P Liu, S Li, H Wang - Multimedia Tools and Applications, 2017 - Springer
The extensive use of Voice over IP (VoIP) applications makes low bit-rate speech stream a very suitable steganographic cover media. To incorporate steganography into low bit-rate …
Internet censorship is used in many parts of the world to prohibit free access to online information. Different techniques such as IP address or URL blocking, DNS hijacking, or …
B Qasem, H Shahadi, M Kod, H Farhan - Kerbala Journal for Engineering …, 2021 - iasj.net
Cryptography and steganography are the major role approaches for covert communications. While cryptography enciphers the information in such a way to be nonunderstandable for …
abstract Audio steganography is the process of hiding a message inside an audio container. This study aims to present a systematic review of audio steganography methods. Existing …