Problems of Modeling in the Analysis of Covert Channels

作者: Alexander Grusho , Nikolai Grusho , Elena Timonina

DOI: 10.1007/978-3-642-14706-7_9

关键词:

摘要: Sometimes the analysis of covert channel is weakly dependent on correctness probabilistic models, but more often result such seriously choice aprobabilistic model. We show how problem detection communications depends found dependence judgments about invisibility communication from bans in a model legal communication.

参考文章(13)
Alexander Grusho, Nick Grebnev, Elena Timonina, Covert channel invisibility theorem Communications in computer and information science. ,vol. 374, pp. 187- 196 ,(2007) , 10.1007/978-3-540-73986-9_16
Pierre Moulin, Ying Wang, New results on steganographic capacity ,(2004)
Joseph Migga Kizza, Computer Network Security ,(2005)
Gustavus J. Simmons, The Prisoners’ Problem and the Subliminal Channel international cryptology conference. pp. 51- 67 ,(1984) , 10.1007/978-1-4684-4730-9_5
A. A. GRUSHO, On the existence of subliminal channels Discrete Mathematics and Applications. ,vol. 9, pp. 1- 6 ,(1999) , 10.1515/DMA.1999.9.1.1
Tomáš Filler, Andrew D. Ker, Jessica Fridrich, The square root law of steganographic capacity for Markov covers Proceedings of SPIE. ,vol. 7254, pp. 725408- ,(2009) , 10.1117/12.805911
Ying Wang, Pierre Moulin, Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions IEEE Transactions on Information Theory. ,vol. 54, pp. 2706- 2722 ,(2008) , 10.1109/TIT.2008.921684
Alexander Grusho, Alexander Kniazev, Elena Timonina, Detection of Illegal Information Flow Lecture Notes in Computer Science. pp. 235- 244 ,(2005) , 10.1007/11560326_18
Neil F. Johnson, Zoran Duric, Sushil Jajodia, Nasir Memon, Information Hiding: Steganography and Watermarking—Attacks and Countermeasures Journal of Electronic Imaging. ,vol. 10, pp. 825- 826 ,(2001) , 10.1117/1.1388610