A network covert channel is a passage along which information leaks across the network in violation of security policy in a completely undetectable manner. This study reveals our findings in analysing the principle of G.723.1 codec that there are `unused` bits in G.723.1 encoded audio frames, which can be used to embed secret messages. A novel steganalysis method that employs the second detection and regression analysis is suggested in this study. The proposed method can not only detect the hidden message embedded in a compressed voice over Internet protocol (VoIP) speech, but also accurately estimate the embedded message length. The method is based on the second statistics, that is, doing a second steganography (embedding information in a ...
Low bit-rate speech codec offers so many advantages over other codecs that it has become increasingl...
Steganography in streaming media differs from steganography in images or audio files because of the ...
The last few years have witnessed an explosive growth in the research of information hiding in multi...
A network covert channel is a passage along which information leaks across the network in violation ...
The authors describe a reliable and accurate steganalysis method for detecting covert voice-over Int...
Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial applications. ...
This paper describes a novel high capacity steganography algorithm for embedding data in the inactiv...
As a popular real-time service on the Internet, Voice over Internet Protocol (VoIP) communication at...
Steganography is an effective way of hiding secret data, by this means of protecting the data from u...
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still r...
This paper presents a new spatial steganography model for covert communications over Voice over Inte...
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still r...
Low bit-rate speech codecs have been widely used in audio communications like VoIP and mobile commun...
Differing from applying steganography on storage cover media, steganography on Voice over IP (VoIP) ...
This paper concentrates on the detection of steganography in inactive frames of low bit rate audio s...
Low bit-rate speech codec offers so many advantages over other codecs that it has become increasingl...
Steganography in streaming media differs from steganography in images or audio files because of the ...
The last few years have witnessed an explosive growth in the research of information hiding in multi...
A network covert channel is a passage along which information leaks across the network in violation ...
The authors describe a reliable and accurate steganalysis method for detecting covert voice-over Int...
Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial applications. ...
This paper describes a novel high capacity steganography algorithm for embedding data in the inactiv...
As a popular real-time service on the Internet, Voice over Internet Protocol (VoIP) communication at...
Steganography is an effective way of hiding secret data, by this means of protecting the data from u...
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still r...
This paper presents a new spatial steganography model for covert communications over Voice over Inte...
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still r...
Low bit-rate speech codecs have been widely used in audio communications like VoIP and mobile commun...
Differing from applying steganography on storage cover media, steganography on Voice over IP (VoIP) ...
This paper concentrates on the detection of steganography in inactive frames of low bit rate audio s...
Low bit-rate speech codec offers so many advantages over other codecs that it has become increasingl...
Steganography in streaming media differs from steganography in images or audio files because of the ...
The last few years have witnessed an explosive growth in the research of information hiding in multi...