4.5 Article

A comprehensive survey of covert communication techniques, limitations and future challenges

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

MSCCS: A Monero-based security-enhanced covert communication system

Liang Liu et al.

Summary: This paper proposes a Monero-based security-enhanced covert communication system, which overcomes the issues of existing public blockchain-based covert communication systems. By developing a new storage-type covert channel, the system achieves higher robustness, anti-detection, and anonymity, as demonstrated by extensive simulation experiments.

COMPUTER NETWORKS (2022)

Article Automation & Control Systems

A Novel Covert Communication Method Based on Bitcoin Transaction

Xiangyang Luo et al.

Summary: In this article, a covert communication method based on Bitcoin transactions is proposed, which improves the security and embedding efficiency by designing transaction address index matrix and address interaction relationship.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Automation & Control Systems

Covert Communication Over VoIP Streaming Media With Dynamic Key Distribution and Authentication

Jinghui Peng et al.

Summary: The article investigates covert steganographic communications over VoIP, finding that the proposed information-theoretical model is secure against passive attacks. The accumulation-based steganographic algorithm effectively protects steganographic systems from adversary attacks with minimal impact on real-time VoIP communications.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2021)

Article Computer Science, Information Systems

A double steganography model combining blockchain and interplanetary file system

Wei She et al.

Summary: The paper proposed a double steganography model that combines blockchain and IPFS to protect secret information through embedding in images and plain text, creating covert channels in the blockchain network. Experimental results show that the model has high performance in anti-detection and ensures communication concealment.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Article Computer Science, Artificial Intelligence

An approach of covert communication based on the Ethereum whisper protocol in blockchain

Lejun Zhang et al.

Summary: The paper introduces a covert communication method based on the Whisper protocol, which stores information through payloads and matches secret messages, while recording indices in the padding field. Simulating default filling rules of the protocol, the method aims to enhance communication concealment. Experimental results confirm the new model's anti-interference, antitampering, and antidetection capabilities, demonstrating increased information capacity and reduced transmission time compared to traditional methods.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Article Computer Science, Information Systems

Covert communication integrates into wavelet packet transform OFDM system over Rayleigh fading channel

Sanjeev Kumar et al.

WIRELESS NETWORKS (2020)

Article Computer Science, Hardware & Architecture

Achieving a Covert Channel over an Open Blockchain Network

Feng Gao et al.

IEEE NETWORK (2020)

Article Engineering, Electrical & Electronic

Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens

Moslem Forouzesh et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Covert timing channel detection method based on time interval and payload length analysis

Jiaxuan Han et al.

COMPUTERS & SECURITY (2020)

Review Computer Science, Information Systems

A Survey of Key Technologies for Constructing Network Covert Channel

Jing Tian et al.

SECURITY AND COMMUNICATION NETWORKS (2020)

Article Computer Science, Hardware & Architecture

Intelligent Reflecting Surface Enabled Covert Communications in Wireless Networks

Xiao Lu et al.

IEEE NETWORK (2020)

Article Computer Science, Hardware & Architecture

Covert Communication via the QR Code Image by a Data Hiding Technique Based on Module Shape Adjustments

Da-Chun Wu et al.

IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY (2020)

Proceedings Paper Computer Science, Theory & Methods

Keyless Covert Communication in the Presence of Channel State Information

Hassan ZivariFard et al.

2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) (2020)

Article Computer Science, Information Systems

Covert Communication in Downlink NOMA Systems With Random Transmit Power

Liwei Tao et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2020)

Article Computer Science, Information Systems

Mimicking Ship-Radiated Noise With Chaos Signal for Covert Underwater Acoustic Communication

Shuhua Huang et al.

IEEE ACCESS (2020)

Article Engineering, Electrical & Electronic

Multi-Antenna Covert Communications in Random Wireless Networks

Tong-Xing Zheng et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2019)

Article Computer Science, Information Systems

ZombieCoin 2.0: managing next-generation botnets using Bitcoin

Syed Taha Ali et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2018)

Article Computer Science, Theory & Methods

Image steganography using uncorrelated color space and its application for security of visual contents in online social networks

Khan Muhammad et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain

Ahmed Hussain Ali et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Engineering, Electrical & Electronic

Image steganography in spatial domain: A survey

Mehdi Hussain et al.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2018)

Article Engineering, Electrical & Electronic

Covert Wireless Communication With Artificial Noise Generation

Ramin Soltani et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Article Computer Science, Information Systems

AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media

Milad Taleby Ahvanooey et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Provably Secure Covert Communication on Blockchain

Juha Partala

CRYPTOGRAPHY (2018)

Article Computer Science, Information Systems

CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method

Khan Muhammad et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

Compressed and raw video steganography techniques: a comprehensive survey and analysis

Ramadhan J. Mstafa et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Hardware & Architecture

Efficient Reversible Data Hiding Using Multiple Predictors

Iyad F. Jafar et al.

COMPUTER JOURNAL (2016)

Article Computer Science, Information Systems

A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image

Khan Muhammad et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

A new data hiding method based on chaos embedded genetic algorithm for color image

Sengul Dogan

ARTIFICIAL INTELLIGENCE REVIEW (2016)

News Item Computer Science, Hardware & Architecture

Blockchain Beyond Bitcoin

Sarah Underwood

COMMUNICATIONS OF THE ACM (2016)

Article Computer Science, Theory & Methods

Content-Adaptive Steganography by Minimizing Statistical Detectability

Vahid Sedighi et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

A novel edge based image steganography with 2k correction and Huffman encoding

Shuliang Sun

INFORMATION PROCESSING LETTERS (2016)

Article Computer Science, Artificial Intelligence

A novel algorithm for colour image steganography using a new intelligent technique based on three phases

Nameer N. El-Emam et al.

APPLIED SOFT COMPUTING (2015)

Article Engineering, Electrical & Electronic

Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication

Boulat A. Bash et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Engineering, Electrical & Electronic

Achieving Undetectable Communication

Seonwoo Lee et al.

IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2015)

Article Computer Science, Information Systems

Reversible data hiding based on local histogram shifting with multilayer embedding

Zhibin Pan et al.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2015)

Article Engineering, Electrical & Electronic

A New Information Hiding Method Based on Improved BPCS Steganography

Shuliang Sun

ADVANCES IN MULTIMEDIA (2015)

Article Computer Science, Information Systems

Massive MIMO Systems With Non-Ideal Hardware: Energy Efficiency, Estimation, and Capacity Limits

Emil Bjornson et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2014)

Article Computer Science, Information Systems

Secret sharing with multi-cover adaptive steganography

Hai-Dong Yuan

INFORMATION SCIENCES (2014)

Article Computer Science, Information Systems

Data hiding using edge detector for scalable images

Ki-Hyun Jung et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2014)

Article Computer Science, Information Systems

High payload image steganography with reduced distortion using octonary pixel pairing scheme

C. Balasubramanian et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2014)

Article Engineering, Electrical & Electronic

A Primer on Hardware Security: Models, Methods, and Metrics

Masoud Rostami et al.

PROCEEDINGS OF THE IEEE (2014)

Article Engineering, Electrical & Electronic

A PVD-based data hiding method with histogram preserving using pixel pair matching

Jeanne Chen

SIGNAL PROCESSING-IMAGE COMMUNICATION (2014)

Article Computer Science, Artificial Intelligence

Data Hiding Based on Improved Exploiting Modification Direction Method and Huffman Coding

Ali Ahmad et al.

JOURNAL OF INTELLIGENT SYSTEMS (2014)

Article Computer Science, Information Systems

Covert communications through network configuration messages

Ruben Rios et al.

COMPUTERS & SECURITY (2013)

Article Computer Science, Information Systems

Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique

Wien Hong

INFORMATION SCIENCES (2013)

Article Computer Science, Information Systems

Unified phase and magnitude speech spectra data hiding algorithm

Fatiha Djebbar et al.

SECURITY AND COMMUNICATION NETWORKS (2013)

Proceedings Paper Computer Science, Artificial Intelligence

A Novel Approach for Text Steganography: Generating Text Summary using Reflection Symmetry

Anandaprova Majumder et al.

FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013 (2013)

Article Computer Science, Information Systems

An Efficient Embedder for BCH Coding for Steganography

Rongyue Zhang et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2012)

Article Computer Science, Information Systems

LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis

Der-Chyuan Lou et al.

INFORMATION SCIENCES (2012)

Article Computer Science, Information Systems

An intelligent chaotic embedding approach to enhance stego-image quality

Rengarajan Amirtharajan et al.

INFORMATION SCIENCES (2012)

Review Acoustics

Comparative study of digital audio steganography techniques

Fatiha Djebbar et al.

EURASIP JOURNAL ON AUDIO SPEECH AND MUSIC PROCESSING (2012)

Article Computer Science, Theory & Methods

Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec

Yong Feng Huang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Computer Science, Hardware & Architecture

Reversible image steganographic scheme via predictive coding

Hsien-Chu Wu et al.

DISPLAYS (2010)

Article Computer Science, Theory & Methods

Edge Adaptive Image Steganography Based on LSB Matching Revisited

Weiqi Luo et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)

Article Computer Science, Software Engineering

Reversible data hiding for high quality images using modification of prediction errors

Wien Hong et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2009)

Article Telecommunications

Efficient steganographic embedding by exploiting modification direction

Xinpeng Zhang et al.

IEEE COMMUNICATIONS LETTERS (2006)

Article Engineering, Electrical & Electronic

High-payload image steganography using two-way block matching

RZ Wang et al.

IEEE SIGNAL PROCESSING LETTERS (2006)

Article Engineering, Electrical & Electronic

Steganalysis of LSB matching in grayscale images

AD Ker

IEEE SIGNAL PROCESSING LETTERS (2005)

Article Computer Science, Artificial Intelligence

Hiding secret data in images via predictive coding

YH Yu et al.

PATTERN RECOGNITION (2005)

Article Computer Science, Artificial Intelligence

Hiding data in images by simple LSB substitution

CK Chan et al.

PATTERN RECOGNITION (2004)

Article Computer Science, Information Systems

Secure space-time communication

AO Hero

IEEE TRANSACTIONS ON INFORMATION THEORY (2003)

Article Computer Science, Artificial Intelligence

A steganographic method for images by pixel-value differencing

DC Wu et al.

PATTERN RECOGNITION LETTERS (2003)

Article Computer Science, Artificial Intelligence

BPCS steganography using EZW lossy compressed images

J Spaulding et al.

PATTERN RECOGNITION LETTERS (2002)

Article Engineering, Electrical & Electronic

Reliable information bit hiding

JW Huang et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2002)