1. Bedi, P., Dua, A.: Network steganography using the overflow field of timestamp option in an IPv4 packet (2020)
2. Lubacz, J., Mazurczyk, W., Szczypiorki, K.: Principles and overview of network steganography. IEEE Commun. Mag. 0163–6804/14/$25.00 © 2014 IEEE (2014)
3. Edureka.co, Available at https://www.edureka.co/blog/wp-content/uploads/2019/01/SteganogarphyModel-528x259.png (2021)
4. Ahsan, K.: Covert channel analysis and data hiding in TCP/IP, Master thesis. University of Toronto (2002)
5. Almohammedi, A.A., Shepelev, V.: Saturation Throughput analysis of steganography in the IEEE 802.11p protocol in the presence of non-ideal transmission channel. IEEE Access 9, 14459–14469 (2021)