Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set
@inproceedings{Dittmann2005SteganographyAS, title={Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set}, author={J. Dittmann and D. Hesse and R. Hillert}, booktitle={IS&T/SPIE Electronic Imaging}, year={2005} }
Based on the knowledge and experiences from existing image steganalysis techniques, the overall objective of the paper is to evaluate existing audio steganography with a special focus on attacks in ad-hoc end-to-end media communications on the example of Voice over IP (VoIP) scenarios. One aspect is to understand operational requirements of recent steganographic techniques for VoIP applications. The other aspect is to elaborate possible steganalysis approaches applied to speech data. In… CONTINUE READING
Topics from this paper
56 Citations
A novel steganography approach for voice over IP
- Computer Science
- J. Ambient Intell. Humaniz. Comput.
- 2014
- 24
Mel-cepstrum-based steganalysis for VoIP steganography
- Computer Science, Engineering
- Electronic Imaging
- 2007
- 71
- PDF
Adaptive partial-matching steganography for voice over IP using triple M sequences
- Computer Science
- Comput. Commun.
- 2011
- 22
- PDF
A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP
- Computer Science
- 2008 The 9th International Conference for Young Computer Scientists
- 2008
- 48
Covert Communication Over VoIP Streaming Media With Dynamic Key Distribution and Authentication
- Computer Science
- IEEE Transactions on Industrial Electronics
- 2021
- 1
- Highly Influenced
Steganalysis of compressed speech to detect covert voice over Internet protocol channels
- Computer Science
- IET Inf. Secur.
- 2011
- 35
- PDF
An adaptive steganography scheme for voice over IP
- Computer Science
- 2009 IEEE International Symposium on Circuits and Systems
- 2009
- 37
Cover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches
- Computer Science, Engineering
- Electronic Imaging
- 2008
- 7
- PDF