Search Results

There are 4221 results for: content related to: On steganography in lost audio packets

  1. A formal model for the creation and evaluation of steganographic solutions based in lexical–semantic substitutions: a case applied to Spanish

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 813–832, Alfonso Muñoz, Irina Argüelles and Sergio Sánchez

    Article first published online : 30 APR 2013, DOI: 10.1002/sec.782

  2. On importance of steganographic cost for network steganography

    Security and Communication Networks

    Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares and Krzysztof Szczypiorski

    Article first published online : 8 AUG 2014, DOI: 10.1002/sec.1085

  3. A novel image steganography scheme based on morphological associative memory and permutation schema

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 110–121, Sara Nazari, Amir-Masoud Eftekhari-Moghadam and Mohammad-Shahram Moin

    Article first published online : 12 FEB 2014, DOI: 10.1002/sec.962

  4. Lost audio packets steganography: the first practical evaluation

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1394–1403, Wojciech Mazurczyk

    Article first published online : 15 FEB 2012, DOI: 10.1002/sec.502

  5. On the undetectability of transcoding steganography

    Security and Communication Networks

    Artur Janicki, Wojciech Mazurczyk and Krzysztof Szczypiorski

    Article first published online : 29 JUN 2015, DOI: 10.1002/sec.1301

  6. Security and privacy issues for the network of the future

    Security and Communication Networks

    Volume 5, Issue 9, September 2012, Pages: 987–1005, Giannis F. Marias, João Barros, Markus Fiedler, Andreas Fischer, Harald Hauff, Ralph Herkenhoener, Antonio Grillo, Alessandro Lentini, Luisa Lima, Charlott Lorentzen, Wojciech Mazurczyk, Hermann de Meer, Paulo F. Oliveira, George C. Polyzos, Enric Pujol, Krzysztof Szczypiorski, João P. Vilela and Tiago T. V. Vinhoza

    Article first published online : 25 OCT 2011, DOI: 10.1002/sec.384

  7. You have free access to this content
    Universal steganography model for low bit-rate speech codec

    Security and Communication Networks

    Shanyu Tang, Qing Chen, Wei Zhang and Yongfeng Huang

    Article first published online : 10 FEB 2015, DOI: 10.1002/sec.1183

  8. Matrix embedding in multicast steganography: analysis in privacy, security and immediacy

    Security and Communication Networks

    Weiwei Liu, Guangjie Liu and Yuewei Dai

    Article first published online : 14 NOV 2014, DOI: 10.1002/sec.1168

  9. HYSA: HYbrid steganographic approach using multiple steganography methods

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1173–1184, Hedieh Sajedi and Mansour Jamzad

    Article first published online : 17 OCT 2010, DOI: 10.1002/sec.243

  10. Real-time audio steganography attack based on automatic objective quality feedback

    Security and Communication Networks

    Qilin Qi, Aaron Sharp, Dongming Peng and Hamid Sharif

    Article first published online : 30 OCT 2014, DOI: 10.1002/sec.1150

  11. Digital image steganalysis based on local textural features and double dimensionality reduction

    Security and Communication Networks

    Fengyong Li, Xinpeng Zhang, Hang Cheng and Jiang Yu

    Article first published online : 14 OCT 2014, DOI: 10.1002/sec.1094

  12. Parallel modular steganography using error images

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1515–1524, Masoud Afrakhteh and Jeong-A Lee

    Article first published online : 1 SEP 2014, DOI: 10.1002/sec.1100

  13. Image steganography and steganalysis

    Wiley Interdisciplinary Reviews: Computational Statistics

    Volume 3, Issue 3, May/June 2011, Pages: 251–259, Mayra Bachrach and Frank Y. Shih

    Article first published online : 10 MAR 2011, DOI: 10.1002/wics.152

  14. A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1279–1290, Yao Shen, Liusheng Huang, Xiaorong Lu and Wei Yang

    Article first published online : 11 AUG 2014, DOI: 10.1002/sec.1081

  15. A high-capacity and low-distortion 3D polygonal mesh steganography using surfacelet transform

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 159–167, Hadi Kaveh and Mohammad-Shahram Moin

    Article first published online : 4 MAR 2014, DOI: 10.1002/sec.968

  16. MDE-based image steganography with large embedding capacity

    Security and Communication Networks

    Zhaoxia Yin and Bin Luo

    Article first published online : 22 JUN 2015, DOI: 10.1002/sec.1275

  17. Steganalysis of least significant bit matching using multi-order differences

    Security and Communication Networks

    Volume 7, Issue 8, August 2014, Pages: 1283–1291, Zhihua Xia, Xinhui Wang, Xingming Sun and Baowei Wang

    Article first published online : 16 AUG 2013, DOI: 10.1002/sec.864

  18. Unified phase and magnitude speech spectra data hiding algorithm

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 961–971, Fatiha Djebbar, Beghdad Ayad, Karim Abed-Meraim and Habib Hamam

    Article first published online : 11 JAN 2013, DOI: 10.1002/sec.644

  19. Matlist: Mature linguistic steganography methodology

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 697–718, Abdelrahman Desoky

    Article first published online : 25 MAY 2010, DOI: 10.1002/sec.208

  20. RAND - STEG: an integer wavelet transform domain digital image random steganography using knight's tour

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2374–2382, V. Thanikaiselvan and P. Arulmozhivarman

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1185