暂无分享,去创建一个
[1] Henning Schulzrinne,et al. RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.
[2] Anirban Mukherjee,et al. Media-independent watermarking classification and the need for combining digital video and audio watermarking for media authentication , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[3] Guillermo Morales-Luna,et al. Information Hiding through Noisy Channels , 2001, Information Hiding.
[4] Jessica Staddon,et al. Graph-based authentication of digital streams , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[5] Ramarathnam Venkatesan,et al. A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding , 2001, Information Hiding.
[6] Deepa Kundur,et al. Practical Data Hiding in TCP/IP , 2002 .
[7] Utz Roedig,et al. Intrusion detection systems for IP telephony networks , 2002 .
[8] Ramón Cáceres,et al. RTP Control Protocol Extended Reports (RTCP XR) , 2003, RFC.
[9] KRZYSZTOF SZCZYPIORSKI. HICCUPS : Hidden Communication System for Corrupted Networks , 2003 .
[10] Sorin A. Huss,et al. Audio watermarking algorithm for real-time speech integrity and authentication , 2004, MM&Sec '04.
[11] Colin Allison,et al. Covert Channels in Internet Protocols: A Survey , 2005 .
[12] Steven J. Murdoch,et al. Embedding Covert Channels into TCP/IP , 2005, Information Hiding.
[13] Thomas J. Walsh,et al. Security Considerations for Voice Over IP Systems , 2005 .
[14] Wojciech Mazurczyk,et al. New VoIP Traffic Security Scheme with Digital Watermarking , 2006, SAFECOMP.