Digital watermarking of video streams: Review of the state-of-the-art
R Artru, A Gouaillard, T Ebrahimi - arXiv preprint arXiv:1908.02039, 2019 - arxiv.org
Digital Watermarking is an extremely wide aspect of information security, either by its
applications, by its properties, or by its designs. In particular, a lot of research has been …
applications, by its properties, or by its designs. In particular, a lot of research has been …
A payload-dependent packet rearranging covert channel for mobile VoIP traffic
Abstract VoIP (Voice over Internet Protocol) is one of the most prevalent services for the
mobile users. An enormous amount of audio and video data is transmitted over VoIP …
mobile users. An enormous amount of audio and video data is transmitted over VoIP …
Building packet length covert channel over mobile VoIP traffics
Abstract Mobile VoIP (Voice over Internet Protocol) has shown its widely prevalence and laid
the feasibility for concealed communication. VoIP contains continuous and huge amount of …
the feasibility for concealed communication. VoIP contains continuous and huge amount of …
Building covert timing channel of the IoT-enabled MTS based on multi-stage verification
Although the global shipping industry is experiencing a productivity revolution due to the
adoption of IoTs (Internet of Things), the dependence on complex data transmission and …
adoption of IoTs (Internet of Things), the dependence on complex data transmission and …
SkypeLine: Robust hidden data transmission for VoIP
Internet censorship is used in many parts of the world to prohibit free access to online
information. Different techniques such as IP address or URL blocking, DNS hijacking, or …
information. Different techniques such as IP address or URL blocking, DNS hijacking, or …
[PDF][PDF] Information Hiding in RGB Images Using an Improved Matrix Pattern Approach.
In this paper, a novel steganography algorithm based on an improved “Matrix Pattern”(MP)
method is presented. In this process, firstly, an RGB image is divided into the non …
method is presented. In this process, firstly, an RGB image is divided into the non …
ZM-CTC: Covert timing channel construction method based on zigzag matrix
J Zheng, S Li, S Hao, Y Li, Y Zhang - Computer Communications, 2022 - Elsevier
Abstract VoLTE (Voice over Long-Term Evolution) is a widely used, high-performance, and
end-to-end transmission solution in 4G and 5G. However, it also provides a new foundation …
end-to-end transmission solution in 4G and 5G. However, it also provides a new foundation …
Agent-based system architecture supporting remote collaboration via an internet of multimedia things approach
In this paper, we propose an agent-based architecture for remote collaboration support
systems that enables the exchange of synchronous and asynchronous multimedia streams …
systems that enables the exchange of synchronous and asynchronous multimedia streams …
An RTP extension for reliable user-data transmission over VoIP traffic
J Gao, Y Li, H Jiang, L Liu, X Zhang - … and Privacy in Social Networks and …, 2019 - Springer
Covert channels are those breaking the restrictions of the legitimate channel and
transmitting covert messages secretly. According to the modulation methods, the covert …
transmitting covert messages secretly. According to the modulation methods, the covert …
Enhancement of Capacity, Detectability and Distortion of BMP, GIF and JPEG images with Distributed Steganography
II Araujo, H Kazemian - International Journal of …, 2019 - repository.londonmet.ac.uk
The advance of Big Data and Internet growth has driven the need for more abundant storage
to hold and share data. People are sending more messages to one another and paying …
to hold and share data. People are sending more messages to one another and paying …