A Covert Channel Using Secret Splitting
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2016, Vol 4, Issue 2
Abstract
This paper presents a design of a secure covert channel . The proposed system generates a special covert channel used in sensitive applications. In order to enhance the covert of information, the participants in the communication channel must agree upon secure information and split it into two parts. From each part, the system generates a set of pseudo random numbers. Then the authenticated users select one of these numbers to be meaningful message. The system depends on the traditional prisoner's problem. The proposed system is tested against the traditional methods and it is implemented more effective in terms of hiding information from the observation of any active warden.
Authors and Affiliations
Dr. Abdulameer Khalaf Hussain
A Review Paper on Hadoop Architecture
Hadoop is an open-source software-programming platform for storing and processing huge amounts of data. Its framework is built on Java programming, with some native C code and shell scripts thrown in for good measure. HD...
Research on the Application of Semantic Network in Disease Diagnosis Prompts Based on Medical Corpus
Portion of the causes of medical errors in outpatient clinics are incorrect treatment resulting from misdiagnosis. Misdiagnosis between diseases is often caused by similar and indistinguishable symptoms. Currently, disea...
A Comparative Study of Cat Swarm Algorithm for Graph Coloring Problem: Convergence Analysis and Performance Evaluation
The Graph Coloring Problem (GCP) is a significant optimization challenge widely suitable to solve scheduling problems. Its goal is to specify the minimum colors (k) required to color a graph properly. Due to its NP-compl...
Clustering Based Algorithm for Efficient and Effective Feature Selection Performance
Process with high dimensional data is enormous issue in data mining and machine learning applications. Feature selection is the mode of recognize the good number of features that produce well-suited outcome as the unique...
Decentralized Incognito Limpid E-Voting System
Voting is a constitutional part of governmental systems which gives the people of the nation the liberty to express their opinions. The contemporary system constitutes Electronic Voting Machines (EVM) that is a pile-up o...