A network covert channel is a passage along which information leaks across the network in violation of security policy in a completely undetectable manner. This study reveals our findings in analysing the principle of G.723.1 codec that there are `unused' bits in G.723.1 encoded audio frames, which can be used to embed secret messages. A novel steganalysis method that employs the second detection and regression analysis is suggested in this study. The proposed method can not only detect the hidden message embedded in a compressed voice over Internet protocol (VoIP) speech, but also accurately estimate the embedded message length. The method is based on the second statistics, that is, doing a second steganography (embedding information in a ...
Steganography in streaming media differs from steganography in images or audio files because of the ...
Low bit-rate speech codecs have been widely used in audio communications like VoIP and mobile commun...
Audio techniques have been developed for audio streaming on the internet. Using the TCP/IP protocol,...
A network covert channel is a passage along which information leaks across the network in violation ...
A network covert channel is a passage along which information leaks across the network in violation ...
The authors describe a reliable and accurate steganalysis method for detecting covert voice-over Int...
Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial applications. ...
As a popular real-time service on the Internet, Voice over Internet Protocol (VoIP) communication at...
This paper describes a novel high capacity steganography algorithm for embedding data in the inactiv...
Steganography is an effective way of hiding secret data, by this means of protecting the data from u...
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still r...
This paper presents a new spatial steganography model for covert communications over Voice over Inte...
Differing from applying steganography on storage cover media, steganography on Voice over IP (VoIP) ...
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still r...
Audio techniques have been developed for audio streaming on the internet. Using the TCP/IP protocol,...
Steganography in streaming media differs from steganography in images or audio files because of the ...
Low bit-rate speech codecs have been widely used in audio communications like VoIP and mobile commun...
Audio techniques have been developed for audio streaming on the internet. Using the TCP/IP protocol,...
A network covert channel is a passage along which information leaks across the network in violation ...
A network covert channel is a passage along which information leaks across the network in violation ...
The authors describe a reliable and accurate steganalysis method for detecting covert voice-over Int...
Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial applications. ...
As a popular real-time service on the Internet, Voice over Internet Protocol (VoIP) communication at...
This paper describes a novel high capacity steganography algorithm for embedding data in the inactiv...
Steganography is an effective way of hiding secret data, by this means of protecting the data from u...
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still r...
This paper presents a new spatial steganography model for covert communications over Voice over Inte...
Differing from applying steganography on storage cover media, steganography on Voice over IP (VoIP) ...
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still r...
Audio techniques have been developed for audio streaming on the internet. Using the TCP/IP protocol,...
Steganography in streaming media differs from steganography in images or audio files because of the ...
Low bit-rate speech codecs have been widely used in audio communications like VoIP and mobile commun...
Audio techniques have been developed for audio streaming on the internet. Using the TCP/IP protocol,...