A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression

Author(s):  
Sabine S. Schmidt ◽  
Wojciech Mazurczyk ◽  
Jörg Keller ◽  
Luca Caviglione
2018 ◽  
Vol 79 ◽  
pp. 17-32 ◽  
Author(s):  
Sabine Schmidt ◽  
Wojciech Mazurczyk ◽  
Radoslaw Kulesza ◽  
Jörg Keller ◽  
Luca Caviglione

2010 ◽  
Vol 69 (18) ◽  
pp. 1653-1660
Author(s):  
Rasim Magamed ogly Alguliev ◽  
B. S. Agaev ◽  
T. Kh. Fataliev ◽  
T. S. Aliev

2016 ◽  
Vol 2016 (1) ◽  
pp. 213-218
Author(s):  
Kazushige Banzawa ◽  
Kazuma Shinoda ◽  
Madoka Hasegawa

Author(s):  
Manoj Kumar ◽  
Rohit Tanwar

In the computerized age as a result of the broad utilization of web, information covering up in advanced symbolism assumes a fundamental part to guarantee copyright assurance and power from pernicious assaults. Today the exponential development in web clients request secure information correspondence, for that it is required to send the information as encoded or shrouded shape. Numerous data framework security procedures are accessible.Information transmission needs security. Information covering up can be accomplished through numerous techniques. Distinctive information concealing procedures are talked about in this paper which incorporates watermarking, steganography, fingerprinting, cryptography and advanced mark.


2002 ◽  
Vol 22 (1Supplement) ◽  
pp. 229-232 ◽  
Author(s):  
Kohei Arai ◽  
Kaname Seto
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document