“…For 2-parameter Weibull distribution considered in Section 4.1 (4)(5)(6)(7)(8)(9)(10) and (4)(5)(6)(7)(8)(9)(10)(11) For chosen parameters from Tab.1 we obtain results shown in Fig. 9.…”
Section: Upper Limit Of E(d|d>t) Is As Follows (4-9)mentioning
confidence: 93%
“…6. If S R (t) is the amount of data remaining to be sent covertly at instant t of the call then the insertion rate at time t is (4-13) (4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14) where IR Q (t) is calculated as described in Section 3. Fig.…”
Section: Upper Limit Of E(d|d>t) Is As Follows (4-9)mentioning
confidence: 99%
“…Consider that if IR(t) > IR Q for t < t' then (4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15) describes this part of the steganogram which will be sent if we do not consider the limitation IR(t) < IR Q (t) in range [0, t'). Such "arrear" can be aligned by increasing IR(t) for t > t' (with limitation IR(t) < IR Q (t)) this situation is illustrated in Fig.…”
Section: Fig 11 Relationship Between Ir(t) and Ir Qmentioning
confidence: 99%
“…for case of dependence of IR(t) on E(D|D>t) it is (4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)(17)(18)(19)(20) where p E(D) and p E(D|D>t) denote LACK packet loss probability for both of above cases respectively. That is why call quality "gain" equals …”
Section: Dependence Of Ir(t) On Steganogram Size Under Limitation Ir(mentioning
Abstract. The paper presents a new hidden data insertion procedure based on estimated probability of the remaining time of the call for steganographic method called LACK (Lost Audio PaCKets steganography). LACK provides hidden communication for real-time services like Voice over IP. The analytical results presented in this paper concern the influence of LACK's hidden data insertion procedures on the method's impact on quality of voice transmission and its resistance to steganalysis. The proposed hidden data insertion procedure is also compared to previous steganogram insertion approach based on estimated remaining average call duration.
“…For 2-parameter Weibull distribution considered in Section 4.1 (4)(5)(6)(7)(8)(9)(10) and (4)(5)(6)(7)(8)(9)(10)(11) For chosen parameters from Tab.1 we obtain results shown in Fig. 9.…”
Section: Upper Limit Of E(d|d>t) Is As Follows (4-9)mentioning
confidence: 93%
“…6. If S R (t) is the amount of data remaining to be sent covertly at instant t of the call then the insertion rate at time t is (4-13) (4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14) where IR Q (t) is calculated as described in Section 3. Fig.…”
Section: Upper Limit Of E(d|d>t) Is As Follows (4-9)mentioning
confidence: 99%
“…Consider that if IR(t) > IR Q for t < t' then (4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15) describes this part of the steganogram which will be sent if we do not consider the limitation IR(t) < IR Q (t) in range [0, t'). Such "arrear" can be aligned by increasing IR(t) for t > t' (with limitation IR(t) < IR Q (t)) this situation is illustrated in Fig.…”
Section: Fig 11 Relationship Between Ir(t) and Ir Qmentioning
confidence: 99%
“…for case of dependence of IR(t) on E(D|D>t) it is (4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)(17)(18)(19)(20) where p E(D) and p E(D|D>t) denote LACK packet loss probability for both of above cases respectively. That is why call quality "gain" equals …”
Section: Dependence Of Ir(t) On Steganogram Size Under Limitation Ir(mentioning
Abstract. The paper presents a new hidden data insertion procedure based on estimated probability of the remaining time of the call for steganographic method called LACK (Lost Audio PaCKets steganography). LACK provides hidden communication for real-time services like Voice over IP. The analytical results presented in this paper concern the influence of LACK's hidden data insertion procedures on the method's impact on quality of voice transmission and its resistance to steganalysis. The proposed hidden data insertion procedure is also compared to previous steganogram insertion approach based on estimated remaining average call duration.
“…Fisk et al (2003) defined the concepts of structured and unstructured carriers. A carrier specifies the features or characteristics used to hide the information in the cover.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.