VoIP steganography and its detection—a survey

W Mazurczyk - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Steganography is an ancient art that encompasses various techniques of information hiding,
the aim of which is to embed secret information into a carrier message. Steganographic …

[HTML][HTML] Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels

A Mileva, A Velinov, L Hartmann, S Wendzel… - Computers & …, 2021 - Elsevier
Abstract Message Queuing Telemetry Transport (MQTT) is a publish-subscribe protocol
which is currently popular in Internet of Things (IoT) applications. Recently its 5.0 version …

An overview of steganography

GC Kessler, C Hosmer - Advances in Computers, 2011 - Elsevier
Steganography is the art of covered, or hidden, writing. The purpose of steganography is
covert communication—to hide the existence of a message from a third party. Knowledge of …

Using transcoding for hidden communication in IP telephony

W Mazurczyk, P Szaga, K Szczypiorski - Multimedia Tools and …, 2014 - Springer
The paper presents a new steganographic method for IP telephony called TranSteg (Tran
scoding Steg anography). Typically, in steganographic communication it is advised for …

Retransmission steganography and its detection

W Mazurczyk, M Smolarczyk, K Szczypiorski - Soft Computing, 2011 - Springer
The paper presents a new steganographic method called RSTEG (retransmission
steganography), which is intended for a broad class of protocols that utilises retransmission …

Covert channels in TCP/IP protocol stack-extended version

A Mileva, B Panajotov - Open Computer Science, 2014 - degruyter.com
Covert channels in TCP/IP protocol stack - extended version- Skip to content Should you have
institutional access? Here's how to get it ... De Gruyter € EUR - Euro £ GBP - Pound $ USD …

High capacity speech steganography for the G723. 1 coder based on quantised line spectral pairs interpolation and CNN auto-encoding

H Kheddar, D Megías - Applied Intelligence, 2022 - Springer
In this paper, a novel steganographic method for Voice over IP applications—called
Steganography-based Interpolation and Auto-Encoding (SIAE)—is proposed. The aim of the …

Steganalysis of QIM steganography in low-bit-rate speech signals

S Li, Y Jia, CCJ Kuo - IEEE/ACM Transactions on Audio …, 2017 - ieeexplore.ieee.org
Steganalysis of the quantization index modulation (QIM) steganography in a low-bit-rate
encoded speech stream is conducted in this research. According to the speech generation …

LACK—a VoIP steganographic method

W Mazurczyk, J Lubacz - Telecommunication Systems, 2010 - Springer
The paper presents a new steganographic method called LACK (Lost Audio PaCKets
Steganography) which is intended mainly for VoIP. The method is presented in a broader …

A secure stop and wait communication protocol for disturbed networks

V Shukla, A Chaturvedi, N Srivastava - Wireless personal communications, 2020 - Springer
Secure data communication is the need of hour today specifically when the wireless
communication channel is insecure. We are proposing a protocol which can be customized …