A comprehensive survey of covert communication techniques, limitations and future challenges

被引:18
|
作者
Makhdoom, Imran [1 ]
Abolhasan, Mehran [1 ]
Lipman, Justin [1 ]
机构
[1] Univ Technol, Sydney, Australia
关键词
Covert communication; Hidden messages; Data hiding; Data encapsulation; PAYLOAD IMAGE STEGANOGRAPHY; DATA HIDING METHOD; AUDIO STEGANOGRAPHY; HIGH-CAPACITY; INFORMATION; SYSTEMS; NOISE; ALGORITHM; CHANNELS; DOMAIN;
D O I
10.1016/j.cose.2022.102784
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data encryption aims to protect the confidentiality of data at storage, during transmission, or while in processing. However, it is not always the optimum choice as attackers know the existence of the ciphertext. Hence, they can exploit various weaknesses in the implementation of encryption algorithms and can thus decrypt or guess the related cryptographic primitives. Moreover, in the case of proprietary applications such as online social networks, users are at the mercy of the vendor's security measures. Therefore, users are vulnerable to various security and privacy threats. Contrary to this, covert communication techniques hide the existence of communication and thus achieve security through obscurity and hidden communication channels. Over the period, there has been a significant advancement in this field. However, existing literature fails to encompass all the aspects of covert communications in a single document. This survey thus endeavors to highlight the latest trends in covert communication techniques, related challenges, and future directions. (c) 2022 Published by Elsevier Ltd.
引用
收藏
页数:29
相关论文
共 50 条
  • [21] Constellation Design for Future Communication Systems: A Comprehensive Survey
    Barrueco, Jon
    Montalban, Jon
    Iradier, Eneko
    Angueira, Pablo
    IEEE ACCESS, 2021, 9 : 89778 - 89797
  • [22] A survey on Ethereum pseudonymity: Techniques, challenges, and future directions
    Jamwal, Shivani
    Cano, Jose
    Lee, Gyu Myoung
    Tran, Nguyen H.
    Truong, Nguyen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 232
  • [23] Blockchain Meets Covert Communication: A Survey
    Chen, Zhuo
    Zhu, Liehuang
    Jiang, Peng
    Zhang, Can
    Gao, Feng
    He, Jialing
    Xu, Dawei
    Zhang, Yan
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (04): : 2163 - 2192
  • [24] A comprehensive analysis of image forensics techniques: Challenges and future direction
    Ansari M.D.
    Rashid E.
    Skandha S.S.
    Gupta S.K.
    Recent Patents on Engineering, 2020, 14 (03) : 458 - 467
  • [25] General framework, opportunities and challenges for crowdsourcing techniques: A Comprehensive survey
    Bhatti, Shahzad Sarwar
    Gao, Xiaofeng
    Chen, Guihai
    JOURNAL OF SYSTEMS AND SOFTWARE, 2020, 167
  • [26] Directional modulation techniques for secure wireless communication: a comprehensive survey
    Omar Ansari
    Muhammad Amin
    EURASIP Journal on Wireless Communications and Networking, 2022
  • [27] Directional modulation techniques for secure wireless communication: a comprehensive survey
    Ansari, Omar
    Amin, Muhammad
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2022, 2022 (01)
  • [28] A Comprehensive Survey on Deep Clustering: Taxonomy, Challenges, and Future Directions
    Zhou, Sheng
    Xu, Hongjia
    Zheng, Zhuonan
    Chen, Jiawei
    Li, Zhao
    Bu, Jiajun
    Wu, Jia
    Wang, Xin
    Zhu, Wenwu
    Ester, Martin
    ACM COMPUTING SURVEYS, 2025, 57 (03)
  • [29] A comprehensive survey on image encryption: Taxonomy, challenges, and future directions
    Saberikamarposhti, Morteza
    Ghorbani, Amirabbas
    Yadollahi, Mehdi
    CHAOS SOLITONS & FRACTALS, 2024, 178
  • [30] Challenges and Limitations in Human Action Recognition on Unmanned Aerial Vehicles: A Comprehensive Survey
    Othman, Nashwan Adnan
    Aydin, Ilhan
    TRAITEMENT DU SIGNAL, 2021, 38 (05) : 1403 - 1411