Steganography in modern smartphones and mitigation techniques
W Mazurczyk, L Caviglione - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …
VoIP steganography and its detection—a survey
W Mazurczyk - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Steganography is an ancient art that encompasses various techniques of information hiding,
the aim of which is to embed secret information into a carrier message. Steganographic …
the aim of which is to embed secret information into a carrier message. Steganographic …
Separable convolution network with dual-stream pyramid enhanced strategy for speech steganalysis
Steganography based on fixed codebook has become one of the most important branches
of speech steganography due to its high imperceptibility and having the largest available …
of speech steganography due to its high imperceptibility and having the largest available …
Steganography integrated into linear predictive coding for low bit-rate speech codec
P Liu, S Li, H Wang - Multimedia Tools and Applications, 2017 - Springer
The extensive use of Voice over IP (VoIP) applications makes low bit-rate speech stream a
very suitable steganographic cover media. To incorporate steganography into low bit-rate …
very suitable steganographic cover media. To incorporate steganography into low bit-rate …
Improving security of quantization-index-modulation steganography in low bit-rate speech streams
H Tian, J Liu, S Li - Multimedia systems, 2014 - Springer
In this study, we mainly concentrate on quantization-index-modulation (QIM) steganography
in low bit-rate speech streams, and contribute to improve its security. Exploiting the …
in low bit-rate speech streams, and contribute to improve its security. Exploiting the …
General frame-wise steganalysis of compressed speech based on dual-domain representation and intra-frame correlation leaching
S Li, J Wang, P Liu - IEEE/ACM Transactions on Audio, Speech …, 2022 - ieeexplore.ieee.org
Frame-wise steganalysis is of significance for active steganography defense. By frame-wise
detection, we can accurately find the embedding position of secret information and destroy …
detection, we can accurately find the embedding position of secret information and destroy …
Pitch and fourier magnitude based steganography for hiding 2.4 kbps melp bitstream
In this study, the authors present a new steganographic technique called random least
significant bits of pitch and Fourier magnitude steganography (RLPFS). It is based on hiding …
significant bits of pitch and Fourier magnitude steganography (RLPFS). It is based on hiding …
Pitch‐based steganography for Speex voice codec
A Janicki - Security and communication networks, 2016 - Wiley Online Library
This paper presents an improved version of a steganographic algorithm for IP telephony
called HideF0. It is based on approximating the F0 parameter, which is responsible for …
called HideF0. It is based on approximating the F0 parameter, which is responsible for …
64-bit quantization: taking payload capacity of speech steganography to the limits
A fundamental problem in steganography is the trade-off between the hiding capacity and
the quality of the stego signal. Researchers have found in the Discrete Cosine Transform …
the quality of the stego signal. Researchers have found in the Discrete Cosine Transform …
A common method for detecting multiple steganographies in low-bit-rate compressed speech based on Bayesian inference
J Yang, P Liu, S Li - IEEE Access, 2019 - ieeexplore.ieee.org
Analysis-by-synthesis linear predictive coding (AbS-LPC) is widely used in a variety of low-
bit-rate speech codecs. The existing steganalysis methods for AbS-LPC low-bit-rate …
bit-rate speech codecs. The existing steganalysis methods for AbS-LPC low-bit-rate …