{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:31:14Z","timestamp":1761611474021},"reference-count":23,"publisher":"IGI Global","issue":"2","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4,1]]},"abstract":"<p>Delay tolerant networks (DTNs) represent a class of intermittently connected networks. In such networks, messages are hard to track since they are transmitted by opportunistic encounters between mobile nodes. This feature makes DTN an appropriate masking channel for information hiding systems. However, the DTN often has poor communication quality, given that it suffers from frequent disruptions. In order to improve the communication quality of DTN and meet the needs of information hiding system, an efficient routing strategy is proposed in this article. On the other hand, in information hiding systems, a relatively long Time-To-Live (TTL) of messages will increase the risk of the message being exposed. To achieve a balance between delivery ratio and concealment, the sensitivity of message TTL is analyzed and a suitable value of lifetime is given. Finally, the simulation results show that the proposed algorithm can improve the effectiveness of message transmission, and the DTN can be used as masking channel to realize information hiding system.<\/p>","DOI":"10.4018\/ijdcf.2019040103","type":"journal-article","created":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T15:12:45Z","timestamp":1550848365000},"page":"34-46","source":"Crossref","is-referenced-by-count":1,"title":["Exploiting Routing Strategy of DTN for Message Forwarding in Information Hiding Applications"],"prefix":"10.4018","volume":"11","author":[{"given":"Shuangkui","family":"Xia","sequence":"first","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Meihua","family":"Liu","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Xinchen","family":"Zhang","sequence":"additional","affiliation":[{"name":"Huazhong Normal University Wuhan, China"}]},{"given":"Hong","family":"Sun","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Mao","family":"Tian","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]}],"member":"2432","reference":[{"key":"IJDCF.2019040103-0","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.2017100105"},{"key":"IJDCF.2019040103-1","doi-asserted-by":"crossref","unstructured":"Cox, I. J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society, 6(12), 1673.","DOI":"10.1109\/83.650120"},{"key":"IJDCF.2019040103-2","doi-asserted-by":"crossref","unstructured":"Fall, K. (2003). Delay-tolerant network architecture for challenged internets. Sigcomm03 Aug, 33(4), 27-34.","DOI":"10.1145\/863955.863960"},{"key":"IJDCF.2019040103-3","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.888345"},{"key":"IJDCF.2019040103-4","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/2714595"},{"key":"IJDCF.2019040103-5","doi-asserted-by":"publisher","DOI":"10.2991\/meici-15.2015.237"},{"key":"IJDCF.2019040103-6","doi-asserted-by":"crossref","unstructured":"Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., & Diot, C. (2005). Pocket switched networks and human mobility in conference environments. ACM SIGCOMM Workshop on Delay-Tolerant NETWORKING (pp.244-251). ACM.","DOI":"10.1145\/1080139.1080142"},{"key":"IJDCF.2019040103-7","doi-asserted-by":"crossref","unstructured":"Hui,P, J. Crowcroft, & E. Yonek. (2010). Bubble Rap: social based forwarding in delay tolerant networks. Mobile Computing, IEEE Transactions on, November 10(11), 1576-1589.","DOI":"10.1109\/TMC.2010.246"},{"key":"IJDCF.2019040103-8","year":"2005","journal-title":"Research on information hiding techniques"},{"key":"IJDCF.2019040103-9","unstructured":"Johnson, N. F., & Katzenbeisser, S. C. (2000). A survey of steganographic techniques."},{"key":"IJDCF.2019040103-10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364055"},{"key":"IJDCF.2019040103-11","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaSIP.2015.7230525"},{"key":"IJDCF.2019040103-12","doi-asserted-by":"publisher","DOI":"10.1145\/961268.961272"},{"key":"IJDCF.2019040103-13","author":"Z.Liu","year":"2015","journal-title":"Summary of the research based on information hiding technique"},{"key":"IJDCF.2019040103-14","article-title":"Spread-Spectrum Information Hiding with PN_Sequence Mask.","author":"L.Ming","year":"2016","journal-title":"The Twelfth National Conference on Information Hiding and Multimedia Information Security"},{"key":"IJDCF.2019040103-15","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1260729"},{"issue":"12","key":"IJDCF.2019040103-16","article-title":"Physical layer security based on spread-spectrum watermarking and jamming receiver.","volume":"27","author":"S.Soderi","year":"2017","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"IJDCF.2019040103-17","doi-asserted-by":"publisher","DOI":"10.1145\/1080139.1080143"},{"issue":"4","key":"IJDCF.2019040103-18","first-page":"343","author":"A.Survey","journal-title":"Journal of Electronics (China)"},{"key":"IJDCF.2019040103-19","unstructured":"Vahdat, A., & Becker, D. (2000). Epidemic routing for partially-connected ad hoc networks. Master Thesis."},{"key":"IJDCF.2019040103-20","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1087.2010.02272"},{"issue":"3","key":"IJDCF.2019040103-21","first-page":"1","article-title":"Adaptive real-time reversible data hiding for jpeg images.","author":"C. N.Yang","year":"2016","journal-title":"Journal of Real-Time Image Processing"},{"key":"IJDCF.2019040103-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.011"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=223940","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T01:48:47Z","timestamp":1651888127000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2019040103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,4,1]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2019040103","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,1]]}}}