Information Hiding, Network Steganography, and Covert Channels

A special issue of Computers (ISSN 2073-431X).

Deadline for manuscript submissions: closed (30 September 2020) | Viewed by 512

Special Issue Editors

E-Mail Website
Guest Editor
National Research Council of Italy, 16149 Genova, Italy
Interests: Information Hiding; Wireless Networks; Cloud and Networking

E-Mail Website
Guest Editor
Department of Computer Science, Worms University of Applied Sciences, 67549 Worms, Germany
Interests: network information hiding; IoT; networking; information security; data mining; machine learning

E-Mail Website
Guest Editor
Institute of Computer Science, Division of Software Engineering and Computer Architecture, Faculty of Electronics and Information Technology, Warsaw University of Technology (WUT), 00-661 Warszawa, Poland
Interests: information hiding; network security; bio-inspired cybersecurity

Special Issue Information

Dear Colleagues,

Information hiding techniques and network covert channels are becoming fundamental to assess the security characteristics of the Internet. On the one hand, they can be used as offensive tools to empower malware, for instance, to bypass security policies of infected nodes, to secretly exfiltrate data towards remote command and control facilities, or to orchestrate a botnet or launch an attack without being detected by de-facto standard security tools. On the other hand, information hiding and network covert channels can be used to enforce copyright of digital artifacts via watermarking, trace network flows for traffic engineering purposes, and implement privacy enhancing services. From this perspective, this Special Issue aims at collecting new work addressing different aspects of information hiding and network covert channels.

Authors are invited to submit original work on (but not limited to) the following topics:

  • Model detection techniques and the mitigation of information hiding-capable threats;
  • Colluding application attacks and exfiltration techniques;
  • New mechanisms to orchestrate botnets and hide data exfiltration;
  • Novel detection techniques for network covert channels, with an emphasis on scalability;
  • Advanced network covert channels, for instance, those leveraging reversible steganographic methods;
  • Information hiding for obfuscation, anti-forensics techniques, and covert data storage;
  • Watermarking of network flows for traffic engineering and security;
  • Privacy enhancing frameworks based on information hiding.

Dr. Luca Caviglione
Dr. Steffen Wendzel
Prof. Dr. Wojciech Mazurczyk
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.


  • Information hiding
  • Network security
  • Steganography
  • Malware obfuscation
  • Covert channels
  • Privacy enhancing technologies

Published Papers

There is no accepted submissions to this special issue at this moment.
Back to TopTop