Optimal Covert Communication Techniques
نویسندگان
چکیده
Due to advancements in hacking and reverse engineering tools, threat against transfer of sensitive data or highly classified information is always at risk being intercepted by an attacker. Covert communication outwits this malicious breach privacy act better than cryptography as it camouflages secret inside another innocent looking information, while shows scrambled that might arouse attention However, the challenges Steganography are modification carrier causes some abnormalities, which detectable often methods not optimized. This paper presents approach Chanel, utilizes mathematical concept combination optimize time transmission using sets multiple transmitters, receivers addresses where each abstractly represents a set bits characters without modifying address. To minimize number physical address for use, permutation virtual generation from introduce. The addition technique like relationship their application both re-enforcing resistivity Steganalysis generating combinations. Furthermore, dynamical clockwise anti-clockwise rotation over after every introduced improve on Steganalysis. A simple test was performed demonstrating relay address, concepts. Based results analysis, method effective expected quite easy use can be implemented different platforms much difficulties.
منابع مشابه
Covert Communication Techniques in the Digital World
The boom of covert communication coincides with the appearance and growth of the Internet. The rapid spread of computer networks and shift to digitization of media has created a very favourable environment for covert communication. In this paper, some Covert communication techniques have been described. Covert or secure communication includes methods such as cryptography, steganography and wate...
متن کاملStudy on Airspace Covert Communication Algorithm of Covert Communication System
Based on the security of information transmission through network in the information society, the paper puts forward covert communication technology which is more reliable than the prior encryption algorithm, analyzes channel covertness and information hiding of covert communication technology based on spread-spectrum communication technology, and establishes a covert communication system inclu...
متن کاملCovert Communication through Executables
This paper explores the potential of executables for covert communication. Three techniques for the embedding of secret information are presented. Possible attacks on the stealthiness of these techniques are identified and countered. The presented concepts are implemented and evaluated for the IA32 architecture, for which we obtain an encoding rate of 1/27 before countermeasures and 1/89 after ...
متن کاملBehavioral Mimicry Covert Communication
Covert communication refers to the process of communicating data through a channel that is neither designed, nor intended to transfer information. Traditionally, covert channels are considered as security threats in computer systems and a great deal of attention has been given to countermeasures for covert communication schemes. The evolution of computer networks led the communication community...
متن کاملCovert Optical Communication
Boulat A. Bash, Andrei H. Gheorghe, Monika Patel, Jonathan L. Habif, Dennis Goeckel, Don Towsley, and Saikat Guha School of Computer Science, University of Massachusetts, Amherst, Massachusetts, USA 01003, Quantum Information Processing Group, Raytheon BBN Technologies, Cambridge, Massachusetts, USA 02138, Amherst College, Amherst, Massachusetts, USA 01002, Electrical and Computer Engineering D...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of informatics and applied mathematics
سال: 2022
ISSN: ['2667-6990']
DOI: https://doi.org/10.53508/ijiam.1073205