UGC<sup>3</sup>:a covert communication method defense against censorship

A UGC-based covert communication method: UGC<sup>3</sup>was presented,which used fixed infrastructure (UGC sites) to form a fully distributed overlay.To exchange information between sender and receiver,an efficient resource discovery algorithm was proposed to negotiate the rendezvous; an...

Full description

Saved in:
Bibliographic Details
Main Authors: Qing-feng TAN, Pei-peng LIU, Jin-qiao SHI, Xiao WANG, Li GUO
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2012-08-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)08-0155-07/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539888527179776
author Qing-feng TAN
Pei-peng LIU
Jin-qiao SHI
Xiao WANG
Li GUO
author_facet Qing-feng TAN
Pei-peng LIU
Jin-qiao SHI
Xiao WANG
Li GUO
author_sort Qing-feng TAN
collection DOAJ
description A UGC-based covert communication method: UGC<sup>3</sup>was presented,which used fixed infrastructure (UGC sites) to form a fully distributed overlay.To exchange information between sender and receiver,an efficient resource discovery algorithm was proposed to negotiate the rendezvous; and then the targeted resource was published in the corresponding user-generated content hosts using information hiding method.Finally,the security properties were discussed.
format Article
id doaj-art-01566df0ed404c429a43efeab5b9256c
institution Kabale University
issn 1000-436X
language zho
publishDate 2012-08-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-01566df0ed404c429a43efeab5b9256c2025-01-14T06:32:53ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-08-013315516159665070UGC<sup>3</sup>:a covert communication method defense against censorshipQing-feng TANPei-peng LIUJin-qiao SHIXiao WANGLi GUOA UGC-based covert communication method: UGC<sup>3</sup>was presented,which used fixed infrastructure (UGC sites) to form a fully distributed overlay.To exchange information between sender and receiver,an efficient resource discovery algorithm was proposed to negotiate the rendezvous; and then the targeted resource was published in the corresponding user-generated content hosts using information hiding method.Finally,the security properties were discussed.http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)08-0155-07/covert communicationcensorship-resistantUGC site
spellingShingle Qing-feng TAN
Pei-peng LIU
Jin-qiao SHI
Xiao WANG
Li GUO
UGC<sup>3</sup>:a covert communication method defense against censorship
Tongxin xuebao
covert communication
censorship-resistant
UGC site
title UGC<sup>3</sup>:a covert communication method defense against censorship
title_full UGC<sup>3</sup>:a covert communication method defense against censorship
title_fullStr UGC<sup>3</sup>:a covert communication method defense against censorship
title_full_unstemmed UGC<sup>3</sup>:a covert communication method defense against censorship
title_short UGC<sup>3</sup>:a covert communication method defense against censorship
title_sort ugc sup 3 sup a covert communication method defense against censorship
topic covert communication
censorship-resistant
UGC site
url http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)08-0155-07/
work_keys_str_mv AT qingfengtan ugcsup3supacovertcommunicationmethoddefenseagainstcensorship
AT peipengliu ugcsup3supacovertcommunicationmethoddefenseagainstcensorship
AT jinqiaoshi ugcsup3supacovertcommunicationmethoddefenseagainstcensorship
AT xiaowang ugcsup3supacovertcommunicationmethoddefenseagainstcensorship
AT liguo ugcsup3supacovertcommunicationmethoddefenseagainstcensorship