Design and evaluation of steganography for voice-over-IP
暂无分享,去创建一个
[1] Stanley J. Wenndt,et al. Audio steganography by amplitude or phase modification , 2003, IS&T/SPIE Electronic Imaging.
[2] Jana Dittmann,et al. Transparency benchmarking on audio watermarks and steganography , 2006, Electronic Imaging.
[3] Andreas Westfeld. Detecting Low Embedding Rates , 2002, Information Hiding.
[4] Dengguo Feng,et al. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..
[5] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[6] Jana Dittmann,et al. Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set , 2005, IS&T/SPIE Electronic Imaging.
[7] J. Dittmann,et al. Network based intrusion detection to detect steganographic communication channels: on the example of audio data , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..
[8] Jana Dittmann,et al. Design und Evaluierung von Steganographie für Voice-over-IP , 2006, Sicherheit.
[9] Upkar Varshney,et al. Voice over IP , 2002, CACM.
[10] Takuji Nishimura,et al. Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.
[11] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.