A Comprehensive Survey of Covert Communication Techniques, Limitations and Future Challenges
Published 2022 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A Comprehensive Survey of Covert Communication Techniques, Limitations and Future Challenges
Authors
Keywords
Covert communication, Hidden messages, Data hiding, Data encapsulation
Journal
COMPUTERS & SECURITY
Volume -, Issue -, Pages 102784
Publisher
Elsevier BV
Online
2022-06-02
DOI
10.1016/j.cose.2022.102784
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- MSCCS: A Monero-based security-enhanced covert communication system
- (2022) Liang Liu et al. Computer Networks
- A double steganography model combining blockchain and interplanetary file system
- (2021) Wei She et al. Peer-to-Peer Networking and Applications
- A Novel Covert Communication Method Based on Bitcoin Transaction
- (2021) Luo Xiangyang et al. IEEE Transactions on Industrial Informatics
- Achieving a Covert Channel over an Open Blockchain Network
- (2020) Feng Gao et al. IEEE NETWORK
- Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens
- (2020) Moslem Forouzesh et al. IEEE TRANSACTIONS ON COMMUNICATIONS
- A Survey of Key Technologies for Constructing Network Covert Channel
- (2020) Jing Tian et al. Security and Communication Networks
- Covert timing channel detection method based on time interval and payload length analysis
- (2020) Jiaxuan Han et al. COMPUTERS & SECURITY
- Intelligent Reflecting Surface Enabled Covert Communications in Wireless Networks
- (2020) Xiao Lu et al. IEEE NETWORK
- Chain-Based Covert Data Embedding Schemes in Blockchain
- (2020) Haotian Cao et al. IEEE Internet of Things Journal
- Multi-Antenna Covert Communications in Random Wireless Networks
- (2019) Tong-Xing Zheng et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- Image steganography using uncorrelated color space and its application for security of visual contents in online social networks
- (2018) Khan Muhammad et al. Future Generation Computer Systems-The International Journal of eScience
- High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain
- (2018) Ahmed Hussain Ali et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Covert communication integrates into wavelet packet transform OFDM system over Rayleigh fading channel
- (2018) Sanjeev Kumar et al. WIRELESS NETWORKS
- Covert Wireless Communication with Artificial Noise Generation
- (2018) Ramin Soltani et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media
- (2018) Milad Taleby Ahvanooey et al. IEEE Access
- ZombieCoin 2.0: managing next-generation botnets using Bitcoin
- (2017) Syed Taha Ali et al. International Journal of Information Security
- A new data hiding method based on chaos embedded genetic algorithm for color image
- (2016) Şengül Doğan ARTIFICIAL INTELLIGENCE REVIEW
- Blockchain beyond bitcoin
- (2016) Sarah Underwood COMMUNICATIONS OF THE ACM
- Content-Adaptive Steganography by Minimizing Statistical Detectability
- (2016) Vahid Sedighi et al. IEEE Transactions on Information Forensics and Security
- A novel edge based image steganography with 2 k correction and Huffman encoding
- (2016) Shuliang Sun INFORMATION PROCESSING LETTERS
- Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy
- (2016) Khan Muhammad et al. JOURNAL OF MEDICAL SYSTEMS
- CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
- (2016) Khan Muhammad et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Compressed and raw video steganography techniques: a comprehensive survey and analysis
- (2016) Ramadhan J. Mstafa et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images
- (2016) Mehdi Hussain et al. Symmetry-Basel
- A novel algorithm for colour image steganography using a new intelligent technique based on three phases
- (2015) Nameer N. El-Emam et al. APPLIED SOFT COMPUTING
- Efficient Reversible Data Hiding Using Multiple Predictors
- (2015) Iyad F. Jafar et al. COMPUTER JOURNAL
- Hiding information in noise: fundamental limits of covert wireless communication
- (2015) Boulat A. Bash et al. IEEE COMMUNICATIONS MAGAZINE
- Achieving Undetectable Communication
- (2015) Seonwoo Lee et al. IEEE Journal of Selected Topics in Signal Processing
- Reversible data hiding based on local histogram shifting with multilayer embedding
- (2015) Zhibin Pan et al. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION
- A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image
- (2015) Khan Muhammad et al. MULTIMEDIA TOOLS AND APPLICATIONS
- An image information hiding using adaptation and radix
- (2015) Mingwei Tang et al. OPTIK
- Massive MIMO Systems With Non-Ideal Hardware: Energy Efficiency, Estimation, and Capacity Limits
- (2014) Emil Bjornson et al. IEEE TRANSACTIONS ON INFORMATION THEORY
- A Primer on Hardware Security: Models, Methods, and Metrics
- (2014) Masoud Rostami et al. PROCEEDINGS OF THE IEEE
- Covert communications through network configuration messages
- (2013) Ruben Rios et al. COMPUTERS & SECURITY
- Secret sharing with multi-cover adaptive steganography
- (2013) Hai-Dong Yuan INFORMATION SCIENCES
- High payload image steganography with reduced distortion using octonary pixel pairing scheme
- (2013) C. Balasubramanian et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Unified phase and magnitude speech spectra data hiding algorithm
- (2013) Fatiha Djebbar et al. Security and Communication Networks
- An Efficient Embedder for BCH Coding for Steganography
- (2012) Rongyue Zhang et al. IEEE TRANSACTIONS ON INFORMATION THEORY
- An intelligent chaotic embedding approach to enhance stego-image quality
- (2012) Rengarajan Amirtharajan et al. INFORMATION SCIENCES
- Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique
- (2012) Wien Hong INFORMATION SCIENCES
- Data hiding using edge detector for scalable images
- (2012) Ki-Hyun Jung et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Comparative study of digital audio steganography techniques
- (2012) Fatiha Djebbar et al. EURASIP Journal on Audio Speech and Music Processing
- Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec
- (2011) Yong Feng Huang et al. IEEE Transactions on Information Forensics and Security
- LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis
- (2011) Der-Chyuan Lou et al. INFORMATION SCIENCES
- Edge Adaptive Image Steganography Based on LSB Matching Revisited
- (2010) Weiqi Luo et al. IEEE Transactions on Information Forensics and Security
- Reversible image steganographic scheme via predictive coding
- (2009) Hsien-Chu Wu et al. DISPLAYS
- Reversible data hiding for high quality images using modification of prediction errors
- (2009) Wien Hong et al. JOURNAL OF SYSTEMS AND SOFTWARE
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now