Multilevel Steganography: Improving Hidden Communication in Networks
暂无分享,去创建一个
Wojciech Mazurczyk | Krzysztof Szczypiorski | Wojciech Fraczek | W. Mazurczyk | K. Szczypiorski | Wojciech Fraczek
[1] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[2] Wojciech Mazurczyk,et al. Information Hiding Using Improper frame padding , 2010, 2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS).
[3] Wojciech Mazurczyk,et al. Steganography of VoIP Streams , 2008, OTM Conferences.
[5] Santosh S. Vempala,et al. Chipping Away at Censorship Firewalls with User-Generated Content , 2010, USENIX Security Symposium.
[6] Xiapu Luo,et al. Cloak: A Ten-Fold Way for Reliable Covert Communications , 2007, ESORICS.
[7] Wojciech Mazurczyk,et al. Retransmission steganography and its detection , 2011, Soft Comput..
[8] Eric Rescorla,et al. Diffie-Hellman Key Agreement Method , 1999, RFC.
[9] Ravi Jain,et al. An Experimental Study of the Skype Peer-to-Peer VoIP System , 2005, IPTPS.
[10] Seungwha Yoo,et al. Allowable Propagation Delay for VoIP Calls of Acceptable Quality , 2002, AISA.
[11] Sebastian Zander,et al. A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.
[12] Atef J. Al-Najjar. The decoy: multi-level digital multimedia steganography model , 2008, ICC 2008.
[13] Wojciech Mazurczyk,et al. Stream Control Transmission Protocol Steganography , 2010, 2010 International Conference on Multimedia Information Networking and Security.