Cite

1. Mazurczyk, W., J. Lubacz. LACK-a VoIP Steganographic Method – Telecommunication Systems, Vol. 45, 2010, No 2-3, pp. 153-163.10.1007/s11235-009-9245-ySearch in Google Scholar

2. Hui, T., H. Jiang, K. Zhou, D. Feng. Adaptive Partial-Matching Steganography for Voice over IP Using Triple M Sequences. – Computer Communications, Vol. 34, 2011, No 18, pp. 2236-2247.10.1016/j.comcom.2011.07.003Search in Google Scholar

3. Calpouzos, G., C. Varol. GiLBCSteg: VoIP Steganography Utilizing the Internet Low Bit-Rate Codec. – Computer Science and Information Technology, Vol. 1, 2013, No 2, pp. 153-158.10.13189/csit.2013.010212Search in Google Scholar

4. Mazurczyk, W. VoIP Steganography and Its Detection – a Survey. – ACM Computing Surveys (CSUR), Vol. 46, 2013, No 2, p. 20.10.1145/2543581.2543587Search in Google Scholar

5. Mazurczyk, W., P. Szaga, K. Szczypiorski. Using Transcoding for Hidden Communication in IP Telephony. – Multimedia Tools and Applications, Vol. 70, 2014, No 3, pp. 2139-2165.10.1007/s11042-012-1224-8Search in Google Scholar

6. Janicki, A., W. Mazurczyk, K. Szczypiorski. Steganalysis of Transcoding Steganography. – Annals of telecommunications-annales des telecommunications, Vol. 69, 2014, No 7, pp. 449-460.10.1007/s12243-013-0385-4Search in Google Scholar

7. Tian, H., J. Liu, S. Li. Improving Security of Quantization-Index-Modulation Steganography in Low Bit-Rate Speech Streams. – Multimedia Systems, Vol. 20, 2014, No 2, pp. 143-154.10.1007/s00530-013-0302-8Search in Google Scholar

8. Janicki, A., W. Mazurczyk, K. Szczypiorski. On the Undetectability of Transcoding Steganography. – Security and Communication Networks, Vol. 8, 2015, No 18, pp. 3804-3814.10.1002/sec.1301Search in Google Scholar

9. Janicki, A. Novel Method of Hiding Information in IP Telephony Using Pitch Approximation. – In: Proc. of 10th International Conference on Availability, Reliability and Security (ARES’15), IEEE, 2015, pp. 429-435.10.1109/ARES.2015.12Search in Google Scholar

10. Tian, H., J. Qin, S. Guo, Y. Huang, J. Liu, T. Wang, Y. Cai. Improved Adaptive Partial-Matching Steganography for Voice over IP. – Computer Communications, Vol. 70, 2015, pp. 95-108.10.1016/j.comcom.2015.08.011Search in Google Scholar

11. Tian, H., J. Qin, Y. Huang, Y. Chen, T. Wang, J. Liu, Y. Cai. Optimal Matrix Embedding for Voice-over-IP Steganography. – Signal Processing, Vol. 117, 2015, pp. 33-43.10.1016/j.sigpro.2015.05.001Search in Google Scholar

12. Qin, J., H. Tian, Y. Huang, J. Liu, Y. Chen, T. Wang, X. A. Wang. An Efficient VoIP Steganography Based on Random Binary Matrix. – In: Proc. of 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC’15), IEEE, 2015, 2015, pp. 462-465.10.1109/3PGCIC.2015.65Search in Google Scholar

13. Qi, Q., D. Peng, H. Sharif. DST Approach to Enhance Audio Quality on Lost Audio Packet Steganography. – EURASIP Journal on Information Security, 2016, No 1, p. 20.10.1186/s13635-016-0046-zSearch in Google Scholar

14. Janicki, A. Pitch Based Steganography for Speex Voice Codec. – Security and Communication Networks, Vol. 9, 2016, No 15, pp. 2923-2933.10.1002/sec.1428Search in Google Scholar

15. Jiang, Y., S. Tang, L. Zhang, M. Xiong, Y. J. Yip. Covert Voice over Internet Protocol Communications with Packet Loss Based on Fractal Interpolation. – ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Vol. 12, 2016, No 4, p. 54.10.1145/2961053Search in Google Scholar

16. Kohls, K., T. Holz, D. Kolossa, C. Pöpper. Skypeline: Robust Hidden Data Transmission for VoIP. – In: Proc. of 11th ACM on Asia Conference on Computer and Communications Security, ACM, 2016, pp. 877-888.10.1145/2897845.2897913Search in Google Scholar

17. Huang, Y. F., S. Y. Tang. Covert Voice over Internet Protocol Communications Based on Spatial Model. – Science China Technological Sciences, Vol. 59, 2016, No 1, pp. 117-127.10.1007/s11431-015-5955-4Search in Google Scholar

18. Liu, J., H. Tian, J. Lu, Y. Chen. Neighbor-Index-Division Steganography Based on QIM Method for G.723.1 Speech Streams. – Journal of Ambient Intelligence and Humanized Computing, Vol. 7, 2016, No 1, pp. 139-147.10.1007/s12652-015-0315-6Search in Google Scholar

19. Jiang, Y., S. Tang. An Efficient and Secure VoIP Communication System with Chaotic Mapping and Message Digest. – Multimedia Systems, 2017, pp. 1-9.10.1007/s00530-017-0565-6Search in Google Scholar

20. Schmidt, S. S., W. Mazurczyk, J. Keller, L. Caviglione. A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression. – In: Proc. of 12th International Conference on Availability, Reliability and Security, ACM, 2017, p. 83.10.1145/3098954.3106066Search in Google Scholar

21. Liu, P., S. Li, H. Wang. Steganography Integrated into Linear Predictive Coding for Low Bit-Rate Speech Codec. – Multimedia Tools and Applications, Vol. 76, 2017, No 2, pp. 2837-2859.10.1007/s11042-016-3257-xSearch in Google Scholar

22. Huang, Y., H. Tao, B. Xiao, C. Chang. Steganography in Low Bit-Rate Speech Streams Based on Quantization Index Modulation Controlled by Keys. – Science China Technological Sciences, Vol. 60, 2017, No 10, pp. 1585-1596.10.1007/s11431-016-0707-3Search in Google Scholar

23. Liu, P., S. Li, H. Wang. Steganography in Vector Quantization Process of Linear Predictive Coding for Low-Bit-Rate Speech Codec. – Multimedia Systems, Vol. 23, 2017, No 4, pp. 485-497.10.1007/s00530-015-0500-7Search in Google Scholar

24. Tian, H., J. Sun, C. C. Chang, J. Qin, Y. Chen. Hiding Information into Voice-over-IP Streams Using Adaptive Bitrate Modulation. – IEEE Communications Letters, Vol. 21, 2017, No 4, pp. 749-752.10.1109/LCOMM.2017.2659718Search in Google Scholar

25. Shufan, Y., G. Tang, Y. Chen. Incorporating Data Hiding into G.729 Speech Codec. – Multimedia Tools and Applications, Vol. 75, 2016, No 18, pp. 11493-11512.10.1007/s11042-015-2865-1Search in Google Scholar

26. Yijing, J., L. Zhang, S. Tang, Z. Zhou. Real-Time Covert VoIP Communications over Smart Grids by Using AES-Based Audio Steganography. – In: IEEE International Conference on Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), and IEEE Cyber, Physical and Social Computing, pp. 2102-2107.10.1109/GreenCom-iThings-CPSCom.2013.395Search in Google Scholar

27. Rui, M., Y Huang. An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice Over IP. – In: IEEE International Conference on Communications (ICC), 2011, pp. 1-5.Search in Google Scholar

28. Janicki, A., W. Mazurczyk, K. Szczypiorski. Influence of Speech Codecs Selection on Transcoding Steganography. – Telecommunication Systems, Vol. 59, 2015, No 3, pp. 305-315.10.1007/s11235-014-9937-9Search in Google Scholar

29. Djebbar, F., B. Ayad, K. A. Meraim, H. Hamam. Comparative Study of Digital Audio Steganography Techniques. – EURASIP Journal on Audio, Speech, and Music Processing, Vol. 1, 2012, p. 25.10.1186/1687-4722-2012-25Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology