Sciweavers

CORR
2008
Springer
105views Education» more  CORR 2008»
14 years 5 days ago
Covert Channels in SIP for VoIP signalling
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (V...
Wojciech Mazurczyk, Krzysztof Szczypiorski
CORR
2007
Springer
117views Education» more  CORR 2007»
14 years 17 days ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
IH
1998
Springer
14 years 4 months ago
Steganography in a Video Conferencing System
We describe a steganographic system which embeds secret messages into a video stream. We examine the signal path which typically includes discrete cosine transformation (DCT) based...
Andreas Westfeld, Gritta Wolf
IH
1999
Springer
14 years 4 months ago
Developments in Steganography
Abstract. This paper presents two main results. The first is a new approach to steganography in which data is encoded in correlations among the pixels in an image. Almost all prev...
Joshua R. Smith, Chris Dodge
IH
2001
Springer
14 years 5 months ago
F5-A Steganographic Algorithm
Many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for steganographic messages. T...
Andreas Westfeld