Detecting Wireless Steganography With Wavelet Analysis
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jang, Wonwoo | - |
dc.contributor.author | Lee, Wonjun | - |
dc.date.accessioned | 2021-08-30T03:55:16Z | - |
dc.date.available | 2021-08-30T03:55:16Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2021-02 | - |
dc.identifier.issn | 2162-2337 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/50015 | - |
dc.description.abstract | In wireless communications, information is transmitted through a modulated waveform according to the associated modulation technique. However, there has been growing research to transmit information covertly by modulating waveforms further while pretending to be a normal transmission. Modulation-based wireless steganography techniques cause malicious information leakage without being aware of it by nearby devices. In this letter, we propose a detection scheme based on wavelet analysis with various well-known wavelets (e.g., Haar, Morlet, Shannon) to distinguish effectively between the primary channel and a channel created from the modulation-based technique. Practical experiments show that the proposed scheme can detect the modulation-based techniques at least with 93.25% accuracy under most circumstances. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | Detecting Wireless Steganography With Wavelet Analysis | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Wonjun | - |
dc.identifier.doi | 10.1109/LWC.2020.3032032 | - |
dc.identifier.scopusid | 2-s2.0-85101445111 | - |
dc.identifier.wosid | 000617372500038 | - |
dc.identifier.bibliographicCitation | IEEE WIRELESS COMMUNICATIONS LETTERS, v.10, no.2, pp.383 - 386 | - |
dc.relation.isPartOf | IEEE WIRELESS COMMUNICATIONS LETTERS | - |
dc.citation.title | IEEE WIRELESS COMMUNICATIONS LETTERS | - |
dc.citation.volume | 10 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 383 | - |
dc.citation.endPage | 386 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | OFDM | - |
dc.subject.keywordAuthor | Feature extraction | - |
dc.subject.keywordAuthor | Wireless communication | - |
dc.subject.keywordAuthor | Modulation | - |
dc.subject.keywordAuthor | Communication system security | - |
dc.subject.keywordAuthor | Continuous wavelet transforms | - |
dc.subject.keywordAuthor | Wireless communications | - |
dc.subject.keywordAuthor | physical layer security | - |
dc.subject.keywordAuthor | wavelet analysis | - |
dc.subject.keywordAuthor | steganography | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.