Covert communications through mobile voice channels
暂无分享,去创建一个
Seyed Amir Reza Kazemi | Mohammad Ali Akhaee | Fereidoon Behnia | Roohollah Rezaei | F. Behnia | M. Akhaee | Roohollah Rezaei
[1] S. Gazor,et al. Speech probability distribution , 2003, IEEE Signal Processing Letters.
[2] Vasilis Friderikos,et al. Cross-Layer Optimization to Maximize Fairness Among TCP Flows of Different TCP Flavors , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[3] Z. Jane Wang,et al. An Improved Multiplicative Spread Spectrum Embedding Scheme for Data Hiding , 2012, IEEE Transactions on Information Forensics and Security.
[4] Thomas S. Huang,et al. An additive approach to transform-domain information hiding and optimum detection structure , 2001, IEEE Trans. Multim..
[5] Qingzhong Liu,et al. Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.
[6] Naofumi Aoki. Potential of Value-Added Speech Communications by Using Steganography , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[7] Jeff T. Linderoth,et al. Algorithms and Software for Convex Mixed Integer Nonlinear Programs , 2012 .
[8] Mauro Barni,et al. A universal technique to hide traces of histogram-based image manipulations , 2012, MM&Sec '12.
[9] Shanyu Tang,et al. An Approach to Information Hiding in Low Bit-Rate Speech Stream , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[10] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[11] Fernando Pérez-González,et al. Optimal counterforensics for histogram-based forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[12] Wojciech Mazurczyk,et al. VoIP steganography and its Detection—A survey , 2012, ACM Comput. Surv..
[13] Quincy Wu,et al. Information Hiding in Real-Time VoIP Streams , 2007, ISM 2007.
[14] Qiang Cheng,et al. Generalized Embedding of Multiplicative Watermarks , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[15] Z. Jane Wang,et al. Efficient blind decoders for additive spread spectrum embedding based data hiding , 2012, EURASIP J. Adv. Signal Process..
[16] Jidong Zhong,et al. An Enhanced Multiplicative Spread Spectrum Watermarking Scheme , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[17] Asoke K. Nandi,et al. Speech modelling based on generalized Gaussian probability density functions , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[18] Sen Bai,et al. Steganography Integration Into a Low-Bit Rate Speech Codec , 2012, IEEE Transactions on Information Forensics and Security.
[19] Yongfeng Huang,et al. Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec , 2011, IEEE Transactions on Information Forensics and Security.
[20] Jana Dittmann,et al. Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set , 2005, IS&T/SPIE Electronic Imaging.
[21] Fernando Pérez-González,et al. Spread-Spectrum Watermarking Security , 2009, IEEE Transactions on Information Forensics and Security.
[22] Wei Yang,et al. G.711-Based Adaptive Speech Information Hiding Approach , 2006, ICIC.
[23] Xing Li,et al. Steganography-Oriented Noisy Resistance Model of G.729a , 2006, The Proceedings of the Multiconference on "Computational Engineering in Systems Applications".
[24] W. Gangbo,et al. The geometry of optimal transportation , 1996 .