Search Results

There are 5461 results for: content related to: On steganography in lost audio packets

  1. You have full text access to this Open Access content
    Steganography in IEEE 802.11 OFDM symbols

    Security and Communication Networks

    Volume 9, Issue 2, 25 January 2016, Pages: 118–129, Krzysztof Szczypiorski and Wojciech Mazurczyk

    Version of Record online : 29 MAR 2011, DOI: 10.1002/sec.306

  2. You have full text access to this Open Access content
    Lost audio packets steganography: the first practical evaluation

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1394–1403, Wojciech Mazurczyk

    Version of Record online : 15 FEB 2012, DOI: 10.1002/sec.502

  3. You have full text access to this Open Access content
    Matlist: Mature linguistic steganography methodology

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 697–718, Abdelrahman Desoky

    Version of Record online : 25 MAY 2010, DOI: 10.1002/sec.208

  4. You have full text access to this Open Access content
    A formal model for the creation and evaluation of steganographic solutions based in lexical–semantic substitutions: a case applied to Spanish

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 813–832, Alfonso Muñoz, Irina Argüelles and Sergio Sánchez

    Version of Record online : 30 APR 2013, DOI: 10.1002/sec.782

  5. Image steganography and steganalysis

    Wiley Interdisciplinary Reviews: Computational Statistics

    Volume 3, Issue 3, May/June 2011, Pages: 251–259, Mayra Bachrach and Frank Y. Shih

    Version of Record online : 10 MAR 2011, DOI: 10.1002/wics.152

  6. You have full text access to this Open Access content
    On importance of steganographic cost for network steganography

    Security and Communication Networks

    Volume 9, Issue 8, 25 May 2016, Pages: 781–790, Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares and Krzysztof Szczypiorski

    Version of Record online : 8 AUG 2014, DOI: 10.1002/sec.1085

  7. You have full text access to this Open Access content
    Steganographic access control in data hiding using run-length encoding and modulo-operations

    Security and Communication Networks

    Volume 9, Issue 2, 25 January 2016, Pages: 139–148, Chin-Feng Lee, Chi-Yao Weng and Aneesh Sharma

    Version of Record online : 16 JUN 2011, DOI: 10.1002/sec.333

  8. Image Steganography

    Image Processing and Pattern Recognition

    Frank Y. Shih, Pages: 474–495, 2010

    Published Online : 4 AUG 2010, DOI: 10.1002/9780470590416.ch13

  9. You have full text access to this Open Access content
    An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2527–2541, Chin-Ling Chen and Chun-Yi Wu

    Version of Record online : 7 OCT 2011, DOI: 10.1002/sec.383

  10. You have full text access to this Open Access content
    Matrix embedding in multicast steganography: analysis in privacy, security and immediacy

    Security and Communication Networks

    Volume 9, Issue 8, 25 May 2016, Pages: 791–802, Weiwei Liu, Guangjie Liu and Yuewei Dai

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1168

  11. You have full text access to this Open Access content
    A novel image steganography scheme based on morphological associative memory and permutation schema

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 110–121, Sara Nazari, Amir-Masoud Eftekhari-Moghadam and Mohammad-Shahram Moin

    Version of Record online : 12 FEB 2014, DOI: 10.1002/sec.962

  12. Steganography and Steganalysis

    Machine Learning in Image Steganalysis

    Hans Georg Schaathun, Pages: 7–24, 2012

    Published Online : 22 AUG 2012, DOI: 10.1002/9781118437957.ch2

  13. You have full text access to this Open Access content
    Pitch-based steganography for Speex voice codec

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2923–2933, Artur Janicki

    Version of Record online : 3 FEB 2016, DOI: 10.1002/sec.1428

  14. You have full text access to this Open Access content
    HYSA: HYbrid steganographic approach using multiple steganography methods

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1173–1184, Hedieh Sajedi and Mansour Jamzad

    Version of Record online : 17 OCT 2010, DOI: 10.1002/sec.243

  15. You have full text access to this Open Access content
    Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2972–2985, Matthias Naumann, Steffen Wendzel, Wojciech Mazurczyk and Joerg Keller

    Version of Record online : 17 JUN 2016, DOI: 10.1002/sec.1500

  16. Detection of Hidden Information, Covert Channels and Information Flows

    Standard Article

    Wiley Handbook of Science and Technology for Homeland Security

    Neil F. Johnson and Phil A. Sallee

    Published Online : 15 JUN 2009, DOI: 10.1002/9780470087923.hhs427

  17. You have full text access to this Open Access content
    Text split-based steganography in OOXML format documents for covert communication

    Security and Communication Networks

    Volume 5, Issue 9, September 2012, Pages: 957–968, Zhangjie Fu, Xingming Sun, Yuling Liu and Bo Li

    Version of Record online : 19 OCT 2011, DOI: 10.1002/sec.378

  18. The Steganalysis Problem

    Machine Learning in Image Steganalysis

    Hans Georg Schaathun, Pages: 245–262, 2012

    Published Online : 22 AUG 2012, DOI: 10.1002/9781118437957.ch14

  19. You have full text access to this Open Access content
    Generic attack against robust steganography based on spring transform and geometrization

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3880–3892, Qilin Qi, Aaron Sharp, Dongming Peng, Yaoqing Yang and Hamid Sharif

    Version of Record online : 11 OCT 2016, DOI: 10.1002/sec.1583

  20. You have full text access to this Open Access content
    Perfect undetectability of network steganography

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2998–3010, Wojciech Frączek and Krzysztof Szczypiorski

    Version of Record online : 27 APR 2016, DOI: 10.1002/sec.1491