Digital audio steganography: Systematic review, classification, and analysis of the current state of the art

AA AlSabhany, AH Ali, F Ridzuan, AH Azni… - Computer Science …, 2020 - Elsevier
Audio steganography is the process of hiding a message inside an audio container. This
study aims to present a systematic review of audio steganography methods. Existing reviews …

Steganography in modern smartphones and mitigation techniques

W Mazurczyk, L Caviglione - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …

Trends in steganography

E Zielińska, W Mazurczyk, K Szczypiorski - Communications of the ACM, 2014 - dl.acm.org
Trends in steganography Page 1 86 communications of the acm | march 2014 | vol. 57 | no. 3
review articles ar t b y an D ri J bor ys a ssocia te s the Mass Media anointed 2011 as the "year …

Skypemorph: Protocol obfuscation for tor bridges

H Mohajeri Moghaddam, B Li, M Derakhshani… - Proceedings of the …, 2012 - dl.acm.org
The Tor network is designed to provide users with low-latency anonymous communications.
Tor clients build circuits with publicly listed relays to anonymously reach their destinations …

A revised taxonomy of steganography embedding patterns

S Wendzel, L Caviglione, W Mazurczyk… - Proceedings of the 16th …, 2021 - dl.acm.org
Steganography embraces several hiding techniques which spawn across multiple domains.
However, the related terminology is not unified among the different domains, such as digital …

[PDF][PDF] I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.

A Houmansadr, TJ Riedl, N Borisov, AC Singer - NDSS, 2013 - censorbib.nymity.ch
Open communication over the Internet poses a serious threat to countries with repressive
regimes, leading them to develop and deploy censorship mechanisms within their networks …

VoIP steganography and its detection—a survey

W Mazurczyk - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Steganography is an ancient art that encompasses various techniques of information hiding,
the aim of which is to embed secret information into a carrier message. Steganographic …

High capacity speech steganography for the G723. 1 coder based on quantised line spectral pairs interpolation and CNN auto-encoding

H Kheddar, D Megías - Applied Intelligence, 2022 - Springer
In this paper, a novel steganographic method for Voice over IP applications—called
Steganography-based Interpolation and Auto-Encoding (SIAE)—is proposed. The aim of the …

DPMM: dynamic pseudonym-based multiple mix-zones generation for mobile traveler

I Memon, Q Ali, A Zubedi, FA Mangi - Multimedia Tools and Applications, 2017 - Springer
Road traffic information has become indispensable for routine vehicular communication but
user location privacy an important issue which did not well addressed. An adversary may …

A secure stop and wait communication protocol for disturbed networks

V Shukla, A Chaturvedi, N Srivastava - Wireless personal communications, 2020 - Springer
Secure data communication is the need of hour today specifically when the wireless
communication channel is insecure. We are proposing a protocol which can be customized …