Frame-bitrate-change based steganography for voice-over-IP
暂无分享,去创建一个
[1] Jin Liu,et al. Efficient Least-significant-bits Steganography for VoIP , 2012 .
[2] Xian-Sheng Hua,et al. Proceedings of the 29th ACM International Conference on Multimedia , 1998, MM 2012.
[3] Hong Jiang,et al. Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography , 2012, Comput. J..
[4] Yong-feng Huang,et al. Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis , 2012, Journal of Zhejiang University SCIENCE C.
[5] Hui Tian,et al. A VoIP-based Covert Communication Scheme Using Compounded Pseudorandom Sequence , 2012 .
[6] Wojciech Mazurczyk,et al. Using transcoding for hidden communication in IP telephony , 2011, Multimedia Tools and Applications.
[7] Henning Schulzrinne,et al. RTP Profile for Audio and Video Conferences with Minimal Control , 2003, RFC.
[8] Yongfeng Huang,et al. Steganalysis of compressed speech to detect covert voice over Internet protocol channels , 2011, IET Inf. Secur..
[9] Huang,et al. A Novel Covert Timing Channel Based on RTP/RTCP ∗ , 2012 .
[10] Sebastian Zander,et al. Covert channels and countermeasures in computer network protocols [Reprinted from IEEE Communications Surveys and Tutorials] , 2007, IEEE Communications Magazine.
[11] Ke Zhou,et al. Dynamic matrix encoding strategy for voice-over-IP steganography , 2010 .
[12] Yongfeng Huang,et al. Pulse position checking-based steganalysis of G.723.1 compressed speech in VoIP , 2011, Int. J. Multim. Intell. Secur..
[13] Zhejiang da xue. Journal of Zhejiang University. B Science. , 2004 .
[14] Yongfeng Huang,et al. Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec , 2011, IEEE Transactions on Information Forensics and Security.
[15] Huang Yong-feng,et al. Modeling and optimizing of the information hiding communication system over streaming media , 2008 .
[16] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[17] Angelos D. Keromytis,et al. Voice-over-IP Security: Research and Practice , 2010, IEEE Security & Privacy.
[18] Jin Liu,et al. State-based steganography in low bit rate speech , 2012, ACM Multimedia.
[19] Quincy Wu,et al. Information Hiding in Real-Time VoIP Streams , 2007, ISM 2007.