2014 9th International Symposium on Communication Systems, Networks &Amp; Digital Sign (CSNDSP) 2014
DOI: 10.1109/csndsp.2014.6923970
|View full text |Cite
|
Sign up to set email alerts
|

Frequency domain discrete spring transform: A novel frequency domain steganographic attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…A real-time DST algorithm is proposed in [14] for a real-time voice processing. Compared to [12,14,15] where we proposed DST and presented as an effective method to attack steganography, in this paper, we proposed a DST-LACK scheme to embed the steganography in the VoIP streams. We proposed and studied DST in various literatures including the references [12,14,15].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A real-time DST algorithm is proposed in [14] for a real-time voice processing. Compared to [12,14,15] where we proposed DST and presented as an effective method to attack steganography, in this paper, we proposed a DST-LACK scheme to embed the steganography in the VoIP streams. We proposed and studied DST in various literatures including the references [12,14,15].…”
Section: Introductionmentioning
confidence: 99%
“…DST was first proposed as a way to attack the steganography embedded in the multimedia signal [12][13][14][15][16][17]. The basic idea of DST is to eliminate the perceptual redundancy of the multimedia signal [18][19][20].…”
Section: Introductionmentioning
confidence: 99%