Author:
Mazurczyk Wojciech,Smolarczyk Miłosz,Szczypiorski Krzysztof
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference20 articles.
1. Berk V, Giani A, Cybenko G (2005) Detection of covert channel encoding in network packet delays. Tech. Rep. TR2005-536, Department of Computer Science, Dartmouth College, URL: http://www.ists.dartmouth.edu/library/149.pdf
2. Chen B, Wornell G (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Info Theory 47(4):1423–1443
3. Chen C, Mangrulkar M, Ramos N, Sarkar M (2001) Trends in TCP/IP retransmissions and resets. Technical Report. http://www-cse.ucsd.edu/classes/wi01/cse222/projects/reports/tcp-flags-13.pdf
4. Cox I, Kilian J, Leighton F, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
5. Fisk G, Fisk M, Papadopoulos C, Neil J (2002) Eliminating steganography in Internet traffic with active wardens, 5th International Workshop on Information Hiding. Lect Notes Comput Sci 2578:18–35
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Leveraging Linear Network Error Correction for steganographic network codes;Journal of the Franklin Institute;2024-09
2. RSTEG in TCP Protocol: A Novel Approach in Information Hiding;2024 2nd International Conference on Networking and Communications (ICNWC);2024-04-02
3. A model for evaluating the robustness of network covert channels based on entropy TOPSIS method;Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy;2024-03
4. Network Steganography Based on Error Correction Code;2023 Dynamics of Systems, Mechanisms and Machines (Dynamics);2023-11-14
5. FIHIM: a framework for information hiding in IPv6 using micro-protocols;International Journal of Information Technology;2023-10-04