Accesso libero

Coverless VoIP Steganography Using Hash and Hash

INFORMAZIONI SU QUESTO ARTICOLO

Cita

1. Crandall, R. Some Notes on Steganography. Posted on Steganography Mailing List, 1998, pp. 1-6. Search in Google Scholar

2. Mazurczyk, W., J. L. Lubacz. A VoIP Steganographic Method. – Telecommunication Systems, Vol. 45, 2010, No 2-3, pp. 153-163.10.1007/s11235-009-9245-y Search in Google Scholar

3. Djebbar, F., B. Ayad, K. A. Meraim, H. Hamam. Comparative Study of Digital Audio Steganography Techniques. – EURASIP Journal on Audio, Speech, and Music Processing, Vol. 1, 2012, Article No 25.10.1186/1687-4722-2012-25 Search in Google Scholar

4. Mazurczyk, W. VoIP Steganography and its Detection – A Survey. – ACM Computing Surveys (CSUR), Vol. 46, 2013, No 2, Article No 20.10.1145/2543581.2543587 Search in Google Scholar

5. Tian, H., J. Liu, S. Li. Improving Security of Quantization-Index-Modulation Steganography in Low Bit-Rate Speech Streams. – Multimedia Systems, Vol. 20, 2014, No 2, pp. 143-154.10.1007/s00530-013-0302-8 Search in Google Scholar

6. Janicki, A. Novel Method of Hiding Information in IP Telephony Using Pitch Approximation. – In: Proc. of 10th International Conference on Availability, Reliability and Security (ARES’15), IEEE, 2015, pp. 429-435.10.1109/ARES.2015.12 Search in Google Scholar

7. Zhou, Z., H. Sun, R. Harit, X. Chen, X. Sun. Coverless Image Steganography without Embedding. – In: Proc. of International Conference on Cloud Computing and Security. Springer, Cham., 2015, pp. 123-132.10.1007/978-3-319-27051-7_11 Search in Google Scholar

8. Tian, H., J. Qin, S. Guo, Y. Huang, J. Liu, T. Wang, Y. Cai. Improved Adaptive Partial-Matching Steganography for Voice over IP. – Computer Communications, Vol. 70, 2015, pp. 95-108.10.1016/j.comcom.2015.08.011 Search in Google Scholar

9. Tian, H., J. Qin, Y. Huang, Y. Chen, T. Wang, J. Liu, Y. Cai. Optimal matrix embedding for Voice-over-IP Steganography. – Signal Processing, Vol. 117, 2015, pp. 33-43.10.1016/j.sigpro.2015.05.001 Search in Google Scholar

10. Qin, J., H. Tian, Y. Huang, J. Liu, Y. Chen, T. Wang, X. A. Wang. An Efficient VoIP Steganography Based on Random Binary Matrix – In: Proc. of 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC’15), IEEE, 2015, pp. 462-465.10.1109/3PGCIC.2015.65 Search in Google Scholar

11. Liu, P., S. Li, H. Wang. Steganography Integrated into Linear Predictive Coding for Low Bit-Rate Speech Codec. – Multimedia Tools and Applications, Vol. 76, 2017, No 2, pp. 2837-2859.10.1007/s11042-016-3257-x Search in Google Scholar

12. Janicki, A. Pitch Based Steganography for Speex Voice Codec. – Security and Communication Networks, Vol. 9, 2016, No 15, 2923-2933.10.1002/sec.1428 Search in Google Scholar

13. Liu, J., H. Tian, J. Lu, Y. Chen. Neighbor-Index-Division Steganography Based on QIM Method for G. 723.1 Speech Streams. – Journal of Ambient Intelligence and Humanized Computing, Vol. 7, 2016, No 1, pp. 139-147.10.1007/s12652-015-0315-6 Search in Google Scholar

14. Jiang, Y., S. Tang. An Efficient and Secure VoIP Communication System with Chaotic Mapping and Message Digest. – Multimedia Systems, 2017, pp. 1-9.10.1007/s00530-017-0565-6 Search in Google Scholar

15. Huang, Y., H. Tao, B. Xiao, C. Chang. Steganography in Low Bit-Rate Speech Streams Based on Quantization Index Modulation Controlled by Keys. – Science China Technological Sciences, Vol. 60, 2017, No 10, pp. 1585-1596.10.1007/s11431-016-0707-3 Search in Google Scholar

16. Liu, P., S. Li, H. Wang. Steganography in Vector Quantization Process of Linear Predictive Coding for Low-Bit-Rate Speech Codec. – Multimedia Systems, Vol. 23, 2017, No 4, pp. 485-497.10.1007/s00530-015-0500-7 Search in Google Scholar

17. Janicki, A., W. Mazurczyk, K. Szczypiorski. Influence of Speech Codecs Selection on Transcoding Steganography. Telecommunication Systems, Vol. 59, 2015, No 3, pp. 305-315.10.1007/s11235-014-9937-9 Search in Google Scholar

18. Tian, H., J. Sun, C. C. Chang, J. Qin, Y. Chen. Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation – IEEE Communications Letters, Vol. 21, 2017, No 4, pp. 749-752.10.1109/LCOMM.2017.2659718 Search in Google Scholar

19. Zheng, S., L. Wang, B. Ling, D. Hu. Coverless Information Hiding Based on Robust Image Hashing. – In: Proc. of International Conference on Intelligent Computing, Springer, Cham, 2017, pp. 536-547.10.1007/978-3-319-63315-2_47 Search in Google Scholar

20. Deepikaa, S., R. Saravanan. VoIP Steganography Methods, a Survey. – Cybernetics and Information Technologies, Vol. 19, 2019, No 1, pp. 73-87.10.2478/cait-2019-0004 Search in Google Scholar

21. Zou, L., J. Sun, M. Gao, W. Wan, B. B. Gupta. A Novel Coverless Information Hiding Method Based on the Average Pixel Value of the Sub-Images. – Multimedia Tools and Applications, Vol. 78, 2019, No 7, pp. 7965-7980.10.1007/s11042-018-6444-0 Search in Google Scholar

22. Janicki, A., W. Mazurczyk, K. Szczypiorski. Steganalysis of Transcoding Steganography. – Annals of telecommunications-annales des telecommunications, Vol. 69, 2014, No 7, pp. 449-460.10.1007/s12243-013-0385-4 Search in Google Scholar

23. Chen, X., A. Qiu, X. Sun, S. Wang, G. Wei. A High-Capacity Coverless Image Steganography Method Based on Double-Level Index and Block Matching. – Mathematical Biosciences and Engineering, Vol. 16, 2019, No 5, pp. 4708-4722. Search in Google Scholar

24. Wu, K. C., C. M. Wang. Steganography Using Reversible Texture Synthesis. – IEEE Trans. Image Proc., Vol. 24, 2015, No 1, pp. 130-139.10.1109/TIP.2014.237124625415988 Search in Google Scholar

25. Xu, J., X. Mao, X. Jin. Hidden Message in a Deformation-Based Texture. – Vis. Comput., Vol. 31, 2015, pp. 1653-1669.10.1007/s00371-014-1045-z Search in Google Scholar

26. Begault, D. R., E. M. Wenzel. Techniques and Applications for Binaural Sound Manipulation. – The International Journal of Aviation Psychology, Vol. 2, 1992, No 1, pp. 1-22.10.1207/s15327108ijap0201_1 Search in Google Scholar

27. Jiang, Y., S. Tang, L. Zhang, M. Xiong, Y. J. Yip. Covert Voice over Internet Protocol Communications with Packet Loss Based on Fractal Interpolation. – ACM Transactions on Multimedia Computing. – Communications, and Applications (TOMM), Vol. 12, 2016, No 4, p. 54.10.1145/2961053 Search in Google Scholar

28. Salomon, D. Data Compression: The Complete Reference. 4th Ed. Springer, 2007. 281 p. ISBN 978-1846286025. Retrieved 26 July 2012. Search in Google Scholar

29. Prodeus, A. PESQ MATLAB Driver MATLAB Central File Exchange. Retrieved 21 June 2020. (https://www.mathworks.com/matlabcentral/fileexchange/47333-pesq-matlab-driver) Search in Google Scholar

eISSN:
1314-4081
Lingua:
Inglese
Frequenza di pubblicazione:
4 volte all'anno
Argomenti della rivista:
Computer Sciences, Information Technology