Covert channel: network steganography deployment
Steganography is one of the major techniques used to hide the existence of communication that lies between two overt parties. Steganography also denoted by art of hiding communication. This work relates the areas of steganography, network protocols and security for practical data hiding in communica...
| Main Author: | Md Ali, Nurul Majdi |
|---|---|
| Format: | Student Project |
| Language: | English |
| Published: |
Faculty of Information Technology and Quantitative Sciences
2005
|
| Online Access: | https://ir.uitm.edu.my/id/eprint/695/ |
Similar Items
WINPCAP : design and development of covert channel for secure communication
by: Omar, Syaril Nizam
Published: (2007)
by: Omar, Syaril Nizam
Published: (2007)
Secret channel using video steganography
by: Lee, Kar Yee, et al.
Published: (2017)
by: Lee, Kar Yee, et al.
Published: (2017)
Applying covert channel in TCP Fast Open (TFO) / Mohamed Azran Aziz
by: Mohamed Azran , Aziz
Published: (2019)
by: Mohamed Azran , Aziz
Published: (2019)
Admissibility of covert surveillance evidence: a prolegomenon
by: Md. Abdul Jalil,, et al.
Published: (2014)
by: Md. Abdul Jalil,, et al.
Published: (2014)
Admissibility of covert surveillance evidence: a prolegomenon
by: Md. Abdul Jalil,, et al.
Published: (2014)
by: Md. Abdul Jalil,, et al.
Published: (2014)
Consumer responses to covert advertising in social media
by: Göbel, F., et al.
Published: (2017)
by: Göbel, F., et al.
Published: (2017)
An aerial deployed unmanned glider for cross-Channel flight
by: Jabbal, Mark
Published: (2015)
by: Jabbal, Mark
Published: (2015)
Deployments Scenarios of 5G Networks
by: Oudah, Ali A.
Published: (2017)
by: Oudah, Ali A.
Published: (2017)
Overt and covert postpartum urinary retention, risk factors and complications
by: Nusee, Zalina, et al.
Published: (2020)
by: Nusee, Zalina, et al.
Published: (2020)
Grey is the new black: covert action and implausible deniability
by: Cormac, Rory, et al.
Published: (2018)
by: Cormac, Rory, et al.
Published: (2018)
A modern-day requirement for co-ordinated covert action
by: Cormac, Rory, et al.
Published: (2016)
by: Cormac, Rory, et al.
Published: (2016)
Unequal English accents, covert accentism and EAL migrants in Australia
by: Dovchin, Sender, et al.
Published: (2022)
by: Dovchin, Sender, et al.
Published: (2022)
Modeling of relay deployment in multihop relay network
by: Al-Dooghachi, Milad M. Ali Salih
Published: (2014)
by: Al-Dooghachi, Milad M. Ali Salih
Published: (2014)
Image steganography
by: Jeniffer, Chegaram
Published: (2012)
by: Jeniffer, Chegaram
Published: (2012)
Reconsidering the value of covert research: the role of ambiguous consent in participant observation
by: Roulet, Thomas, et al.
Published: (2017)
by: Roulet, Thomas, et al.
Published: (2017)
On The Impact of User Payload on Deployment Requirements of LTE Networks
by: A., Hameed, et al.
Published: (2014)
by: A., Hameed, et al.
Published: (2014)
Efficient and secured compression and steganography technique in wireless sensor network
by: Tuama, Ammar Yaseen
Published: (2016)
by: Tuama, Ammar Yaseen
Published: (2016)
Covert action failure and fiasco construction: William Hague’s 2011 Libyan venture
by: Cormac, Rory, et al.
Published: (2017)
by: Cormac, Rory, et al.
Published: (2017)
Piracy on the high sands: covert military mobilities in the Libyan desert, 1940-1943
by: Forsyth, Isla
Published: (2017)
by: Forsyth, Isla
Published: (2017)
3G Spectrum Auction Aftermarket Network Deployment
by: Madden, Gary, et al.
Published: (2013)
by: Madden, Gary, et al.
Published: (2013)
Effects on quality in audio steganography
by: Ho, Man Yen
Published: (2014)
by: Ho, Man Yen
Published: (2014)
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014)
by: Phang, She Chin
Published: (2014)
Information hiding using steganography
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Prototype development of VOIP steganography
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
Protocol for the design of an instrument to measure preadolescent children's self-report of covert aggression and bullying
by: Nelson, Helen, et al.
Published: (2015)
by: Nelson, Helen, et al.
Published: (2015)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Deploying clustered wireless sensor network by multi-robot system
by: Arezoumand, Reza, et al.
Published: (2014)
by: Arezoumand, Reza, et al.
Published: (2014)
Disruption and deniable interventionism: explaining the appeal of covert action and special forces in contemporary British policy
by: Cormac, Rory
Published: (2017)
by: Cormac, Rory
Published: (2017)
The Admissibility of Covert Video Data Evidence in Wildlife Crime Proceedings: A Public Authority Issue?
by: Glover, Philip
Published: (2018)
by: Glover, Philip
Published: (2018)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Steganography technique using modulus arithmetic
by: Jaafar, Sayuthi, et al.
Published: (2007)
by: Jaafar, Sayuthi, et al.
Published: (2007)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Steganography For Embedding Data In Digital Image
by: Sowan, Salah Ibrahem
Published: (2003)
by: Sowan, Salah Ibrahem
Published: (2003)
The pinprick approach: Whitehall’s top-secret anti-communist committee and the evolution of British covert action strategy
by: Cormac, Rory
Published: (2014)
by: Cormac, Rory
Published: (2014)
The Development of a Self-report Measure of Covert Aggression and Bullying for Upper Primary School Aged Children
by: Nelson, Helen Jean
Published: (2019)
by: Nelson, Helen Jean
Published: (2019)
Energy-efficient secure routing in heavily deployed wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Deployment of femtocell and its interference management approaches in LTE heterogeneous networks
by: Al-Omari, Motea, et al.
Published: (2016)
by: Al-Omari, Motea, et al.
Published: (2016)
A Study of Topology Characteristics on the Real Deployment of Wireless Sensor Networks
by: Jaganathan, M., et al.
Published: (2010)
by: Jaganathan, M., et al.
Published: (2010)
An improved image steganography algorithm based on PVD
by: Bhuiyan, Sharif Shah Newaj, et al.
Published: (2018)
by: Bhuiyan, Sharif Shah Newaj, et al.
Published: (2018)
Robust Audio Steganography via Genetic Algorithm
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Similar Items
-
WINPCAP : design and development of covert channel for secure communication
by: Omar, Syaril Nizam
Published: (2007) -
Secret channel using video steganography
by: Lee, Kar Yee, et al.
Published: (2017) -
Applying covert channel in TCP Fast Open (TFO) / Mohamed Azran Aziz
by: Mohamed Azran , Aziz
Published: (2019) -
Admissibility of covert surveillance evidence: a prolegomenon
by: Md. Abdul Jalil,, et al.
Published: (2014) -
Admissibility of covert surveillance evidence: a prolegomenon
by: Md. Abdul Jalil,, et al.
Published: (2014)