani et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)
AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media
Milad Taleby Ahvanooey et al.
IEEE ACCESS (2018)
Provably Secure Covert Communication on Blockchain
Juha Partala
CRYPTOGRAPHY (2018)
CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
Khan Muhammad et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2017)
Compressed and raw video steganography techniques: a comprehensive survey and analysis
Ramadhan J. Mstafa et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2017)
Efficient Reversible Data Hiding Using Multiple Predictors
Iyad F. Jafar et al.
COMPUTER JOURNAL (2016)
A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image
Khan Muhammad et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2016)
A new data hiding method based on chaos embedded genetic algorithm for color image
Sengul Dogan
ARTIFICIAL INTELLIGENCE REVIEW (2016)
Blockchain Beyond Bitcoin
Sarah Underwood
COMMUNICATIONS OF THE ACM (2016)
Content-Adaptive Steganography by Minimizing Statistical Detectability
Vahid Sedighi et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
A novel edge based image steganography with 2k correction and Huffman encoding
Shuliang Sun
INFORMATION PROCESSING LETTERS (2016)
Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy
Khan Muhammad et al.
JOURNAL OF MEDICAL SYSTEMS (2016)
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images
Mehdi Hussain et al.
SYMMETRY-BASEL (2016)
A novel algorithm for colour image steganography using a new intelligent technique based on three phases
Nameer N. El-Emam et al.
APPLIED SOFT COMPUTING (2015)
Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication
Boulat A. Bash et al.
IEEE COMMUNICATIONS MAGAZINE (2015)
Achieving Undetectable Communication
Seonwoo Lee et al.
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2015)
Reversible data hiding based on local histogram shifting with multilayer embedding
Zhibin Pan et al.
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2015)
An image information hiding using adaptation and radix
Mingwei Tang et al.
OPTIK (2015)
A New Information Hiding Method Based on Improved BPCS Steganography
Shuliang Sun
ADVANCES IN MULTIMEDIA (2015)
Massive MIMO Systems With Non-Ideal Hardware: Energy Efficiency, Estimation, and Capacity Limits
Emil Bjornson et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2014)
Secret sharing with multi-cover adaptive steganography
Hai-Dong Yuan
INFORMATION SCIENCES (2014)
Data hiding using edge detector for scalable images
Ki-Hyun Jung et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2014)
High payload image steganography with reduced distortion using octonary pixel pairing scheme
C. Balasubramanian et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2014)
A Primer on Hardware Security: Models, Methods, and Metrics
Masoud Rostami et al.
PROCEEDINGS OF THE IEEE (2014)
A PVD-based data hiding method with histogram preserving using pixel pair matching
Jeanne Chen
SIGNAL PROCESSING-IMAGE COMMUNICATION (2014)
Data Hiding Based on Improved Exploiting Modification Direction Method and Huffman Coding
Ali Ahmad et al.
JOURNAL OF INTELLIGENT SYSTEMS (2014)
Covert communications through network configuration messages
Ruben Rios et al.
COMPUTERS & SECURITY (2013)
Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique
Wien Hong
INFORMATION SCIENCES (2013)
Unified phase and magnitude speech spectra data hiding algorithm
Fatiha Djebbar et al.
SECURITY AND COMMUNICATION NETWORKS (2013)
A Novel Approach for Text Steganography: Generating Text Summary using Reflection Symmetry
Anandaprova Majumder et al.
FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013 (2013)
An Efficient Embedder for BCH Coding for Steganography
Rongyue Zhang et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2012)
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis
Der-Chyuan Lou et al.
INFORMATION SCIENCES (2012)
An intelligent chaotic embedding approach to enhance stego-image quality
Rengarajan Amirtharajan et al.
INFORMATION SCIENCES (2012)
Comparative study of digital audio steganography techniques
Fatiha Djebbar et al.
EURASIP JOURNAL ON AUDIO SPEECH AND MUSIC PROCESSING (2012)
Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec
Yong Feng Huang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)
Reversible image steganographic scheme via predictive coding
Hsien-Chu Wu et al.
DISPLAYS (2010)
Edge Adaptive Image Steganography Based on LSB Matching Revisited
Weiqi Luo et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)
Reversible data hiding for high quality images using modification of prediction errors
Wien Hong et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2009)
Efficient steganographic embedding by exploiting modification direction
Xinpeng Zhang et al.
IEEE COMMUNICATIONS LETTERS (2006)
High-payload image steganography using two-way block matching
RZ Wang et al.
IEEE SIGNAL PROCESSING LETTERS (2006)
Steganalysis of LSB matching in grayscale images
AD Ker
IEEE SIGNAL PROCESSING LETTERS (2005)
Hiding secret data in images via predictive coding
YH Yu et al.
PATTERN RECOGNITION (2005)
Hiding data in images by simple LSB substitution
CK Chan et al.
PATTERN RECOGNITION (2004)
Secure space-time communication
AO Hero
IEEE TRANSACTIONS ON INFORMATION THEORY (2003)
A steganographic method for images by pixel-value differencing
DC Wu et al.
PATTERN RECOGNITION LETTERS (2003)
BPCS steganography using EZW lossy compressed images
J Spaulding et al.
PATTERN RECOGNITION LETTERS (2002)
Reliable information bit hiding
JW Huang et al.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2002)