2002
DOI: 10.1007/3-540-36415-3_2
|View full text |Cite
|
Sign up to set email alerts
|

Eliminating Steganography in Internet Traffic with Active Wardens

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
131
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 109 publications
(131 citation statements)
references
References 18 publications
0
131
0
Order By: Relevance
“…For 2-parameter Weibull distribution considered in Section 4.1 (4)(5)(6)(7)(8)(9)(10) and (4)(5)(6)(7)(8)(9)(10)(11) For chosen parameters from Tab.1 we obtain results shown in Fig. 9.…”
Section: Upper Limit Of E(d|d>t) Is As Follows (4-9)mentioning
confidence: 93%
See 3 more Smart Citations
“…For 2-parameter Weibull distribution considered in Section 4.1 (4)(5)(6)(7)(8)(9)(10) and (4)(5)(6)(7)(8)(9)(10)(11) For chosen parameters from Tab.1 we obtain results shown in Fig. 9.…”
Section: Upper Limit Of E(d|d>t) Is As Follows (4-9)mentioning
confidence: 93%
“…6. If S R (t) is the amount of data remaining to be sent covertly at instant t of the call then the insertion rate at time t is (4-13) (4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14) where IR Q (t) is calculated as described in Section 3. Fig.…”
Section: Upper Limit Of E(d|d>t) Is As Follows (4-9)mentioning
confidence: 99%
See 2 more Smart Citations
“…Fisk et al (2003) defined the concepts of structured and unstructured carriers. A carrier specifies the features or characteristics used to hide the information in the cover.…”
Section: Steganographymentioning
confidence: 99%