Proceedings of the 13th International Conference on Availability, Reliability and Security 2018
DOI: 10.1145/3230833.3233266
|View full text |Cite
|
Sign up to set email alerts
|

Channel Steganalysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…Current steganography countermeasures are usually tailored for testbed environments, where they provide sufficient results, see [4] for a comprehensive overview. However, not only do real-world applications demand very low false-positive rates as false-positives accumulate to large numbers for large-scale scenarios [31], they also have to deal with continuously changing data. For instance, since the invention of the ARPANET, the Internet's traffic characteristics continuously kept changing [3].…”
Section: Anticipated Steganography Developments In the Context Of Patternsmentioning
confidence: 99%
“…Current steganography countermeasures are usually tailored for testbed environments, where they provide sufficient results, see [4] for a comprehensive overview. However, not only do real-world applications demand very low false-positive rates as false-positives accumulate to large numbers for large-scale scenarios [31], they also have to deal with continuously changing data. For instance, since the invention of the ARPANET, the Internet's traffic characteristics continuously kept changing [3].…”
Section: Anticipated Steganography Developments In the Context Of Patternsmentioning
confidence: 99%
“…In contrast to [18] where it is assumed that multiple images are used for a steganografic communication channel, we only consider cases in which individual images are used as analysis material. To date, however, there are no research studies describing cases in which several versions of the same image (reference images) exist.…”
Section: Research Goalmentioning
confidence: 99%
“…Current steganography countermeasures are usually tailored for testbed environments, where they provide sufficient results, see [4] for a comprehensive overview. However, not only do real-world applications demand very low falsepositive rates as false-positives accumulate to large numbers for large-scale scenarios [31], they also have to deal with continuously changing data. For instance, since the invention of the ARPANET, the Internet's traffic characteristics continuously kept changing [3].…”
Section: Artificial Retransmissions Modulationmentioning
confidence: 99%