2016
DOI: 10.1016/j.jnca.2015.10.019
|View full text |Cite
|
Sign up to set email alerts
|

AIPISteg: An active IP identification based steganographic method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…The second one is called Lost Audio Packets Steganography (LACK), which makes use of the delayed audio packets to achieve a covert channel of mixed time storage. Abdullaziz et al [18] also proposed an active IP identification based network steganography.…”
Section: Related Workmentioning
confidence: 99%
“…The second one is called Lost Audio Packets Steganography (LACK), which makes use of the delayed audio packets to achieve a covert channel of mixed time storage. Abdullaziz et al [18] also proposed an active IP identification based network steganography.…”
Section: Related Workmentioning
confidence: 99%
“…ALTO include cost map and network map as a default maps [4]. SDN provide rendezvous services by controller plugged with ALTOserver through a well-defined interface [5]. Therefore, well use ALTO to creating a network by connected CDNi with SDN services to help for determine efficient routes [6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…Some of the typical applications of data hiding include watermarking, steganography, tamper detection and hyperlinking. Data hiding can be applied to any digital content, including traditional contents such as audio, image, video and text document, or untraditional contents such as IP packets [3] or laser beam [4].…”
Section: Introductionmentioning
confidence: 99%