We present a comprehensive survey of Voice over IP security academic research, using a set of 245 publications forming a closed cross-citation set. We classify these papers …
MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has made covert communications easier to construct, faster, undetectable and more secure than …
The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing …
The paper presents a new steganographic method for IP telephony called TranSteg (Tran scoding Steg anography). Typically, in steganographic communication it is advised for …
W Mazurczyk - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to embed secret information into a carrier message. Steganographic …
A Mileva, B Panajotov - Open Computer Science, 2014 - degruyter.com
Covert channels in TCP/IP protocol stack - extended version- Skip to content Should you have institutional access? Here's how to get it ... De Gruyter € EUR - Euro £ GBP - Pound $ USD …
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP …
N Tuptuk, S Hailes - 2015 IEEE international conference on …, 2015 - ieeexplore.ieee.org
Ensuring security in pervasive computing systems is an essential pre-requisite for their deployment. Typically, such systems are reliant on wireless networks for communication; …