2015
DOI: 10.1016/j.comcom.2015.08.011
|View full text |Cite
|
Sign up to set email alerts
|

Improved adaptive partial-matching steganography for Voice over IP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
8
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 38 publications
0
8
0
Order By: Relevance
“…The random binary matrix embedding scheme proved to have good embedding transparency and capacity. T i a n et al [10] in 2015 proposed an "Improved adaptive partial matching Steganography for VoIP" which was an extended work of the APMS discussed prior. This method proved to be a more effective approach than the previous one as it balances the Steganographic transparency and bandwidth.…”
Section: Least Significant Bit (Lsb) Modification Methodsmentioning
confidence: 99%
“…The random binary matrix embedding scheme proved to have good embedding transparency and capacity. T i a n et al [10] in 2015 proposed an "Improved adaptive partial matching Steganography for VoIP" which was an extended work of the APMS discussed prior. This method proved to be a more effective approach than the previous one as it balances the Steganographic transparency and bandwidth.…”
Section: Least Significant Bit (Lsb) Modification Methodsmentioning
confidence: 99%
“…One of the effective LSB methods was Matrix embedding which was first proposed by C r a n d a l l [1] and later developed by other researchers. Hybrid Matrix embedding methods [8][9][10][11]18] yielded fruitful results rather than the pure matrix embedding.…”
Section: Introductionmentioning
confidence: 99%
“…Although its history can date back to 440 BC [1], its candidate carriers have been ceaselessly evolving with the elapsing of years [2]. Over the last years, the steganographic carriers have developed from image [3,4] to almost all media forms (e.g., video [5,6], audio [7,8], text [9,10], network protocol [11,12], and Voice over IP [13][14][15][16]). However, steganography is a double-edged sword.…”
Section: Introductionmentioning
confidence: 99%