A Covert Channel Using Secret Splitting

Abstract

This paper presents a design of a secure covert channel . The proposed system generates a special covert channel used in sensitive applications. In order to enhance the covert of information, the participants in the communication channel must agree upon secure information and split it into two parts. From each part, the system generates a set of pseudo random numbers. Then the authenticated users select one of these numbers to be meaningful message. The system depends on the traditional prisoner's problem. The proposed system is tested against the traditional methods and it is implemented more effective in terms of hiding information from the observation of any active warden.

Authors and Affiliations

Dr. Abdulameer Khalaf Hussain

Keywords

Related Articles

A Review Paper on Hadoop Architecture

Hadoop is an open-source software-programming platform for storing and processing huge amounts of data. Its framework is built on Java programming, with some native C code and shell scripts thrown in for good measure. HD...

Research on the Application of Semantic Network in Disease Diagnosis Prompts Based on Medical Corpus

Portion of the causes of medical errors in outpatient clinics are incorrect treatment resulting from misdiagnosis. Misdiagnosis between diseases is often caused by similar and indistinguishable symptoms. Currently, disea...

A Comparative Study of Cat Swarm Algorithm for Graph Coloring Problem: Convergence Analysis and Performance Evaluation

The Graph Coloring Problem (GCP) is a significant optimization challenge widely suitable to solve scheduling problems. Its goal is to specify the minimum colors (k) required to color a graph properly. Due to its NP-compl...

Clustering Based Algorithm for Efficient and Effective Feature Selection Performance

Process with high dimensional data is enormous issue in data mining and machine learning applications. Feature selection is the mode of recognize the good number of features that produce well-suited outcome as the unique...

Decentralized Incognito Limpid E-Voting System

Voting is a constitutional part of governmental systems which gives the people of the nation the liberty to express their opinions. The contemporary system constitutes Electronic Voting Machines (EVM) that is a pile-up o...

Download PDF file
  • EP ID EP748612
  • DOI -
  • Views 41
  • Downloads 0

How To Cite

Dr. Abdulameer Khalaf Hussain (2016). A Covert Channel Using Secret Splitting. International Journal of Innovative Research in Computer Science and Technology, 4(2), -. https://europub.co.uk./articles/-A-748612