A survey of network protocol based steganographic techniques
Steganography is a sub-discipline of information hiding, which hides external information into an innocuous carrier to establish stealthy communication. Steganography in network protocols however, is an emerging research area, which exploits network protocols specifications, protocol mechanisms, net...
| Main Authors: | Abdullaziz, O., Goh, V., Ling, Huo Chong, Wong, K. |
|---|---|
| Format: | Conference Paper |
| Published: |
2014
|
| Online Access: | http://hdl.handle.net/20.500.11937/71105 |
Similar Items
AIPISteg: An active IP identification based steganographic method
by: Abdullaziz, O., et al.
Published: (2016)
by: Abdullaziz, O., et al.
Published: (2016)
Class Of Enhanced Capacity Secure Steganographic Systems Based On LSB Insertion Technique
by: Ling , Huo Chong
Published: (2002)
by: Ling , Huo Chong
Published: (2002)
A Class of Enhanced Capacity Secure Steganographic Systems Based On LSB Insertion Technique
by: Ling , Huo Chong
Published: (2002)
by: Ling , Huo Chong
Published: (2002)
Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
by: Ling, Huo-Chong, et al.
Published: (2007)
by: Ling, Huo-Chong, et al.
Published: (2007)
A review of steganographic methods and techniques
by: Beroual, Abdessalam, et al.
Published: (2018)
by: Beroual, Abdessalam, et al.
Published: (2018)
Comparative study of different steganographic techniques
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Using IP identification for fragmentation resilient data embedding
by: Abdullaziz, O., et al.
Published: (2015)
by: Abdullaziz, O., et al.
Published: (2015)
Recovering and restoring tampered RFID data using steganographic principles
by: Mohan, M., et al.
Published: (2006)
by: Mohan, M., et al.
Published: (2006)
A survey of routing MAC techniques for wireless sensor networks routing protocol
by: Mohammed Ibbini, Emad, et al.
Published: (2015)
by: Mohammed Ibbini, Emad, et al.
Published: (2015)
Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
A survey on cluster-based routing protocols in wireless sensor networks
by: Nokhanji, Nooshin, et al.
Published: (2014)
by: Nokhanji, Nooshin, et al.
Published: (2014)
On the medium access control protocols suitable for wireless sensor networks – a survey
by: Guerroumi, Mohamed, et al.
Published: (2014)
by: Guerroumi, Mohamed, et al.
Published: (2014)
A Survey of Low Duty Cycle MAC Protocols in Wireless Sensor Networks
by: Ahmad, Mohd Riduan
Published: (2010)
by: Ahmad, Mohd Riduan
Published: (2010)
Service redundancy and cluster-based routing protocols for wireless sensor and mobile ad hoc networks: a survey
by: Yagoub, Mudathir F.S., et al.
Published: (2020)
by: Yagoub, Mudathir F.S., et al.
Published: (2020)
A survey of RFID authentication protocols
by: Yousuf, Y., et al.
Published: (2008)
by: Yousuf, Y., et al.
Published: (2008)
A survey of energy-efficient and QoS-aware routing protocols for wireless sensor networks
by: Shafiullah, G., et al.
Published: (2008)
by: Shafiullah, G., et al.
Published: (2008)
SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges
by: Hussein, Nehad Hameed, et al.
Published: (2024)
by: Hussein, Nehad Hameed, et al.
Published: (2024)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
Co-channel interference mitigation techniques in multi-cell OFDMA Relay-Based Cellular Networks: a survey
by: Masoumiyan, Farzaneh, et al.
Published: (2014)
by: Masoumiyan, Farzaneh, et al.
Published: (2014)
Position-based routing protocols for ad-hoc networks
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
Real-time high-resolution downsampling algorithm on many-core processor for spatially scalable video coding
by: Buhari, A., et al.
Published: (2015)
by: Buhari, A., et al.
Published: (2015)
Fast watermarking scheme for real-time spatial scalable video coding
by: Buhari, A., et al.
Published: (2016)
by: Buhari, A., et al.
Published: (2016)
Low complexity watermarking scheme for scalable video coding
by: Buhari, A., et al.
Published: (2016)
by: Buhari, A., et al.
Published: (2016)
A reputation-based routing protocol for wireless sensor networks
by: Adnan, Ali Idarous, et al.
Published: (2015)
by: Adnan, Ali Idarous, et al.
Published: (2015)
Performance analysis of RTS/CTS protocol over basic access in wireless networks: Study of protocol impact on performance in wireless networks
by: Kuruvilla, Mathew, et al.
Published: (2015)
by: Kuruvilla, Mathew, et al.
Published: (2015)
Android based self-diagnostic electrocardiogram system for mobile healthcare
by: Choo, K., et al.
Published: (2015)
by: Choo, K., et al.
Published: (2015)
Static and mobile data gathering techniques in Wireless Sensor Networks: a survey
by: M. Ghaleb, Mukhtar, et al.
Published: (2014)
by: M. Ghaleb, Mukhtar, et al.
Published: (2014)
A secure region-based geographic routing protocol routing protocol (SRBR) for wireless sensor networks
by: Adnan, Ali Idarous, et al.
Published: (2017)
by: Adnan, Ali Idarous, et al.
Published: (2017)
A Store-and-delivery Based MAC Protocol for Air-ground Collaborative Wireless Networks for Precision Agriculture
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
Artificial Neural Network Based Byzantine Agreement Protocol
by: Lee, Kok Wah
Published: (2002)
by: Lee, Kok Wah
Published: (2002)
Artificial Neural Network Based Byzantine Agreement Protocol
by: Lee, Kok Wah
Published: (2002)
by: Lee, Kok Wah
Published: (2002)
A survey on DV-Hop localization techniques in Three-dimensional wireless sensor networks
by: Fengrong, Han, et al.
Published: (2020)
by: Fengrong, Han, et al.
Published: (2020)
Reliable low power network protocol in iot for agriculture field
by: Wong, Christopher Jin Soon
Published: (2024)
by: Wong, Christopher Jin Soon
Published: (2024)
Implementation of an electronic document management
system based on network protocols
by: Mohd Juzaidin Ab Aziz,
Published: (2004)
by: Mohd Juzaidin Ab Aziz,
Published: (2004)
Energy harvesting based routing protocol for underwater sensor networks
by: Khan, Adil, et al.
Published: (2019)
by: Khan, Adil, et al.
Published: (2019)
Energy Harvesting Enabled Cooperative Networks Resource Allocation Techniques, Protocol Design And Performance Analysis
by: Kehinde, Ojo Festus
Published: (2019)
by: Kehinde, Ojo Festus
Published: (2019)
Energy Harvesting Enabled Cooperative Networks: Resource Allocation Techniques, Protocol Design And Performance Analysis
by: Kehinde, Ojo Festus
Published: (2019)
by: Kehinde, Ojo Festus
Published: (2019)
Position-based QoS multicast routing protocol for mobile Ad Hoc Networks
by: Khalifa, Othman Omran, et al.
Published: (2010)
by: Khalifa, Othman Omran, et al.
Published: (2010)
A scalable neighbor-based routing protocol for mobile ad hoc networks
by: Ejmaa, Ali Mohamed E., et al.
Published: (2016)
by: Ejmaa, Ali Mohamed E., et al.
Published: (2016)
A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks
by: Jiang, Cailing
Published: (2019)
by: Jiang, Cailing
Published: (2019)
Similar Items
-
AIPISteg: An active IP identification based steganographic method
by: Abdullaziz, O., et al.
Published: (2016) -
Class Of Enhanced Capacity Secure Steganographic Systems Based On LSB Insertion Technique
by: Ling , Huo Chong
Published: (2002) -
A Class of Enhanced Capacity Secure Steganographic Systems Based On LSB Insertion Technique
by: Ling , Huo Chong
Published: (2002) -
Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
by: Ling, Huo-Chong, et al.
Published: (2007) -
A review of steganographic methods and techniques
by: Beroual, Abdessalam, et al.
Published: (2018)