The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The growth of the Internet and online social media, especially in recent years, also gave rise to a proliferation of online multimedia content creation and distribution. The use of modern steganography methods - the art of hiding information within multimedia - presents an unprecedented opportunity for malicious uses of these materials. Therefore, developing an effective technique to avoid the distribution...
In this paper, we present and investigate a method to attack and remove multimedia steganography in digital audio data. Among the existing steganography methods that can be used to hide secret data in digital audio carriers, the Spread Spectrum methods are among the most effective and robust for embedding steganography data. Though there are currently a few research efforts on removing or destroying...
Advances in wireless multimedia communication technologies enable new types of pervasive and ubiquitous applications such as mobile health care, environmental monitoring, facility monitoring and traffic surveillance. Among different factors concerned, energy efficiency is one of the most challenging issues in multimedia communication due to the resource constraints, and the requirements for high bandwidth...
Watermarking and steganography are two of the most researched topics in multimedia forensics. However, easy availability of tools and technology has made their misuse a serious concern. To counteract this development some effective tools are necessary to remove malicious steganography. In this work, we introduce a novel watermark attack method which can destroy hidden information embedded in images...
SIP (session initial protocol) is a signaling protocol widely used in IP-based multimedia communication. Recently, P2PSIP reduces the deployment and maintenance cost, as well as improves the robustness and scalability of SIP-based system. SIP, P2PSIP network will coexist in the forthcoming future. This paper focuses on the P2PSIPand its relationship with SIP. We design and implement a P2PSIP adaptor,...
SIP (Session Initiation Protocol) is a signaling protocol widely used in multimedia communication. Recently, P2PSIP (Peer-to-Peer SIP), which combines DHT (distributed hash table) and SIP, has been proposed to overcome the drawbacks of traditional CS SIP (client/server architecture SIP). However, the introduction of DHT increases the registration overhead and, session setup overhead/latency. These...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.