Improving security of quantization-index-modulation steganography in low bit-rate speech streams
暂无分享,去创建一个
[1] Quincy Wu,et al. Information Hiding in Real-Time VoIP Streams , 2007, Ninth IEEE International Symposium on Multimedia (ISM 2007).
[2] Piotr Gajewski,et al. Authentication in VoIP Telephony with Use of the Echo Hiding Method , 2011 .
[3] Yongfeng Huang,et al. Implementation of Covert Communication Based on Steganography , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[4] Hong Jiang,et al. Adaptive partial-matching steganography for voice over IP using triple M sequences , 2011, Comput. Commun..
[5] Wojciech Mazurczyk,et al. Using transcoding for hidden communication in IP telephony , 2011, Multimedia Tools and Applications.
[6] Takuji Nishimura,et al. Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.
[7] Ke Zhou,et al. Dynamic matrix encoding strategy for voice-over-IP steganography , 2010 .
[8] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[9] Hong Jiang,et al. Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography , 2012, Comput. J..
[10] Yong-feng Huang,et al. Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis , 2012, Journal of Zhejiang University SCIENCE C.
[11] Ke Zhou,et al. Least-significant-digit steganography in low bitrate speech , 2012, 2012 IEEE International Conference on Communications (ICC).
[12] Tingting Xu,et al. Simple and effective speech steganography in G.723.1 low-rate codes , 2009, 2009 International Conference on Wireless Communications & Signal Processing.
[13] METHODS FOR SUBJECTIVE DETERMINATION OF TRANSMISSION QUALITY Summary , 2022 .
[14] Wojciech Mazurczyk,et al. Covert Channels in SIP for VoIP signalling , 2008, ArXiv.
[15] Yonghong Chen,et al. Implementing Covert Communication over Voice Conversations with Windows Live Messenger , 2012 .
[16] Wojciech Mazurczyk,et al. Steganography of VoIP Streams , 2008, OTM Conferences.
[17] Yan Liang,et al. Perceptually Transparent Information Hiding in G.729 Bitstream , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[18] Jinshu Su,et al. Adaptive VoIP Steganography for Information Hiding within Network Audio Streams , 2011, 2011 14th International Conference on Network-Based Information Systems.
[20] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[21] J. Lubacz,et al. Vice over IP , 2010, IEEE Spectrum.
[22] Rainer Bhme. Advanced Statistical Steganalysis , 2010 .
[23] Yongfeng Huang,et al. An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP , 2011, 2011 IEEE International Conference on Communications (ICC).
[24] Xing Li,et al. Steganography-Oriented Noisy Resistance Model of G.729a , 2006, The Proceedings of the Multiconference on "Computational Engineering in Systems Applications".
[25] Shanyu Tang,et al. An Approach to Information Hiding in Low Bit-Rate Speech Stream , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[26] Rainer Böhme,et al. Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.
[27] Wojciech Mazurczyk,et al. LACK—a VoIP steganographic method , 2008, Telecommun. Syst..
[28] Yongfeng Huang,et al. Covert Channels Based on Jitter Field of the RTCP Header , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[29] Wojciech Mazurczyk,et al. VoIP steganography and its Detection—A survey , 2012, ACM Comput. Surv..
[30] Oscal T.-C. Chen,et al. Highly Robust, Secure, and Perceptual-Quality Echo Hiding Scheme , 2008, IEEE Transactions on Audio, Speech, and Language Processing.
[31] Yongfeng Huang,et al. Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec , 2011, IEEE Transactions on Information Forensics and Security.
[32] Jana Dittmann,et al. Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set , 2005, IS&T/SPIE Electronic Imaging.
[33] Naofumi Aoki. A Semi-lossless Steganography Technique for G.711 Telephony Speech , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.