Users of computer systems may often require the private transfer of messages/communications between parties across a network. Information warfare and the protection and dominance of information in the military context is a prime example of an application area in which the confidentiality of data needs to be maintained. The safe transportation of critical data is therefore often a vital requirement for many private communications. However, unwanted interception/sniffing of communications is also a possibility. An elementary stealthy transfer scheme is therefore proposed by the authors. This scheme makes use of encoding, splitting of a message and the use of a hashing algorithm to verify the correctness of the reconstructed message. For this ...
Covert channels enable stealthy communications over innocent appearing carriers. They are increasing...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
This paper presents a covert communication channel that exists in virtually all forms of packet swit...
Users of computer systems may often require the private transfer of messages/communications between ...
Abstract: This paper presents a novel encryption-less algorithm to enhance security in transmission ...
The desire to transmit messages securely is not new. For centuries, community kept communication in ...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Includes bibliographical references (pages 29-30).Covert channels encompass a group of methods desig...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
An encryption/decryption approach is proposed dedicated to one-way communication between a transmitt...
In general secure data transfer between two communicating parties is done using several encryption a...
[[abstract]]A new approach to hiding secret binary images behind noise images for covert communicati...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Steganography is the efficient technique to provide secure data transmission over the network, as th...
Covert channels enable stealthy communications over innocent appearing carriers. They are increasing...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
This paper presents a covert communication channel that exists in virtually all forms of packet swit...
Users of computer systems may often require the private transfer of messages/communications between ...
Abstract: This paper presents a novel encryption-less algorithm to enhance security in transmission ...
The desire to transmit messages securely is not new. For centuries, community kept communication in ...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Includes bibliographical references (pages 29-30).Covert channels encompass a group of methods desig...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
An encryption/decryption approach is proposed dedicated to one-way communication between a transmitt...
In general secure data transfer between two communicating parties is done using several encryption a...
[[abstract]]A new approach to hiding secret binary images behind noise images for covert communicati...
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Steganography is the efficient technique to provide secure data transmission over the network, as th...
Covert channels enable stealthy communications over innocent appearing carriers. They are increasing...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
This paper presents a covert communication channel that exists in virtually all forms of packet swit...