<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 4 Issue 2</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Computer Science &amp; Engineering</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>March - April 2016</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2019</Year>
        <Month>12</Month>
        <Day>05</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>A Covert Channel Using Secret Splitting</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>31</FirstPage>
      <LastPage>33</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Dr.Abdulameer Khalaf Hussain</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
             
        </Author>
      </AuthorList>
      <DOI></DOI>
      <Abstract>This paper presents a design of a secure covert channel . The proposed system generates a special covert channel used in sensitive applications. In order to enhance the covert of information, the participants in the communication channel must agree upon secure information and split it into two parts. From each part, the system generates a set of pseudo random numbers. Then the authenticated users select one of these numbers to be meaningful message. The system depends on the traditional prisoner&amp;#39;s problem. The proposed system is tested against the traditional methods and it is implemented more effective in terms of hiding information from the observation of any active warden.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Covert Channel, Information Hiding, Secret Splitting, Timing Attacks.</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=252</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>