Optimal Covert Communication Techniques

نویسندگان

چکیده

Due to advancements in hacking and reverse engineering tools, threat against transfer of sensitive data or highly classified information is always at risk being intercepted by an attacker. Covert communication outwits this malicious breach privacy act better than cryptography as it camouflages secret inside another innocent looking information, while shows scrambled that might arouse attention However, the challenges Steganography are modification carrier causes some abnormalities, which detectable often methods not optimized. This paper presents approach Chanel, utilizes mathematical concept combination optimize time transmission using sets multiple transmitters, receivers addresses where each abstractly represents a set bits characters without modifying address. To minimize number physical address for use, permutation virtual generation from introduce. The addition technique like relationship their application both re-enforcing resistivity Steganalysis generating combinations. Furthermore, dynamical clockwise anti-clockwise rotation over after every introduced improve on Steganalysis. A simple test was performed demonstrating relay address, concepts. Based results analysis, method effective expected quite easy use can be implemented different platforms much difficulties.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Covert Communication Techniques in the Digital World

The boom of covert communication coincides with the appearance and growth of the Internet. The rapid spread of computer networks and shift to digitization of media has created a very favourable environment for covert communication. In this paper, some Covert communication techniques have been described. Covert or secure communication includes methods such as cryptography, steganography and wate...

متن کامل

Study on Airspace Covert Communication Algorithm of Covert Communication System

Based on the security of information transmission through network in the information society, the paper puts forward covert communication technology which is more reliable than the prior encryption algorithm, analyzes channel covertness and information hiding of covert communication technology based on spread-spectrum communication technology, and establishes a covert communication system inclu...

متن کامل

Covert Communication through Executables

This paper explores the potential of executables for covert communication. Three techniques for the embedding of secret information are presented. Possible attacks on the stealthiness of these techniques are identified and countered. The presented concepts are implemented and evaluated for the IA32 architecture, for which we obtain an encoding rate of 1/27 before countermeasures and 1/89 after ...

متن کامل

Behavioral Mimicry Covert Communication

Covert communication refers to the process of communicating data through a channel that is neither designed, nor intended to transfer information. Traditionally, covert channels are considered as security threats in computer systems and a great deal of attention has been given to countermeasures for covert communication schemes. The evolution of computer networks led the communication community...

متن کامل

Covert Optical Communication

Boulat A. Bash, Andrei H. Gheorghe, Monika Patel, Jonathan L. Habif, Dennis Goeckel, Don Towsley, and Saikat Guha School of Computer Science, University of Massachusetts, Amherst, Massachusetts, USA 01003, Quantum Information Processing Group, Raytheon BBN Technologies, Cambridge, Massachusetts, USA 02138, Amherst College, Amherst, Massachusetts, USA 01002, Electrical and Computer Engineering D...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of informatics and applied mathematics

سال: 2022

ISSN: ['2667-6990']

DOI: https://doi.org/10.53508/ijiam.1073205