Share This Author
LACK—a VoIP steganographic method
The analytical results presented in the paper concern the influence of LACK’s hidden data insertion procedure on the method’'s impact on quality of voice transmission and its resistance to steganalysis.
Principles and overview of network steganography
The article discusses basic principles of network steganography, which is a comparatively new research subject in the area of information hiding, followed by a concise overview and classification of…
Saturation throughput analysis of IEEE 802.11g (ERP-OFDM) networks
The saturation throughput analysis of IEEE 802.11g (ERP-OFDM) networks is presented based on the Markov model previously introduced and validated by the authors in Szczypiorski and Lubacz.
Hiding Data in VoIP
A classification of network steganography methods is proposed, which enables manipulating certain properties of the communications medium in an unexpected, unconventional, or unforeseen way to hide secret data in users' normal data transmissions.
Performance analysis of IEEE 802.11 DCF networks
An analytical saturation throughput model of IEEE 802.11 DCF (distributed coordination function) with basic access in ad hoc mode is presented, showing that taking into account freezing of the backoff timer when a station senses busy channel is important in modeling saturation throughput.
Vice over IP
What kind of potential contemporary communication networks have for enabling steganography, and in effect, create new techniques so that researchers can figure out how to thwart them.
Traffic Engineering Problems in Multiservice Circuit Switched Networks
Four ways to smuggle messages through internet services
Ten Russians sent by Russia's Foreign Intelligence Service to gather information on U.S. policies and programs thwarted detection for years by hiding secret correspondence in seemingly innocent pictures posted on public websites, but the scheme wasn't as covert as the spies had assumed.
The Subject’s Forms of Knowledge and the Question of Being
Performance Evaluation of IEEE 802.11 DCF Networks
A new analytical saturation throughput model of IEEE 802.11 DCF (Distributed Coordination Function) with basic access in ad-hoc mode is presented, which takes into account freezing of the backoff timer when a station senses a busy channel.