The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2005
DOI: 10.1117/12.586579
|View full text |Cite
|
Sign up to set email alerts
|

Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(40 citation statements)
references
References 0 publications
0
40
0
Order By: Relevance
“…With the rapid proliferation of Voice over Internet Protocol (VoIP) and other Peer-to-Peer (P2P) audio services such as Skype, covert channels using digital audio may be relatively easy to establish [9]. The inherent redundancy in the audio signal and its transient and unpredictable characteristics imply a high hidden capacity.…”
Section: Detecting Covert Communicationmentioning
confidence: 99%
“…With the rapid proliferation of Voice over Internet Protocol (VoIP) and other Peer-to-Peer (P2P) audio services such as Skype, covert channels using digital audio may be relatively easy to establish [9]. The inherent redundancy in the audio signal and its transient and unpredictable characteristics imply a high hidden capacity.…”
Section: Detecting Covert Communicationmentioning
confidence: 99%
“…The first VoIP steganographic methods to utilize the digital voice signal as a hidden data carrier were proposed by Dittmann et al [8]. The authors evaluated the existing audio steganography techniques, with a special focus on the solutions which were suitable for IP telephony.…”
Section: Related Workmentioning
confidence: 99%
“…From the literature [6][7][8], some researchers have noticed the advantages of and carried out useful studies on steganography over VoIP. Wang et al [6] proposed a scheme for transmitting secret speeches based on information hiding in VoIP systems.…”
Section: Introductionmentioning
confidence: 99%