{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T20:10:09Z","timestamp":1750968609016,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319701387"},{"type":"electronic","value":"9783319701394"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-70139-4_89","type":"book-chapter","created":{"date-parts":[[2017,10,28]],"date-time":"2017-10-28T01:24:18Z","timestamp":1509153858000},"page":"878-887","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploiting Cantor Expansion for Covert Channels over LTE-Advanced"],"prefix":"10.1007","author":[{"given":"Zhiqiang","family":"He","sequence":"first","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zukui","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,29]]},"reference":[{"key":"89_CR1","unstructured":"3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio (E-UTRA) Physical Layer Procedures (Release 14). Technical Specification 36.213 (2016)"},{"key":"89_CR2","unstructured":"3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRAN), Medium Access Control (MAC) Protocol Specifications (Release 14). Technical Specification 36.321 (2016)"},{"key":"89_CR3","unstructured":"3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRAN), Radio Link Control (RLC) Protocol Specification (Release 13). Technical Specification 36.322 (2016)"},{"key":"89_CR4","unstructured":"3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRAN), Packet Data Convergence Protocol (PDCP) Specifications (Release 14). Technical Specification 36.323 (2016)"},{"key":"89_CR5","unstructured":"GSA: Evolution to LTE report: 4G Market and Technology Update. Global Mobile Suppliers Association, 26th October (2016)"},{"issue":"10","key":"89_CR6","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"BW Lampson","year":"1973","unstructured":"Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613\u2013615 (1973)","journal-title":"Commun. ACM"},{"key":"89_CR7","doi-asserted-by":"crossref","unstructured":"Hijaz, Z., Frost, V.S.: Exploiting OFDM systems for covert communication. In: Military Communications Conference 2010, pp. 2149\u20132155. IEEE MILCOM (2010)","DOI":"10.1109\/MILCOM.2010.5680484"},{"key":"89_CR8","doi-asserted-by":"crossref","unstructured":"Kumar, P.P., Amirtharajan, R., Thenmozhi, K., Rayappan, J.B.B.: Steg-OFDM blend for highly secure multi-user communication. In: Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, pp. 1\u20135. IEEE Wireless VITAE (2011)","DOI":"10.1109\/WIRELESSVITAE.2011.5940918"},{"key":"89_CR9","doi-asserted-by":"crossref","unstructured":"Szczypiorski, K., Mazurczyk, W.: Hiding data in OFDM symbols of IEEE 802.11 networks. In: Multimedia Information Networking and Security, pp. 835\u2013840. IEEE Wireless MINES (2010)","DOI":"10.1109\/MINES.2010.177"},{"issue":"3","key":"89_CR10","doi-asserted-by":"publisher","first-page":"2139","DOI":"10.1007\/s11042-012-1224-8","volume":"70","author":"W Mazurczyk","year":"2014","unstructured":"Mazurczyk, W., Szaga, P., Szczypiorski, K.: Using transcoding for hidden communication in IP telephony. Multimed. Tools Appl. 70(3), 2139\u20132165 (2014)","journal-title":"Multimed. Tools Appl."},{"issue":"2\u20133","key":"89_CR11","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s11235-009-9245-y","volume":"45","author":"W Mazurczyk","year":"2010","unstructured":"Mazurczyk, W., Lubacz, J.: LACKa VoIP steganographic method. Telecommun. Syst. 45(2\u20133), 153\u2013163 (2010)","journal-title":"Telecommun. Syst."},{"key":"89_CR12","doi-asserted-by":"crossref","unstructured":"Noda, H., Furuta, T., Niimi, M., Kawaguchi, E.: Video steganography based on bit-plane decomposition of wavelet-transformed video. In: Electronic Imaging 2004, pp. 345\u2013353. International Society for Optics and Photonics (2004)","DOI":"10.1117\/12.525597"},{"key":"89_CR13","doi-asserted-by":"crossref","unstructured":"Hanafy, A.A., Salama, G.I., Mohasseb, Y.Z.: A secure covert communication model based on video steganography. In: Military Communications Conference 2008, pp. 1\u20136. IEEE MILCOM (2008)","DOI":"10.1109\/MILCOM.2008.4753107"},{"key":"89_CR14","doi-asserted-by":"crossref","unstructured":"Rezaei, F., Hempel, M., Peng, D., Qian, Y., Sharif, H.: A secure covert communication model based on video steganography. In: Wireless Communications and Networking Conference 2013, pp. 1903\u20131908. IEEE WCNC (2013)","DOI":"10.1109\/WCNC.2013.6554855"},{"issue":"7\u20138","key":"89_CR15","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s12243-013-0385-4","volume":"69","author":"A Janicki","year":"2014","unstructured":"Janicki, A., Mazurczyk, W., Szczypiorski, K.: Steganalysis of transcoding steganography. Ann. Telecommun. (annales des t\u00e9l\u00e9communications) 69(7\u20138), 449\u2013460 (2014)","journal-title":"Ann. Telecommun. (annales des t\u00e9l\u00e9communications)"},{"key":"89_CR16","unstructured":"Sinha, R., Papadopoulos, C., Heidemann, J.: Internet packet size distributions: Some observations. USC\/Information Sciences Institute, Technical report, ISI-TR-2007-643 (2007)"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70139-4_89","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T19:42:50Z","timestamp":1750966970000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-70139-4_89"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319701387","9783319701394"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70139-4_89","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"29 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iconip2017.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}