This work studies stegocodes (data-hiding codes) for covert communication over timing channels. In a timing channel, the information resides in the packet interdeparture times as opposed to the packets themselves. The en- coding procedure should preserve the statistics of the packet interarrival process. Our steganographic codes are based on two novel ideas, namely, queue- based codes and Shannon's encoding functions for channels with causal side information at the transmitter. The embedding of information bits is done by a Geo/Geo/1 queue servicing the interarrival times. Shannon's theory of coding with causal side information at the transmitter is then used to study the queue-based stegocodes and their information-theoretic limits....
A single server queue can be viewed as a communication channel where information is encoded into the...
We present the first information-theoretic steganographic protocol with an asymptotically optimal ra...
We present the first information-theoretic steganographic protocol with an asymptotically optimal ra...
This work studies stegocodes (data-hiding codes) for covert communication over timing channels. In a...
This paper describes steganographic timing channels that use cryptographic primitives to hide the pr...
This paper describes steganographic timing channels that use cryptographic primitives to hide the pr...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
In this paper, we introduce a covert timing channel (CTC) algorithm and compare it to one of the mos...
Abstract. In this paper we focus on estimating the amount of information that can be embedded in the...
This report introduces a coding theory for queueing channels and discusses a practical capacity-appr...
This dissertation focuses on covert communication in channels where the communication takes place by...
Abstract—This paper focuses on jammed timing channels. Pure delay jammers with a maximum delay const...
Covert channels aim to hide the existence of communication. Recently proposed packet-timing channels...
Covert channels aim to hide the existence of communication. Recently proposed packet-timing channels...
The problems studied in this thesis fall within two different topics in network information theory. ...
A single server queue can be viewed as a communication channel where information is encoded into the...
We present the first information-theoretic steganographic protocol with an asymptotically optimal ra...
We present the first information-theoretic steganographic protocol with an asymptotically optimal ra...
This work studies stegocodes (data-hiding codes) for covert communication over timing channels. In a...
This paper describes steganographic timing channels that use cryptographic primitives to hide the pr...
This paper describes steganographic timing channels that use cryptographic primitives to hide the pr...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
In this paper, we introduce a covert timing channel (CTC) algorithm and compare it to one of the mos...
Abstract. In this paper we focus on estimating the amount of information that can be embedded in the...
This report introduces a coding theory for queueing channels and discusses a practical capacity-appr...
This dissertation focuses on covert communication in channels where the communication takes place by...
Abstract—This paper focuses on jammed timing channels. Pure delay jammers with a maximum delay const...
Covert channels aim to hide the existence of communication. Recently proposed packet-timing channels...
Covert channels aim to hide the existence of communication. Recently proposed packet-timing channels...
The problems studied in this thesis fall within two different topics in network information theory. ...
A single server queue can be viewed as a communication channel where information is encoded into the...
We present the first information-theoretic steganographic protocol with an asymptotically optimal ra...
We present the first information-theoretic steganographic protocol with an asymptotically optimal ra...