2016
DOI: 10.1145/2961053
|View full text |Cite
|
Sign up to set email alerts
|

Covert Voice over Internet Protocol Communications with Packet Loss Based on Fractal Interpolation

Abstract: The last few years have witnessed an explosive growth in the research of information hiding in multimedia objects, but few studies have taken into account packet loss in multimedia networks. As one of the most popular real-time services in the Internet, Voice over Internet Protocol (VoIP) contributes to a large part of network traffic for its advantages of real time, high flow, and low cost. So packet loss is inevitable in multimedia networks and affects the performance of VoIP communications. In this study, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 38 publications
0
11
0
Order By: Relevance
“…Good quality of voice was achieved with reduced redundancy and also provides perceptual possibilities of how multimedia channel can be exploited. J i a n g et al [15] in 2016 worked on the VoIP communication scheme based on UDP and the secret data was first encrypted using block cipher method. Each cipher block was then embedded into the audio signal encoded by Pulse Code Modulation (PCM) codec.…”
Section: Packet Loss Methodsmentioning
confidence: 99%
“…Good quality of voice was achieved with reduced redundancy and also provides perceptual possibilities of how multimedia channel can be exploited. J i a n g et al [15] in 2016 worked on the VoIP communication scheme based on UDP and the secret data was first encrypted using block cipher method. Each cipher block was then embedded into the audio signal encoded by Pulse Code Modulation (PCM) codec.…”
Section: Packet Loss Methodsmentioning
confidence: 99%
“…The statistical steganalysis is a process to detect the changes that are made to the statistical properties of the cover. [27] The author used Mann-Whitney U-test or Mann-Whitney-Wilcoxon (MWW), Wilcoxon rank-sum test to prove the statistical undetectability.This algorithm implements the MWW to prove the tolerance towards the statistical steganalysis.…”
Section: Statistical Undetectabilitymentioning
confidence: 99%
“…Although its history can date back to 440 BC [1], its candidate carriers have been ceaselessly evolving with the elapsing of years [2]. Over the last years, the steganographic carriers have developed from image [3,4] to almost all media forms (e.g., video [5,6], audio [7,8], text [9,10], network protocol [11,12], and Voice over IP [13][14][15][16]). However, steganography is a double-edged sword.…”
Section: Introductionmentioning
confidence: 99%