{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T12:30:47Z","timestamp":1777984247700,"version":"3.51.4"},"reference-count":181,"publisher":"Association for Computing Machinery (ACM)","issue":"9","license":[{"start":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T00:00:00Z","timestamp":1746489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2025,9,30]]},"abstract":"<jats:p>A unified understanding of terms is essential for every scientific discipline: steganography is no exception. Being divided into several domains (e.g., network and text steganography), it is crucial to provide a unified terminology as well as a taxonomy that is not limited to few applications or areas. A prime attempt toward a unified understanding of terms was conducted in 2015 with the introduction of a pattern-based taxonomy for network steganography. In 2021, the first work toward a pattern-based taxonomy for all domains of steganography was proposed. However, this initial attempt still faced several shortcomings, e.g., remaining inconsistencies and a lack of patterns for several steganography domains.<\/jats:p>\n                  <jats:p>As the consortium who published the previous studies on steganography patterns, we present the first comprehensive pattern-based taxonomy tailored to fit all known domains of steganography, including smaller and emerging areas, such as filesystem, IoT\/CPS, and AI\/ML steganography. To make our contribution more effective and promote the use of the taxonomy to advance research, we also provide a unified description method joint with a thorough tutorial on its utilization.<\/jats:p>","DOI":"10.1145\/3729165","type":"journal-article","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T06:01:51Z","timestamp":1744178511000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["A Generic Taxonomy for Steganography Methods"],"prefix":"10.1145","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1913-5912","authenticated-orcid":false,"given":"Steffen","family":"Wendzel","sequence":"first","affiliation":[{"name":"Institute f\u00fcr Organisation und Management von Informationssystemen (OMI) \/ Kommunikations- und Informationszentrum (kiz), Ulm University Faculty of Engineering, Computer Science and Psychology, Ulm, Germany, Center for Technology &amp; Transfer (ZTT), Hochschule Worms, Worms, Germany and Faculty of Mathematics &amp; Computer Science, FernUniversit\u00e4t in Hagen, Hagen Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6466-3354","authenticated-orcid":false,"given":"Luca","family":"Caviglione","sequence":"additional","affiliation":[{"name":"IMATI CNR Genova, Genova, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8509-4127","authenticated-orcid":false,"given":"Wojciech","family":"Mazurczyk","sequence":"additional","affiliation":[{"name":"Warsaw University of Technology, Warszawa, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0706-6355","authenticated-orcid":false,"given":"Aleksandra","family":"Mileva","sequence":"additional","affiliation":[{"name":"Goce Delcev University, Stip, North Macedonia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7985-8041","authenticated-orcid":false,"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[{"name":"Otto von Guericke Universit\u00e4t Magdeburg, Magdeburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0138-4638","authenticated-orcid":false,"given":"Christian","family":"Kr\u00e4tzer","sequence":"additional","affiliation":[{"name":"Otto von Guericke Universit\u00e4t Magdeburg, Magdeburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5904-5014","authenticated-orcid":false,"given":"Kevin","family":"Lamsh\u00f6ft","sequence":"additional","affiliation":[{"name":"Otto von Guericke Universit\u00e4t Magdeburg, Magdeburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7125-2722","authenticated-orcid":false,"given":"Claus","family":"Vielhauer","sequence":"additional","affiliation":[{"name":"University of Applied Sciences Brandenburg, Brandenburg an der Havel, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6248-3536","authenticated-orcid":false,"given":"Laura","family":"Hartmann","sequence":"additional","affiliation":[{"name":"Center for Technology &amp; Transfer (ZTT), Hochschule Worms, Worms Germany and Faculty of Mathematics &amp; Computer Science, FernUniversit\u00e4t in Hagen, Hagen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0303-6140","authenticated-orcid":false,"given":"J\u00f6rg","family":"Keller","sequence":"additional","affiliation":[{"name":"Mathematics &amp; Computer Science, FernUniversit\u00e4t in Hagen, Hagen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8718-5539","authenticated-orcid":false,"given":"Tom","family":"Neubert","sequence":"additional","affiliation":[{"name":"University of Applied Sciences Brandenburg, Brandenburg an der Havel, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3360-1251","authenticated-orcid":false,"given":"Sebastian","family":"Zillien","sequence":"additional","affiliation":[{"name":"Ulm University Faculty of Engineering, Computer Science and Psychology, Ulm, Germany and Center for Technology &amp; Transfer (ZTT), Hochschule Worms, Worms Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,5,6]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2020.3033059"},{"issue":"4","key":"e_1_3_3_3_2","doi-asserted-by":"crossref","first-page":"355","DOI":"10.3390\/e21040355","article-title":"Modern text hiding, text steganalysis, and applications: A comparative analysis","volume":"21","author":"Ahvanooey Milad T.","year":"2019","unstructured":"Milad T. Ahvanooey, Qianmu Li, Jun Hou, Ahmed R. Rajput, and Yini Chen. 2019. Modern text hiding, text steganalysis, and applications: A comparative analysis. Entropy 21, 4 (2019), 355.","journal-title":"Entropy"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","unstructured":"Ahmed Al-Haiqi Mahamod Ismail and Rosdiadee Nordin. 2014. A new sensors-based covert channel on android. The Scientific World Journal 2014 969628 (2014) 14 pages. DOI:DOI:10.1155\/2014\/969628","DOI":"10.1155\/2014\/969628"},{"key":"e_1_3_3_5_2","volume-title":"Proceedings of the International Conference on Data Science, E-learning and Information Systems (DATA\u201918)","author":"Alsaadi Husam Ibrahiem","year":"2018","unstructured":"Husam Ibrahiem Alsaadi, Maad Kamal Al-Anni, Rufah M. Almuttairi, Oguz Bayat, and Osman Nuri Ucan. 2018. Text steganography in font color of MS Excel sheet. In Proceedings of the International Conference on Data Science, E-learning and Information Systems (DATA\u201918) . Article 10."},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_6"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_3_3_8_2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-46739-8_6","article-title":"Permutation steganography in FAT filesystems","author":"Aycock John","year":"2015","unstructured":"John Aycock and Daniel Medeiros Nunes de Castro. 2015. Permutation steganography in FAT filesystems. In Transactions on Data Hiding and Multimedia Security X, Yun Q. Shi (Ed.). Vol. 8948, Springer Berlin Heidelberg, 92\u2013105.","journal-title":"Transactions on Data Hiding and Multimedia Security X"},{"key":"e_1_3_3_9_2","first-page":"281","volume-title":"Proceedings of the USENIX Conference on File and Storage Technologies (FAST 2022)","author":"Bacs Andrei","year":"2022","unstructured":"Andrei Bacs, Saidgani Musaev, Kaveh Razavi, Cristiano Giuffrida, and Herbert Bos. 2022. DUPEFS: Leaking data over the network with filesystem deduplication side channels. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST 2022). USENIX Association, 281\u2013296."},{"key":"e_1_3_3_10_2","volume-title":"Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems (HOTOS\u201907)","author":"Baliga Arati","year":"2007","unstructured":"Arati Baliga, Joe Kilian, and Liviu Iftode. 2007. A web based covert file system. In Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems (HOTOS\u201907). USENIX Association, USA, Article 12."},{"key":"e_1_3_3_11_2","volume-title":"Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2019)","author":"Barker Austen","year":"2019","unstructured":"Austen Barker, Staunton Sample, Yash Gupta, Anastasia McTaggart, Ethan L. Miller, and Darrell D. E. Long. 2019. Artifice: A deniable steganographic file system. In Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2019). USENIX Association."},{"key":"e_1_3_3_12_2","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","article-title":"Techniques for data hiding","volume":"35","author":"Bender Walter","year":"1996","unstructured":"Walter Bender, Daniel Gruhl, Norishige Morimoto, and Anthony Lu. 1996. Techniques for data hiding. IBM Systems Journal 35, 3&4 (1996), 313\u2013336.","journal-title":"IBM Systems Journal"},{"key":"e_1_3_3_13_2","volume-title":"Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text","author":"Bennett Krista","year":"2004","unstructured":"Krista Bennett. 2004. Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text. Technical Report 2004-13. CERIAS Tech Report, Purdue University."},{"key":"e_1_3_3_14_2","doi-asserted-by":"crossref","unstructured":"Richard Bergmair. 2009. A Comprehensive Bibliography of Linguistic Steganography. Retrieved April 2 2025 from https:\/\/richard.bergmair.eu\/dwn\/Bergmair2007Asubm.pdf","DOI":"10.1117\/12.711325"},{"key":"e_1_3_3_15_2","volume-title":"Detection of Covert Channel Encoding in Network Packet Delays","author":"Berk Vincent","year":"2005","unstructured":"Vincent Berk, Annarita Giani, and George Cybenko. 2005. Detection of Covert Channel Encoding in Network Packet Delays. Technical Report. Department of Computer Science - Dartmouth College."},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107583"},{"issue":"7","key":"e_1_3_3_17_2","doi-asserted-by":"crossref","first-page":"898","DOI":"10.3844\/jcssp.2013.898.904","article-title":"Text steganography based on font type in MS-Word documents","volume":"9","author":"Bhaya Wesam","year":"2013","unstructured":"Wesam Bhaya, Abdul Monem Rahma, and Dhamyaa AL-Nasrawi. 2013. Text steganography based on font type in MS-Word documents. Journal of Computer Science 9, 7 (2013), 898\u2013904.","journal-title":"Journal of Computer Science"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.5555\/1869956"},{"key":"e_1_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/49.464718"},{"key":"e_1_3_3_20_2","volume-title":"Network Covert Channels: Design, Analysis, Detection, and Elimination","author":"Cabuk Serdar","year":"2006","unstructured":"Serdar Cabuk. 2006. Network Covert Channels: Design, Analysis, Detection, and Elimination. Ph. D. Dissertation. Purdue University."},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"issue":"4","key":"e_1_3_3_22_2","first-page":"22:1\u201322:29","article-title":"IP covert channel detection","volume":"12","author":"Cabuk Serdar","year":"2009","unstructured":"Serdar Cabuk, Clara E. Brodley, and Clay Shields. 2009. IP covert channel detection. ACM Transactions on Information and System Security (TISSEC) 12, 4 (April2009), 22:1\u201322:29.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"issue":"4","key":"e_1_3_3_23_2","article-title":"Trends and challenges in network covert channels countermeasures","volume":"11","author":"Caviglione Luca","year":"2021","unstructured":"Luca Caviglione. 2021. Trends and challenges in network covert channels countermeasures. Applied Sciences 11, 4 (2021).","journal-title":"Applied Sciences"},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2022.3178205"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2627503"},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818046"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.885034"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.09.014"},{"key":"e_1_3_3_29_2","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1109\/ICCTD.2010.5645862","volume-title":"Proceedings of the 2010 2nd International Conference on Computer Technology and Development","author":"Changder Suvamoy","year":"2010","unstructured":"Suvamoy Changder, Debalina Ghosh, and Narayan C. Debnath. 2010. Linguistic approach for text steganography through Indian text. In Proceedings of the 2010 2nd International Conference on Computer Technology and Development. IEEE, 318\u2013322."},{"key":"e_1_3_3_30_2","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/BFb0028489","volume-title":"Proceedings of the International Conference on Information and Communications Security","author":"Chapman Mark","year":"1997","unstructured":"Mark Chapman and George Davida. 1997. Hiding the hidden: A software system for concealing ciphertext as innocuous text. In Proceedings of the International Conference on Information and Communications Security. 335\u2013345."},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.5555\/648025.744502"},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3564663"},{"key":"e_1_3_3_33_2","first-page":"224","volume-title":"Proceedings of the Information Hiding Workshop 2008","author":"Chen Zhili","year":"2008","unstructured":"Zhili Chen, Liusheng Huang, Zhenshan Yu, Wei Yang, Lingjun Li, Xueling Zheng, and Xinxin Zhao. 2008. Linguistic steganography detection using statistical characteristics of correlations between words. In Proceedings of the Information Hiding Workshop 2008. 224\u2013235."},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","unstructured":"Gabriele Costa Fabio Pinelli Simone Soderi and Gabriele Tolomei. 2022. Turning Federated Learning Systems Into Covert Channels. Access 10 (2022) 130642\u2013130656. DOI:DOI:10.1109\/ACCESS.2022.3229124","DOI":"10.1109\/ACCESS.2022.3229124"},{"issue":"51","key":"e_1_3_3_35_2","article-title":"LOKI2 (the implementation)","volume":"7","year":"1997","unstructured":"daemon9. 1997. LOKI2 (the implementation). Phrack Magazine 7, 51 (1997).","journal-title":"Phrack Magazine"},{"key":"e_1_3_3_36_2","article-title":"Using hierarchical statistical analysis and deep neural networks to detect covert timing channels","volume":"82","author":"Darwish Omar","year":"2019","unstructured":"Omar Darwish, Ala Al-Fuqaha, Ghassen Ben Brahim, Ilyes Jenhani, and Athanasios Vasilakos. 2019. Using hierarchical statistical analysis and deep neural networks to detect covert timing channels. Applied Soft Computing 82 (2019), 105546.","journal-title":"Applied Soft Computing"},{"issue":"12","key":"e_1_3_3_37_2","article-title":"The 12 flavors of cyberphysical systems","volume":"54","author":"DeFranko Joanna F.","year":"2021","unstructured":"Joanna F. DeFranko and Dimitrios Serpanos. 2021. The 12 flavors of cyberphysical systems. Computer 54, 12 (2021), 104\u2013108.","journal-title":"Computer"},{"key":"e_1_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2019.04.011"},{"key":"e_1_3_3_39_2","volume-title":"Exploitation of Data Streams Authorized by a Network Access Control System for Arbitrary Data Transfers: Tunneling and Covert Channels Over the HTTP Protocol","author":"Dyatlov Alex","year":"2005","unstructured":"Alex Dyatlov and Simon Castro. 2005. Exploitation of Data Streams Authorized by a Network Access Control System for Arbitrary Data Transfers: Tunneling and Covert Channels Over the HTTP Protocol. Technical Report. Gray-World.net."},{"key":"e_1_3_3_40_2","volume-title":"Proceedings of the Digital Forensic Research Workshop","author":"Eckstein Knut","year":"2005","unstructured":"Knut Eckstein and Marko Jahnke. 2005. Data hiding in journaling file systems. In Proceedings of the Digital Forensic Research Workshop."},{"key":"e_1_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978374"},{"key":"e_1_3_3_42_2","volume-title":"Approaches to Resolving Covert Storage Channels in Multilevel Secure Systems","author":"Fadlalla Yahia Ata Hamid","year":"1996","unstructured":"Yahia Ata Hamid Fadlalla. 1996. Approaches to Resolving Covert Storage Channels in Multilevel Secure Systems. Ph. D. Dissertation. University of New Brunswick."},{"key":"e_1_3_3_43_2","doi-asserted-by":"crossref","first-page":"100","DOI":"10.18653\/v1\/P17-3017","volume-title":"Proceedings of the ACL 2017, Student Research Workshop","author":"Fang Tina","year":"2017","unstructured":"Tina Fang, Martin Jaggi, and Katerina Argyraki. 2017. Generating steganographic text with LSTMs. In Proceedings of the ACL 2017, Student Research Workshop. 100\u2013106."},{"key":"e_1_3_3_44_2","doi-asserted-by":"crossref","unstructured":"Sally Fincher. 2004. PLML: Pattern Language Markup Language \/ Perspectives on HCI Patterns: Concepts and Tools. CHI 2003 summary document. Retrieved from https:\/\/www.cs.kent.ac.uk\/people\/staff\/saf\/patterns\/plml.html","DOI":"10.1145\/766137.766140"},{"key":"e_1_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO978113919290"},{"key":"e_1_3_3_46_2","unstructured":"Abe Getchell. 2008. Re: For Those Interested in Covert Channels. A posting on the securityfocus penetration testing mailinglist. Retrieved from https:\/\/seclists.org\/pen-test\/2008\/Dec\/292"},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00010"},{"key":"e_1_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2022.3140692"},{"key":"e_1_3_3_49_2","volume-title":"Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS\u201907)","author":"Gianvecchio Steven","year":"2007","unstructured":"Steven Gianvecchio and Haining Wang. 2007. Detecting covert timing channels: An entropy-based approach. In Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS\u201907) ."},{"key":"e_1_3_3_50_2","first-page":"211","volume-title":"Proceedings of the RAID Symposium","author":"Gianvecchio Steven","year":"2008","unstructured":"Steven Gianvecchio, Haining Wang, Duminda Wijesekera, and Sushil Jajodia. 2008. Model-based covert timing channels: Automated modeling and evasion. In Proceedings of the RAID Symposium. 211\u2013230."},{"key":"e_1_3_3_51_2","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/3-540-36467-6_15","volume-title":"Proceedings of the 2nd International Conference on Privacy Enhancing Technologies","author":"Giffin John","year":"2003","unstructured":"John Giffin, Rachel Greenstadt, Peter Litwack, and Richard Tibbetts. 2003. Covert messaging through TCP timestamps. In Proceedings of the 2nd International Conference on Privacy Enhancing Technologies. Springer, 194\u2013208."},{"key":"e_1_3_3_52_2","doi-asserted-by":"crossref","first-page":"057","DOI":"10.1109\/HONET.2012.6421435","volume-title":"Proceedings of the International Conference on High Capacity Optical Networks and Emerging\/Enabling Technologies","author":"Goher Syeda ZarAfshan","year":"2012","unstructured":"Syeda ZarAfshan Goher, Barkha Javed, and Nazar Abbas Saqib. 2012. Covert channel detection: A survey based analysis. In Proceedings of the International Conference on High Capacity Optical Networks and Emerging\/Enabling Technologies. IEEE, 057\u2013065."},{"key":"e_1_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00179"},{"key":"e_1_3_3_54_2","unstructured":"Thomas Graf. 2003. Messaging Over IPv6 Destination Options. Swiss Unix User Group."},{"key":"e_1_3_3_55_2","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/978-981-13-8707-4_9","volume-title":"Proceedings of the 6th Conference on Sound and Music Technology (CSMT\u201919)","author":"Guan Lei","year":"2019","unstructured":"Lei Guan, Yinji Jing, Shengchen Li, and Ru Zhang. 2019. A standard MIDI file steganography based on music perception in note duration. In Proceedings of the 6th Conference on Sound and Music Technology (CSMT\u201919). Springer, 99\u2013107."},{"issue":"5","key":"e_1_3_3_56_2","first-page":"2060","article-title":"Text-steganography: Review study & comparative analysis","volume":"2","author":"Gupta Swati","year":"2011","unstructured":"Swati Gupta and Deepti Gupta. 2011. Text-steganography: Review study & comparative analysis. International Journal of Computer Science and Information Technologies (IJCSIT) 2, 5 (2011), 2060\u20132062.","journal-title":"International Journal of Computer Science and Information Technologies (IJCSIT)"},{"key":"e_1_3_3_57_2","first-page":"28","volume-title":"Proceedings of the WASET International Conference on Computer, Information and Systems Science and Engineering","volume":"21","author":"Gutub Adnan","year":"2007","unstructured":"Adnan Gutub and Manal Mohammad Fattani. 2007. A novel Arabic text steganography method using letter points and extensions. In Proceedings of the WASET International Conference on Computer, Information and Systems Science and Engineering. Vol. 21, 28\u201331."},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10824-020-09379-z"},{"key":"e_1_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101952"},{"key":"e_1_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920309"},{"key":"e_1_3_3_61_2","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/3-540-61996-8_29","volume-title":"Proceedings of the 1st International Workshop on Information Hiding","author":"Handel Theodore G.","year":"1996","unstructured":"Theodore G. Handel and Maxwell T. Sandford II.1996. Hiding data in the OSI network model. In Proceedings of the 1st International Workshop on Information Hiding. 23\u201338."},{"key":"e_1_3_3_62_2","first-page":"115","volume-title":"Proceedings of the 10th USENIX Security Symposium","volume":"10","author":"Handley Mark","year":"2001","unstructured":"Mark Handley, Vern Paxson, and Christian Kreibich. 2001. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proceedings of the 10th USENIX Security Symposium. Vol. 10, 115\u2013131."},{"key":"e_1_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3487405.3487661"},{"key":"e_1_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3487405.3487660"},{"key":"e_1_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470117"},{"key":"e_1_3_3_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359794"},{"key":"e_1_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3338499.3357358"},{"key":"e_1_3_3_68_2","volume-title":"Proceedings of the International Conference on Nuclear Security: Sustaining and Strengthening Efforts","author":"Hildebrandt Mario","year":"2020","unstructured":"Mario Hildebrandt, Robert Altschaffel, Kevin Lamsh\u00f6ft, Mathias Lange, Martin Szemkus, Tom Neubert, Claus Vielhauer, Yongdian Ding, and Jana Dittmann. 2020. Threat analysis of steganographic and covert communication in nuclear I&C systems. In Proceedings of the International Conference on Nuclear Security: Sustaining and Strengthening Efforts."},{"key":"e_1_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.14"},{"key":"e_1_3_3_70_2","first-page":"8","volume-title":"Proceedings of the Symposium on Security and Privacy","author":"Hu Wei-Ming","year":"1991","unstructured":"Wei-Ming Hu. 1991. Reducing timing channels with fuzzy time. In Proceedings of the Symposium on Security and Privacy. IEEE, 8\u201320."},{"key":"e_1_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.10.005"},{"key":"e_1_3_3_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"e_1_3_3_73_2","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/978-3-319-66808-6_8","volume-title":"Proceedings of the International Cross-Domain Conference for Machine Learning and Knowledge Extraction.","author":"Iglesias F\u00e9lix","year":"2017","unstructured":"F\u00e9lix Iglesias, Valentin Bernhardt, Robert Annessi, and Tanja Zseby. 2017. Decision tree rule induction for detecting covert timing channels in TCP\/IP traffic. In Proceedings of the International Cross-Domain Conference for Machine Learning and Knowledge Extraction. Springer, 105\u2013122."},{"key":"e_1_3_3_74_2","first-page":"103","volume-title":"Proceedings of the International Symposium on Technology Management and Emerging Technologies (ISTMET\u201915)","author":"Iranmanesh Vahab","year":"2015","unstructured":"Vahab Iranmanesh, Ho Jing Wei, Sean Lee Dao-Ming, and Olasimbo Ayodeji Arigbabu. 2015. On using emoticons and lingoes for hiding data in SMS. In Proceedings of the International Symposium on Technology Management and Emerging Technologies (ISTMET\u201915). 103\u2013107."},{"key":"e_1_3_3_75_2","doi-asserted-by":"publisher","unstructured":"Bartosz Jankowski Wojciech Mazurczyk and Krzysztof Szczypiorski. 2010. Information hiding using improper frame padding. 2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS) Warsaw Poland 1\u20136. DOI:10.1109\/NETWKS.2010.5624901","DOI":"10.1109\/NETWKS.2010.5624901"},{"issue":"2","key":"e_1_3_3_76_2","first-page":"1101","article-title":"PadSteg: Introducing inter-protocol steganography","volume":"52","author":"Jankowski Bartosz","year":"2013","unstructured":"Bartosz Jankowski, Wojciech Mazurczyk, and Krzysztof Szczypiorski. 2013. PadSteg: Introducing inter-protocol steganography. Telecommunication Systems 52, 2 (2013), 1101\u20131111.","journal-title":"Telecommunication Systems"},{"key":"e_1_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCINS.2010.5541791"},{"key":"e_1_3_3_78_2","volume-title":"Proceedings of the International Conference on Information Science and Management Engineering (ISME\u201910)","volume":"1","author":"Jin Cong","year":"2010","unstructured":"Cong Jin, Dan Zhang, and Min Pan. 2010. Chinese text information hiding based on paraphrasing technology. In Proceedings of the International Conference on Information Science and Management Engineering (ISME\u201910) . Vol. 1."},{"key":"e_1_3_3_79_2","unstructured":"Neil F. Johnson and Stefan Katzenbeisser. 2000. A survey of steganographic techniques. Information Hiding Techniques for Steganography and Digital Watermarking Neil F. Johnson and Stefan Katzenbeisser (Eds.). Artech House 43\u201378."},{"key":"e_1_3_3_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168604"},{"key":"e_1_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.502225"},{"key":"e_1_3_3_82_2","first-page":"482","volume-title":"Proceedings of the International Conference on Computer and Electrical Engineering (ICCEE\u201909)","author":"Khairullah Md","year":"2009","unstructured":"Md Khairullah. 2009. A novel text steganography system using font color of the invisible characters in Microsoft Word documents. In Proceedings of the International Conference on Computer and Electrical Engineering (ICCEE\u201909). 482\u2013484."},{"key":"e_1_3_3_83_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.10.005"},{"key":"e_1_3_3_84_2","first-page":"534","volume-title":"Proceedings of the ACM AsiaCCS 2022","author":"Kim Sungwoo","year":"2022","unstructured":"Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan \u201dJohn\u201d Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, and Dave (Jing) Tian. 2022. ShadowAuth: Backward-compatible automatic CAN authentication for legacy ECUs. In Proceedings of the ACM AsiaCCS 2022. ACM, 534\u2013545."},{"key":"e_1_3_3_85_2","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/1161366.1161371","volume-title":"Proceedings of the 8th Workshop on Multimedia and Security (MMSEC\u201906)","author":"Kraetzer Christian","year":"2006","unstructured":"Christian Kraetzer, Jana Dittmann, Andreas Lang, and Tobias Kuehne. 2006. WLAN steganography: A first practical review. In Proceedings of the 8th Workshop on Multimedia and Security (MMSEC\u201906). 17\u201322."},{"key":"e_1_3_3_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2833063"},{"key":"e_1_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/3437880.3460413"},{"issue":"2","key":"e_1_3_3_88_2","first-page":"142","article-title":"A survey on image steganography and steganalysis.","volume":"2","author":"Li Bin","year":"2011","unstructured":"Bin Li, Junhui He, Jiwu Huang, and Yun Qing Shi. 2011. A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing 2, 2 (2011), 142\u2013172.","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"e_1_3_3_89_2","first-page":"1503","volume-title":"Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing","author":"Li Lingjun","year":"2008","unstructured":"Lingjun Li, Liusheng Huang, Xinxin Zhao, Wei Yang, and Zhili Chen. 2008. A statistical attack on a kind of word-shift TextSteganography. In Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing. 1503\u20131507."},{"key":"e_1_3_3_90_2","volume-title":"A Covert Channel Analysis of a Real Switch","author":"Li Xun","year":"2011","unstructured":"Xun Li, Yuanyang Zhang, Fred Chong, and Ben Y. Zhao. 2011. A Covert Channel Analysis of a Real Switch. Technical Report. Department of Computer Science, University of California, Santa Barbara."},{"key":"e_1_3_3_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427268"},{"key":"e_1_3_3_92_2","first-page":"853","volume-title":"Proceedings of the INFOCOM\u201995","author":"Low Steven H.","year":"1995","unstructured":"Steven H. Low, Nicholas F. Maxemchuk, Jack T. Brassil, and Lawrence O\u2019Gorman. 1995. Document marking and identification using both line and word shifting. In Proceedings of the INFOCOM\u201995 . 853\u2013860."},{"key":"e_1_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6815916"},{"key":"e_1_3_3_94_2","first-page":"147","volume-title":"Proceedings of the International Workshop on Privacy Enhancing Technologies","author":"Lucena Norka B.","year":"2005","unstructured":"Norka B. Lucena, Grzegorz Lewandowski, and Steve J. Chapin. 2005. Covert channels in IPv6. In Proceedings of the International Workshop on Privacy Enhancing Technologies. Springer, 147\u2013166."},{"key":"e_1_3_3_95_2","volume-title":"Proceedings of the 6th Information Hiding Workshop","author":"Lucena Norka B.","year":"2004","unstructured":"Norka B. Lucena, James Pease, Payman Yadollahpour, and Steve J. Chapin. 2004. Syntax and semantics-preserving application-layer protocol steganography. In Proceedings of the 6th Information Hiding Workshop ."},{"key":"e_1_3_3_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/3453155"},{"key":"e_1_3_3_97_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-009-0530-1"},{"key":"e_1_3_3_98_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1224-8"},{"key":"e_1_3_3_99_2","first-page":"65","volume-title":"Covert Channels in SIP for VoIP Signalling","author":"Mazurczyk Wojciech","year":"2008","unstructured":"Wojciech Mazurczyk and Krzysztof Szczypiorski. 2008. Covert Channels in SIP for VoIP Signalling. Springer, 65\u201372."},{"key":"e_1_3_3_100_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9362-7"},{"key":"e_1_3_3_101_2","doi-asserted-by":"publisher","DOI":"10.1145\/3158416"},{"key":"e_1_3_3_102_2","first-page":"10:1\u201310","volume-title":"Proceedings of the ARES\u201918","author":"Mazurczyk Wojciech","year":"2018","unstructured":"Wojciech Mazurczyk, Steffen Wendzel, and Krzysztof Cabaj. 2018. Towards deriving insights into data hiding methods using pattern-based approach. In Proceedings of the ARES\u201918. ACM, 10:1\u201310."},{"key":"e_1_3_3_103_2","doi-asserted-by":"publisher","DOI":"10.5555\/3019381"},{"key":"e_1_3_3_104_2","first-page":"463","volume-title":"Proceedings of the International Workshop on Information Hiding","author":"McDonald Andrew D.","year":"1999","unstructured":"Andrew D. McDonald and Markus G. Kuhn. 1999. StegFS: A steganographic file system for Linux. In Proceedings of the International Workshop on Information Hiding. Springer, 463\u2013477."},{"key":"e_1_3_3_105_2","first-page":"540","volume-title":"Proceedings of the 2009 International Conference on Information Technology and Computer Science","volume":"2","author":"Meng Peng","year":"2009","unstructured":"Peng Meng, Liusheng Hang, Wei Yang, Zhili Chen, and Hu Zheng. 2009. Linguistic steganography detection algorithm using statistical language model. In Proceedings of the 2009 International Conference on Information Technology and Computer Science. Vol. 2, IEEE, 540\u2013543."},{"issue":"2","key":"e_1_3_3_106_2","first-page":"45","article-title":"Covert channels in TCP\/IP protocol stack-extended version","volume":"4","author":"Mileva Aleksandra","year":"2014","unstructured":"Aleksandra Mileva and Boris Panajotov. 2014. Covert channels in TCP\/IP protocol stack-extended version. Open Computer Science 4, 2 (2014), 45\u201366.","journal-title":"Open Computer Science"},{"key":"e_1_3_3_107_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102207"},{"key":"e_1_3_3_108_2","volume-title":"Proceedings of the SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents IX","volume":"6505","author":"Murphy Brian","year":"2007","unstructured":"Brian Murphy and Carl Vogel. 2007. The syntax of concealment: Reliable methods for plain text information hiding. In Proceedings of the SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents IX. Vol. 6505."},{"key":"e_1_3_3_109_2","first-page":"S76\u2013S86","article-title":"Time is on my side: Steganography in filesystem metadata","volume":"18","author":"Neuner Sebastian","year":"2016","unstructured":"Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Stefan Brunthaler, Stefan Katzenbeisser, and Edgar R. Weippl. 2016. Time is on my side: Steganography in filesystem metadata. Digital Investigation 18 (2016), S76\u2013S86. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1742287616300433","journal-title":"Digital Investigation"},{"key":"e_1_3_3_110_2","volume-title":"Proceedings of the 2014 Zone 1 Conference of the American Society for Engineering Education","author":"Odeh Ammar","year":"2014","unstructured":"Ammar Odeh, Khaled Elleithy, and Miad Faezipour. 2014. Steganography in text by using MS word symbols. In Proceedings of the 2014 Zone 1 Conference of the American Society for Engineering Education."},{"key":"e_1_3_3_111_2","doi-asserted-by":"publisher","DOI":"10.5555\/893559"},{"key":"e_1_3_3_112_2","volume-title":"Proceedings of the International Conference on Neural Information Processing Systems","author":"Pan Xudong","year":"2022","unstructured":"Xudong Pan, Shengyao Zhang, Mi Zhang, and Min Yang. 2022. House of Cans: Covert transmission of internal datasets via capacity-aware neuron steganography. In Proceedings of the International Conference on Neural Information Processing Systems."},{"key":"e_1_3_3_113_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.15"},{"key":"e_1_3_3_114_2","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1109\/ICDE.2003.1260829","volume-title":"Proceedings of the 19th International Conference on Data Engineering (Cat. No. 03CH37405)","author":"Pang HweeHwa","year":"2003","unstructured":"HweeHwa Pang, Kian-Lee Tan, and Xuan Zhou. 2003. StegFS: A steganographic file system. In Proceedings of the 19th International Conference on Data Engineering (Cat. No. 03CH37405). IEEE, 657\u2013667."},{"key":"e_1_3_3_115_2","unstructured":"Reshad Patuck and Julio Hernandez-Castro. 2013. Steganography using the extensible messaging and presence protocol (XMPP). arXiv:1310.0524. Retrieved from https:\/\/arxiv.org\/abs\/1310.0524"},{"key":"e_1_3_3_116_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23078"},{"key":"e_1_3_3_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"e_1_3_3_118_2","first-page":"1","volume-title":"Designing Privacy Enhancing Technologies","author":"Pfitzmann Andreas","year":"2001","unstructured":"Andreas Pfitzmann and Marit K\u00f6hntopp. 2001. Anonymity, unobservability, and pseudonymity\u2013A proposal for terminology. In Designing Privacy Enhancing Technologies, Hannes Federrath (Ed.). Springer, 1\u20139."},{"key":"e_1_3_3_119_2","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/3-540-61996-8_52","volume-title":"Proceedings of the 1st International Workshop on Information Hiding","volume":"1174","author":"Pfitzmann Birgit","year":"1996","unstructured":"Birgit Pfitzmann. 1996. Information hiding terminology - Results of an informal plenary meeting and additional proposals. In Proceedings of the 1st International Workshop on Information Hiding(LNCS, Vol. 1174). Springer, 347\u2013350."},{"key":"e_1_3_3_120_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.12.023"},{"key":"e_1_3_3_121_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2009.5178971"},{"key":"e_1_3_3_122_2","first-page":"6043","volume-title":"Proceedings of the 2015 IEEE International Conference on Communications (ICC\u201915)","author":"Ravaioli Riccardo","year":"2015","unstructured":"Riccardo Ravaioli, Guillaume Urvoy-Keller, and Chadi Barakat. 2015. Characterizing ICMP rate limitation on routers. In Proceedings of the 2015 IEEE International Conference on Communications (ICC\u201915). IEEE, 6043\u20136049."},{"key":"e_1_3_3_123_2","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2021.3059664"},{"key":"e_1_3_3_124_2","volume-title":"Proceedings of the IFIP TC 11 27th International Information Security Conference","author":"Rios Ruben","year":"2012","unstructured":"Ruben Rios, Jose A. Onieva, and Javier Lopez. 2012. HIDE_DHCP: Covert communications through network configuration messages. In Proceedings of the IFIP TC 11 27th International Information Security ConferenceSpringer."},{"issue":"5","key":"e_1_3_3_125_2","article-title":"Covert Channels in the TCP\/IP protocol suite","volume":"2","author":"Rowland Craig H.","year":"1997","unstructured":"Craig H. Rowland. 1997. Covert Channels in the TCP\/IP protocol suite. First Monday 2, 5 (May1997). Retrieved from https:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/528\/449","journal-title":"First Monday"},{"key":"e_1_3_3_126_2","unstructured":"Joanna Rutkowska. 2004. The implementation of passive covert channels in the Linux kernel. InProceedings of the21st Chaos Communication Congress. Retrieved from http:\/\/events.ccc.de\/congress\/2004\/fahrplan\/files\/319-passive-covert-channels-slides.pdf"},{"key":"e_1_3_3_127_2","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/978-3-642-33167-1_15","volume-title":"Computer Security \u2013 ESORICS 2012 LNCS","author":"Sadeghi Ahmad-Reza","year":"2012","unstructured":"Ahmad-Reza Sadeghi, Steffen Schulz, and Vijay Varadharajan. 2012. The silence of the LANs: Efficient leakage resilience for IPsec VPNs. In Computer Security \u2013 ESORICS 2012 LNCS, Sara Foresti, Moti Yung, and Fabio Martinelli (Eds.). Vol. 7459, Springer, 253\u2013270."},{"key":"e_1_3_3_128_2","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517418"},{"key":"e_1_3_3_129_2","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3544455"},{"key":"e_1_3_3_130_2","volume-title":"Proceedings of the ARES 2019","author":"Schmidbauer Tobias","year":"2019","unstructured":"Tobias Schmidbauer, Steffen Wendzel, Aleksandra Mileva, and Wojciech Mazurczyk. 2019. Introducing dead drops to network steganography using ARP-caches and SNMP-Walks. In Proceedings of the ARES 2019. ACM."},{"key":"e_1_3_3_131_2","first-page":"1","volume-title":"Proceedings of the ARES 2017","author":"Schmidt Sabine","year":"2017","unstructured":"Sabine Schmidt, Wojciech Mazurczyk, J\u00f6rg Keller, and Luca Caviglione. 2017. A new data-hiding approach for IP telephony applications with silence suppression. In Proceedings of the ARES 2017. 1\u20136."},{"key":"e_1_3_3_132_2","first-page":"59","volume-title":"Proceedings of the USENIX Security Symposium","author":"Shah Gaurav","year":"2006","unstructured":"Gaurav Shah, Andres Molina, and Matt Blaze. 2006. Keyboards and covert channels. In Proceedings of the USENIX Security Symposium59\u201375."},{"key":"e_1_3_3_133_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3323732"},{"key":"e_1_3_3_134_2","first-page":"1912","volume-title":"Proceedings of the 10th International Conference on Advanced Communication Technology (ICACT\u201908)","volume":"3","author":"Shirali-Shahreza Mohammad","year":"2008","unstructured":"Mohammad Shirali-Shahreza. 2008. Text steganography by changing words spelling. In Proceedings of the 10th International Conference on Advanced Communication Technology (ICACT\u201908) . Vol. 3, 1912\u20131913."},{"issue":"2","key":"e_1_3_3_135_2","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1109\/TDSC.2015.2423680","article-title":"A support vector machine-based framework for detection of covert timing channels","volume":"13","author":"Shrestha Pradhumna Lal","year":"2015","unstructured":"Pradhumna Lal Shrestha, Michael Hempel, Fahimeh Rezaei, and Hamid Sharif. 2015. A support vector machine-based framework for detection of covert timing channels. IEEE Transactions on Dependable and Secure Computing 13, 2 (2015), 274\u2013283.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_3_136_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134077"},{"key":"e_1_3_3_137_2","first-page":"180","volume-title":"Proceedings of the International Workshop on Digital Watermarking (IWDW\u201918)","author":"Song Chang","year":"2018","unstructured":"Chang Song, Yifeng Zhang, and Guojun Lu. 2018. Reversible data hiding in encrypted images based on image partition and spatial correlation. In Proceedings of the International Workshop on Digital Watermarking (IWDW\u201918). 180\u2013194."},{"key":"e_1_3_3_138_2","first-page":"248","volume-title":"Proceedings of the International Workshop on Digital Watermarking","author":"Spiekermann Daniel","year":"2017","unstructured":"Daniel Spiekermann, J\u00f6rg Keller, and Tobias Eggendorfer. 2017. Towards covert channels in cloud environments: A study of implementations in virtual networks. In Proceedings of the International Workshop on Digital Watermarking. Springer, 248\u2013262."},{"key":"e_1_3_3_139_2","unstructured":"Daniel St\u00f8dle. 2011. Ping Tunnel. Retrieved April 2 2025 from http:\/\/www.cs.uit.no\/daniels\/PingTunnel\/"},{"key":"e_1_3_3_140_2","first-page":"25","volume-title":"Proceedings of the SECURWARE 2014","author":"Stojanov Ivan","year":"2014","unstructured":"Ivan Stojanov, Aleksandra Mileva, and Igor Stojanovic. 2014. A new property coding in text steganography of Microsoft Word documents. In Proceedings of the SECURWARE 2014 . 25\u201330."},{"key":"e_1_3_3_141_2","doi-asserted-by":"publisher","DOI":"10.1145\/3664476.3670886"},{"key":"e_1_3_3_142_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3168018"},{"issue":"9","key":"e_1_3_3_143_2","first-page":"1203","article-title":"Machine learning methods for anomaly detection in BACnet networks.","volume":"22","author":"Tonejc Jernej","year":"2016","unstructured":"Jernej Tonejc, Sabrina G\u00fcttes, Alexandra Kobekova, and Jaspreet Kaur. 2016. Machine learning methods for anomaly detection in BACnet networks. Journal of Universal Computer Science 22, 9 (2016), 1203\u20131224.","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_3_144_2","first-page":"693","volume-title":"Proceedings of the HAS 2015","author":"Tonejc Jernej","year":"2015","unstructured":"Jernej Tonejc, Jaspreet Kaur, Adrian Karsten, and Steffen Wendzel. 2015. Visualizing BACnet data to facilitate humans in building-security decision-making. In Proceedings of the HAS 2015. Springer, 693\u2013704."},{"key":"e_1_3_3_145_2","volume-title":"Proceedings of the SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents IX","volume":"6505","author":"Topkara Mercan","year":"2007","unstructured":"Mercan Topkara, Umut Taskiran, and Mikhail J. Atallah. 2007. Information hiding through errors: A confusing approach. In Proceedings of the SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents IX, Vol. 6505."},{"key":"e_1_3_3_146_2","series-title":"LNCS","first-page":"220","volume-title":"Proceedings of the International Conference on Information Hiding 2007","volume":"4567","author":"Troncoso Carmela","year":"2007","unstructured":"Carmela Troncoso, Claudia D\u00edaz, Orr Dunkelman, and Bart Preneel. 2007. Traffic analysis attacks on a continuously-observable steganographic file system. In Proceedings of the International Conference on Information Hiding 2007(LNCS, Vol. 4567). Springer, 220\u2013236."},{"key":"e_1_3_3_147_2","first-page":"100","volume-title":"Proceedings of the ICISSP 2019","author":"Ulz Thomas","year":"2019","unstructured":"Thomas Ulz, Markus Feldbacher, Thomas Pieber, and Christian Steger. 2019. Sensing danger: Exploiting sensors to build covert channels. In Proceedings of the ICISSP 2019. 100\u2013113."},{"key":"e_1_3_3_148_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2951425"},{"key":"e_1_3_3_149_2","volume-title":"Proc. SPIE Electr. Imag. VIII","author":"Vill\u00e1n Renato","year":"2006","unstructured":"Renato Vill\u00e1n, Svyatoslav V. Voloshynovskiy, Oleksiy Koval, Jose Vila, Emre Topak, Fr\u00e9d\u00e9ric Deguillaume, Yuriy B. Rytsar, and Tejendra Pun. 2006. Text data-hiding for digital and printed documents: Theoretical and practical considerations. In Proc. SPIE Electr. Imag. VIII, Vol. 6072."},{"key":"e_1_3_3_150_2","first-page":"457","volume-title":"Proceedings of the Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA\u201909)","author":"Wang Zhi-Hui","year":"2009","unstructured":"Zhi-Hui Wang, The Duc Kieu, Chin-Chin Chang, and Ming-Chu Li. 2009. Emoticon-based text steganography in chat. In Proceedings of the Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA\u201909) . 457\u2013460."},{"key":"e_1_3_3_151_2","article-title":"Convolutional neural network based text steganalysis","volume":"26","author":"Wen Juan","year":"2019","unstructured":"Juan Wen, Xuejing Zhou, Ping Zhong, and Yiming Xuen. 2019. Convolutional neural network based text steganalysis. IEEE Signal Processing Letters 26, 3 (2019), 460\u2013464.","journal-title":"IEEE Signal Processing Letters"},{"key":"e_1_3_3_152_2","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470069"},{"key":"e_1_3_3_153_2","first-page":"731","volume-title":"Proceedings of the 2012 International Conference on Green Computing and Communications","author":"Wendzel Steffen","year":"2012","unstructured":"Steffen Wendzel, Benjamin Kahler, and Thomas Rist. 2012. Covert channels and their prevention in building automation protocols: A prototype exemplified using BACnet. In Proceedings of the 2012 International Conference on Green Computing and Communications. IEEE, 731\u2013736."},{"issue":"3","key":"e_1_3_3_154_2","first-page":"81","article-title":"Preventing protocol switching covert channels","volume":"5","author":"Wendzel Steffen","year":"2012","unstructured":"Steffen Wendzel and J\u00f6rg Keller. 2012. Preventing protocol switching covert channels. International Journal on Advances in Security 5, 3 and 4 (2012), 81\u201393.","journal-title":"International Journal on Advances in Security"},{"key":"e_1_3_3_155_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-014-0423-x"},{"key":"e_1_3_3_156_2","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2017.40"},{"key":"e_1_3_3_157_2","doi-asserted-by":"publisher","DOI":"10.3217\/jucs-022-11-1456"},{"key":"e_1_3_3_158_2","doi-asserted-by":"publisher","DOI":"10.3217\/jucs-021-12-1684"},{"key":"e_1_3_3_159_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2012.6423628"},{"key":"e_1_3_3_160_2","doi-asserted-by":"publisher","DOI":"10.1145\/2684195"},{"key":"e_1_3_3_161_2","series-title":"LNCS","first-page":"89","volume-title":"Proc. LAN Security","author":"Wolf Manfred","year":"1989","unstructured":"Manfred Wolf. 1989. Covert channels in LAN protocols. In Proc. LAN Security. LNCS, Vol. 396. Springer, 89\u2013101."},{"key":"e_1_3_3_162_2","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/SPW.2018.00012","volume-title":"Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW\u201918)","author":"Woodbridge Jonathan","year":"2018","unstructured":"Jonathan Woodbridge, Hyrum S. Anderson, Anjum Ahuja, and Daniel Grant. 2018. Detecting homoglyph attacks with a siamese neural network. In Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW\u201918). IEEE, 22\u201328."},{"key":"e_1_3_3_163_2","doi-asserted-by":"publisher","DOI":"10.1177\/1550147720914257"},{"key":"e_1_3_3_164_2","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2007.70"},{"key":"e_1_3_3_165_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1313-8"},{"key":"e_1_3_3_166_2","article-title":"FontCode: Embedding information in text documents using glyph perturbation","author":"Xiao Chang","year":"2017","unstructured":"Chang Xiao, Cheng Zhang, and Changxi Zheng. 2017. FontCode: Embedding information in text documents using glyph perturbation. ACM Transactions on Graphics 37, 2 (December2017), 1\u201316.","journal-title":"ACM Transactions on Graphics"},{"key":"e_1_3_3_167_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00034"},{"key":"e_1_3_3_168_2","article-title":"A fast and efficient text steganalysis method","volume":"26","author":"Yang Zhongliang","year":"2019","unstructured":"Zhongliang Yang, Yongfeng Huang, and Yu-Jin Zhang. 2019. A fast and efficient text steganalysis method. IEEE Signal Processing Letters 26, 4 (2019), 627\u2013631.","journal-title":"IEEE Signal Processing Letters"},{"key":"e_1_3_3_169_2","article-title":"TS-RNN: Text steganalysis based on recurrent neural networks","volume":"26","author":"Yang Zhongliang","year":"2019","unstructured":"Zhongliang Yang, Ke Wang, Jian Li, Yongfeng Huang, and Yu-Jin Zhang. 2019. TS-RNN: Text steganalysis based on recurrent neural networks. IEEE Signal Processing Letters 26, 12 (2019), 1743\u20131747.","journal-title":"IEEE Signal Processing Letters"},{"key":"e_1_3_3_170_2","volume-title":"Digital Forensics and Watermarking","author":"Yang Zhongliang","year":"2019","unstructured":"Zhongliang Yang, Nan Wei, Qinghe Liu, Yongfeng Huang, and Yujin Zhang. 2019. GAN-TStega: Text steganography based on generative adversarial networks. In Digital Forensics and Watermarking, Hongxia Wang, Xianfeng Zhao, Yunqing Shi, Hyoung Joong Kim, and Alessandro Piva (Eds.). LNCS, Vol. 12022, Springer, 18\u201331."},{"issue":"5","key":"e_1_3_3_171_2","doi-asserted-by":"crossref","first-page":"1280","DOI":"10.1109\/TIFS.2018.2871746","article-title":"RNN-Stega: Linguistic steganography based on recurrent neural networks","volume":"14","author":"Yang Zhong-Liang","year":"2018","unstructured":"Zhong-Liang Yang, Xiao-Qing Guo, Zi-Ming Chen, Yong-Feng Huang, and Zhang Yu-Jin. 2018. RNN-Stega: Linguistic steganography based on recurrent neural networks. IEEE Transactions on Information Forensics and Security 14, 5 (2018), 1280\u20131295.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_3_172_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"e_1_3_3_173_2","first-page":"215","volume-title":"Proceedings of the 2008 33rd IEEE Conference on Local Computer Networks (LCN\u201908)","author":"Zander Sebastian","year":"2008","unstructured":"Sebastian Zander, Grenville Armitage, and Philip Branch. 2008. Covert channels in multiplayer first person shooter online games. In Proceedings of the 2008 33rd IEEE Conference on Local Computer Networks (LCN\u201908). IEEE, 215\u2013222."},{"key":"e_1_3_3_174_2","first-page":"458","volume-title":"IFIP Networking","author":"Zander Sebastian","year":"2011","unstructured":"Sebastian Zander, Grenville Armitage, and Philip Branch. 2011. Stealthier inter-packet timing covert channels. In IFIP Networking, Jordi Domingo-Pascual, Pietro Manzoni, Ana Pont, Sergio Palazzo, and Caterina Scoglio (Eds.). Springer, Berlin, 458\u2013470."},{"key":"e_1_3_3_175_2","first-page":"277","volume-title":"Proceedings of the International Conference on Information Retrieval & Knowledge Management.","author":"Zawawi M. N.","year":"2012","unstructured":"M. N. Zawawi, Ramlan Mahmod, Nur Izura Udzir, Fatimah Ahmad, and J. M. Desa. 2012. Active warden as the main hindrance for steganography information retrieval. In Proceedings of the International Conference on Information Retrieval & Knowledge Management. IEEE, 277\u2013280."},{"key":"e_1_3_3_176_2","first-page":"1211","volume-title":"Proceedings of the ICME","author":"Zeng Yuwei","year":"2023","unstructured":"Yuwei Zeng, Jingxuan Tan, Zhengxin You, Zhenxing Qian, and Xinpeng Zhang. 2023. Watermarks for generative adversarial network based on steganographic invisible backdoor. In Proceedings of the ICME. 1211\u20131216."},{"key":"e_1_3_3_177_2","first-page":"451","volume-title":"Proceedings of the 2nd International Conference on Power Electronics and Intelligent Transportation System (PEITS\u201909)","author":"Zhiyong Cai","year":"2009","unstructured":"Cai Zhiyong and Zhang Yong. 2009. Entropy based taxonomy of network convert channels. In Proceedings of the 2nd International Conference on Power Electronics and Intelligent Transportation System (PEITS\u201909). 451\u2013455."},{"key":"e_1_3_3_178_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2004.1320028"},{"key":"e_1_3_3_179_2","doi-asserted-by":"publisher","DOI":"10.1145\/2566590.2566610"},{"key":"e_1_3_3_180_2","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-3-030-03638-6_13","volume-title":"Secure IT Systems","author":"Zillien Sebastian","year":"2018","unstructured":"Sebastian Zillien and Steffen Wendzel. 2018. Detection of covert channels in TCP retransmissions. In Secure IT Systems, Nils Gruschka (Ed.). Springer, 203\u2013218."},{"key":"e_1_3_3_181_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3241451"},{"key":"e_1_3_3_182_2","series-title":"LNCS","first-page":"1079","volume-title":"Proceedings of the KES 2005, Part III","volume":"3683","author":"Zou Xin-guang","year":"2005","unstructured":"Xin-guang Zou, Qiong Li, Sheng-He Sun, and Xiamu Niu. 2005. The research on information hiding based on command sequence of FTP protocol. In Proceedings of the KES 2005, Part III(LNCS, Vol. 3683). Springer, 1079\u20131085."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3729165","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3729165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:18:48Z","timestamp":1750281528000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3729165"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,6]]},"references-count":181,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,9,30]]}},"alternative-id":["10.1145\/3729165"],"URL":"https:\/\/doi.org\/10.1145\/3729165","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.20215373.v2","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.20215373.v1","asserted-by":"object"}]},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,6]]},"assertion":[{"value":"2022-07-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-02","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}