Ahlswede, R., Cai, N., Li, S. R., and Yeung, R. W. (2000).
Network information flow. IEEE Trans. Information
Theory, 46(4):1204–1216.
Bender, W., Gruhl, D., Morimoto, N., and Lu, A. (1996).
Techniques for data hiding. IBM Systems Journal,
35(3/4):313–336.
Bierbrauer, J. and Fridrich, J. J. (2008). Constructing good
covering codes for applications in steganography.
Trans. Data Hiding and Multimedia Security, 3:1–22.
Biswas, S. and Morris, R. T. (2004). Opportunistic routing
in multi-hop wireless networks. Computer Communi-
cation Review, 34(1):69–74.
Chachulski, S., Jennings, M., Katti, S., and Katabi, D.
(2007). Trading structure for randomness in wire-
less opportunistic routing. In Proceedings of the
ACM SIGCOMM 2007 Conference on Applications,
Technologies, Architectures, and Protocols for Com-
puter Communications, Kyoto, Japan, August 27-31,
2007, pages 169–180.
Couto, D. S. J. D., Aguayo, D., Bicket, J. C., and Morris,
R. T. (2003). A high-throughput path metric for multi-
hop wireless routing. In Proceedings of the Ninth An-
nual International Conference on Mobile Computing
and Networking, MOBICOM 2003, 2003, San Diego,
CA, USA, September 14-19, 2003, pages 134–146.
Gentle, J. E. (2012). Numerical linear algebra for applicati-
ons in statistics. Springer Science & Business Media,
2012.
G
´
omez, D., Garrido, P., Rodr
´
ıguez, E., Ag
¨
uero, R., and
Mu
˜
noz, L. (2014). Enhanced opportunistic random
linear source/network coding with cross-layer techni-
ques over wireless mesh networks. In 2014 IFIP Wi-
reless Days, WD 2014, Rio de Janeiro, Brazil, Novem-
ber 12-14, 2014, pages 1–4.
Grabski, S. and Szczypiorski, K. (2013). Steganography
in OFDM symbols of fast IEEE 802.11n networks.
In 2013 IEEE Symposium on Security and Privacy
Workshops, San Francisco, CA, USA, May 23-24,
2013, pages 158–164.
Ho, T., Koetter, R., Medard, M., Karger, D. R., and Ef-
fros, M. (2003). The benefits of coding over routing
in a randomized setting. IEEE Int. Symp. Information
Theory, page 442.
Horn, R. A. and Johnson, C. R. (1994). Topics in matrix
analysis. Cambridge University Press.
Jankowski, B., Mazurczyk, W., and Szczypiorski, K.
(2013). Padsteg: introducing inter-protocol stega-
nography. Telecommunication Systems, 52(2):1101–
1111.
Justel, A., Pe
˜
na, D., and Zamar, R. (1997). A multivariate
kolmogorov-smirnov test of goodness of fit. Statistics
& Probability Letters, 35(3):251–259.
Kaur, J., Wendzel, S., and Meier, M. (2015). Counter-
measures for covert channel-internal control proto-
cols. In Availability, Reliability and Security (ARES),
2015 10th International Conference on, pages 422–
428. IEEE.
Koetter, R. and M
´
edard, M. (2003). An algebraic ap-
proach to network coding. IEEE/ACM Trans. Netw.,
11(5):782–795.
Kr
¨
atzer, C., Dittmann, J., Lang, A., and K
¨
uhne, T. (2006).
WLAN steganography: a first practical review. In Pro-
ceedings of the 8th workshop on Multimedia & Secu-
rity, MM&Sec 2006, Geneva, Switzerland, September
26-27, 2006, pages 17–22.
Kundur, D. and Ahsan, K. (2003). Practical internet stega-
nography: data hiding in IP. Proc. Texas wksp. secu-
rity of information systems.
Li, S. R., Yeung, R. W., and Cai, N. (2003). Linear network
coding. IEEE Trans. Information Theory, 49(2):371–
381.
Mazurczyk, W. and Caviglione, L. (2015). Stegano-
graphy in modern smartphones and mitigation techni-
ques. IEEE Communications Surveys and Tutorials,
17(1):334–357.
Mazurczyk, W., Smolarczyk, M., and Szczypiorski, K.
(2011). Retransmission steganography and its de-
tection. Soft Comput., 15(3):505–515.
Mazurczyk, W., Szaga, P., and Szczypiorski, K. (2014).
Using transcoding for hidden communication in IP te-
lephony. Multimedia Tools Appl., 70(3):2139–2165.
Mazurczyk, W. and Szczypiorski, K. (2008). Covert chan-
nels in sip for voip signalling. In Global e-security,
pages 65–72. Springer.
Pahlevani, P., Lucani, D. E., Pedersen, M. V., and Fitzek,
F. H. P. (2013). Playncool: Opportunistic network co-
ding for local optimization of routing in wireless mesh
networks. In Workshops Proceedings of the Global
Communications Conference, GLOBECOM 2013, At-
lanta, GA, USA, December 9-13, 2013, pages 812–
817.
Pandi, S., Fitzek, F. H., Pihl, J., Pedersen, M. V., and Lu-
cani, D. (2015). Sending policies in dynamic wireless
mesh using network coding. In European Wireless
2015; 21th European Wireless Conference; Procee-
dings of, pages 1–7.
Sundararajan, J. K., Shah, D., M
´
edard, M., Mitzenmacher,
M., and Barros, J. (2009). Network coding meets
TCP. In INFOCOM 2009. 28th IEEE Internatio-
nal Conference on Computer Communications, Joint
Conference of the IEEE Computer and Communicati-
ons Societies, 19-25 April 2009, Rio de Janeiro, Bra-
zil, pages 280–288.
Szczypiorski, K. (2003). Steganography in TCP/IP net-
works. In State of the Art and a Proposal of a New
System–HICCUPS, Institute of Telecommunications’
seminar, Warsaw University of Technology, Poland.
Szczypiorski, K. and Mazurczyk, W. (2016). Stegano-
graphy in IEEE 802.11 OFDM symbols. Security and
Communication Networks, 9(2):118–129.
Van Horenbeeck, M. (2006). Deception on the network:
thinking differently about covert channels.
Wendzel, S., Zander, S., Fechner, B., and Herdin, C.
(2015). Pattern-based survey and categorization of
network covert channel techniques. ACM Comput.
Surv., 47(3):50:1–50:26.
SECRYPT 2018 - International Conference on Security and Cryptography
98