The Vision of Autonomic Computing
Computer
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
Autonomic network management: some pragmatic considerations
Proceedings of the 2006 SIGCOMM workshop on Internet network management
Computer Networking: A Top-Down Approach (4th Edition)
Computer Networking: A Top-Down Approach (4th Edition)
Lottery scheduling: flexible proportional-share resource management
OSDI '94 Proceedings of the 1st USENIX conference on Operating Systems Design and Implementation
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Batch steganography and pooled steganalysis
IH'06 Proceedings of the 8th international conference on Information hiding
Gibbs construction in steganography
IEEE Transactions on Information Forensics and Security
Using high-dimensional image models to perform highly undetectable steganography
IH'10 Proceedings of the 12th international conference on Information hiding
Breaking HUGO: the process discovery
IH'11 Proceedings of the 13th international conference on Information hiding
Steganalysis of content-adaptive steganography in spatial domain
IH'11 Proceedings of the 13th international conference on Information hiding
Wet paper codes with improved embedding efficiency
IEEE Transactions on Information Forensics and Security
Systematic engineering of control protocols for covert channels
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Hi-index | 0.00 |
The complexity of covert communication management is the main barrier towards the massive application of covert communication. In this paper, a protocol for autonomic covert communication is proposed to deal with the management complexity of covert communication system, and the environmental changes in the course of covert communication. Simulation results are provided to illustrate the self-star properties of the proposed scheme.