Digital audio steganography: Systematic review, classification, and analysis of the current state of the art

AA AlSabhany, AH Ali, F Ridzuan, AH Azni… - Computer Science …, 2020 - Elsevier
Audio steganography is the process of hiding a message inside an audio container. This
study aims to present a systematic review of audio steganography methods. Existing reviews …

Steganography in modern smartphones and mitigation techniques

W Mazurczyk, L Caviglione - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …

A revised taxonomy of steganography embedding patterns

S Wendzel, L Caviglione, W Mazurczyk… - Proceedings of the 16th …, 2021 - dl.acm.org
Steganography embraces several hiding techniques which spawn across multiple domains.
However, the related terminology is not unified among the different domains, such as digital …

[HTML][HTML] Using transcoding for hidden communication in IP telephony

W Mazurczyk, P Szaga, K Szczypiorski - Multimedia Tools and …, 2014 - Springer
The paper presents a new steganographic method for IP telephony called TranSteg (Tran
scoding Steg anography). Typically, in steganographic communication it is advised for …

VoIP steganography and its detection—a survey

W Mazurczyk - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Steganography is an ancient art that encompasses various techniques of information hiding,
the aim of which is to embed secret information into a carrier message. Steganographic …

High capacity speech steganography for the G723. 1 coder based on quantised line spectral pairs interpolation and CNN auto-encoding

H Kheddar, D Megías - Applied Intelligence, 2022 - Springer
In this paper, a novel steganographic method for Voice over IP applications—called
Steganography-based Interpolation and Auto-Encoding (SIAE)—is proposed. The aim of the …

A secure stop and wait communication protocol for disturbed networks

V Shukla, A Chaturvedi, N Srivastava - Wireless personal communications, 2020 - Springer
Secure data communication is the need of hour today specifically when the wireless
communication channel is insecure. We are proposing a protocol which can be customized …

[HTML][HTML] Time is on my side: Steganography in filesystem metadata

S Neuner, AG Voyiatzis, M Schmiedecker… - Digital …, 2016 - Elsevier
We propose and explore the applicability of file timestamps as a steganographic channel.
We identify an information gap between storage and usage of timestamps in modern …

Improving security of quantization-index-modulation steganography in low bit-rate speech streams

H Tian, J Liu, S Li - Multimedia systems, 2014 - Springer
In this study, we mainly concentrate on quantization-index-modulation (QIM) steganography
in low bit-rate speech streams, and contribute to improve its security. Exploiting the …

Towards deriving insights into data hiding methods using pattern-based approach

W Mazurczyk, S Wendzel, K Cabaj - Proceedings of the 13th …, 2018 - dl.acm.org
In network information hiding, hiding patterns are used to describe hiding methods and their
taxonomy. In this paper, we analyze the current state of hiding patterns and we further …