Steganography and steganalysis in voice over IP: A review

Z Wu, J Guo, C Zhang, C Li - Sensors, 2021 - mdpi.com
The rapid advance and popularization of VoIP (Voice over IP) has also brought security
issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the …

A coverless image steganography based on robust image wavelet hashing

NA Karim, SA Ali, MJ Jawad - … Computing Electronics and …, 2022 - telkomnika.uad.ac.id
Since the concept of coverless information hiding was proposed, it has been greatly
developed due to its effectiveness of resisting the steganographic tools. In this paper, a new …

Improvement of steganography technique: a survey

E Ardhianto, H Warnars, B Soewito… - 1st International …, 2020 - atlantis-press.com
The improved technology in information security, now day has been being still developed.
This, cause of the object called data which still has an important role in communications …

Covert voip communication based on audio steganography

BQA Ali, HI Shahadi, MS Kod… - International Journal of …, 2022 - journal.uob.edu.bh
Voice over Internet Protocol (VoIP) is a popular and important internet protocol for real-time
voice calling. It is used in several software applications such as Skype, WhatsApp, and …

[PDF][PDF] Coverless data hiding in VoIP based on DNA steganography with authentication.

D Soundararajan, S Ramakrishnan - Int. Arab J. Inf. Technol., 2023 - ccis2k.org
Data hiding in Voice over Internet Protocol (VoIP) using coverless approach improves the
undetectability by preserving the cover bits from modification. This paper focuses on hiding …

A Comparative Experiment of Document Security Level on Parallel Encryption With Digit Arithmetic of Covertext and Parallel Encryption using Covertext

E Ardhianto, W Budiharto, Y Heryadi… - 2021 IEEE 19th …, 2021 - ieeexplore.ieee.org
Documents for some entities contain important information. Cryptography and
steganography are a mechanism that is often used to maintain confidentiality. Parallel …

Enhancing of coverless image steganography capacity based on image block features

HT Mangi, SA Ali, MJ Jawad - … Computing Electronics and …, 2023 - telkomnika.uad.ac.id
The idea of coverless information hiding has seen a great deal of development since it was
initially introduced due to its effectiveness in defeating steganalysis tools. However, the …

Real-time scheme for covert communication based VoIP

HI Shahadi, MS Kod, B Qasem… - Journal of Physics …, 2021 - iopscience.iop.org
Covert communication is an important necessity for governments and companies due to the
ease of eavesdropping and access to information. A private channel with robust encryption …

Steganalysis of VoIP Streams via Bidirectional Correlation Extract Network

SH Cao, KX Wang, YB Fan - International Conference on Intelligent …, 2024 - Springer
Abstract Voice over Internet Protocol (VoIP) steganography based on Quantization Index
Modulation (QIM) has become one of the mainstream audio steganography methods due to …

[PDF][PDF] A Review and Comparison for Audio Steganography Techniques Based on Voice over Internet Protocol

B Qasem, H Shahadi, M Kod, H Farhan - Kerbala Journal for Engineering …, 2021 - iasj.net
Cryptography and steganography are the major role approaches for covert communications.
While cryptography enciphers the information in such a way to be nonunderstandable for …