DST approach to enhance audio quality on lost audio packet steganography
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Quantitative Structural Steganalysis of Jsteg , 2010, IEEE Transactions on Information Forensics and Security.
[2] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[3] Wojciech Mazurczyk,et al. Steganography of VoIP Streams , 2008, OTM Conferences.
[4] Hamid Sharif,et al. Real-time audio steganography attack based on automatic objective quality feedback , 2016, Secur. Commun. Networks.
[5] Wojciech Mazurczyk,et al. Lost audio packets steganography: the first practical evaluation , 2011, Secur. Commun. Networks.
[6] Yun Q. Shi,et al. Detecting Covert Channels in Computer Networks Based on Chaos Theory , 2013, IEEE Transactions on Information Forensics and Security.
[7] Sen Bai,et al. Steganography Integration Into a Low-Bit Rate Speech Codec , 2012, IEEE Transactions on Information Forensics and Security.
[8] Charles D. Creusere,et al. Audio quality assessment using the mean structural similarity measure , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[9] Hamid Sharif,et al. A video steganography attack using multi-dimensional Discrete Spring Transform , 2013, 2013 IEEE International Conference on Signal and Image Processing Applications.
[10] Hamid Sharif,et al. A novel active warden steganographic attack for next-generation steganography , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[11] Hamid Sharif,et al. Frequency domain discrete spring transform: A novel frequency domain steganographic attack , 2014, 2014 9th International Symposium on Communication Systems, Networks & Digital Sign (CSNDSP).
[12] Wojciech Mazurczyk,et al. On steganography in lost audio packets , 2014, Secur. Commun. Networks.
[13] Steven Gianvecchio,et al. An Entropy-Based Approach to Detecting Covert Timing Channels , 2011, IEEE Transactions on Dependable and Secure Computing.
[14] Wojciech Mazurczyk,et al. LACK—a VoIP steganographic method , 2008, Telecommun. Syst..
[15] Wojciech Mazurczyk,et al. VoIP steganography and its Detection—A survey , 2012, ACM Comput. Surv..
[16] Cheng-Hsing Yang,et al. Anti-Forensics with Steganographic Data Embedding in Digital Images , 2011, IEEE Journal on Selected Areas in Communications.
[17] Ming Li,et al. Extracting Spread-Spectrum Hidden Data From Digital Media , 2013, IEEE Transactions on Information Forensics and Security.
[18] Hamid Sharif,et al. An active audio steganography attacking method using discrete spring transform , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[19] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[20] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[21] Xiapu Luo,et al. Robust Network Covert Communications Based on TCP and Enumerative Combinatorics , 2012, IEEE Transactions on Dependable and Secure Computing.
[22] Hamid Sharif,et al. Steganography attack based on Discrete Spring Transform and image geometrization , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[23] Hamid Sharif,et al. An anti-steganographic approach for removing secret information in digital audio data hidden by spread spectrum methods , 2013, 2013 IEEE International Conference on Communications (ICC).
[24] Junji Shikata,et al. Unconditionally Secure Steganography Against Active Attacks , 2008, IEEE Transactions on Information Theory.