Low bit-rate speech codec offers so many advantages over other codecs that it has become increasingly popular in audio communications such as mobile and VoIP (Voice over Internet Protocol) communications, and thus researching steganography in low bit-rate speech codec is of important significance. In this study, we proposed a universal VoIP steganography model for low bit-rate speech codec that uses the PESQ deterioration rate and the decoding error to automatically choose a data embedding algorithm for each VoIP bitstream, which enables ones to achieve covert communications using a low bit-rate speech codec efficiently and securely. Since no or little attention has been paid to steganography in iSAC (Internet Speech Audio Codec), it was ch...
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still r...
Abstract GiLBCSteg is a steganography algorithm that utilizes an open source low bit-rate audio code...
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still r...
Low bit-rate speech codecs have been widely used in audio communications like VoIP and mobile commun...
This paper describes a novel high capacity steganography algorithm for embedding data in the inactiv...
Differing from applying steganography on storage cover media, steganography on Voice over IP (VoIP) ...
A network covert channel is a passage along which information leaks across the network in violation ...
A network covert channel is a passage along which information leaks across the network in violation ...
As a popular real-time service on the Internet, Voice over Internet Protocol (VoIP) communication at...
Steganography is an effective way of hiding secret data, by this means of protecting the data from u...
This paper presents an adaptive steganography scheme for Voice over IP (VoIP). Differing from existi...
The rapid growth of multimedia transmission leads to lose the owner identity of their products. The...
Audio techniques have been developed for audio streaming on the internet. Using the TCP/IP protocol,...
Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial applications. ...
Steganography in streaming media differs from steganography in images or audio files because of the ...
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still r...
Abstract GiLBCSteg is a steganography algorithm that utilizes an open source low bit-rate audio code...
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still r...
Low bit-rate speech codecs have been widely used in audio communications like VoIP and mobile commun...
This paper describes a novel high capacity steganography algorithm for embedding data in the inactiv...
Differing from applying steganography on storage cover media, steganography on Voice over IP (VoIP) ...
A network covert channel is a passage along which information leaks across the network in violation ...
A network covert channel is a passage along which information leaks across the network in violation ...
As a popular real-time service on the Internet, Voice over Internet Protocol (VoIP) communication at...
Steganography is an effective way of hiding secret data, by this means of protecting the data from u...
This paper presents an adaptive steganography scheme for Voice over IP (VoIP). Differing from existi...
The rapid growth of multimedia transmission leads to lose the owner identity of their products. The...
Audio techniques have been developed for audio streaming on the internet. Using the TCP/IP protocol,...
Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial applications. ...
Steganography in streaming media differs from steganography in images or audio files because of the ...
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still r...
Abstract GiLBCSteg is a steganography algorithm that utilizes an open source low bit-rate audio code...
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still r...