The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In homeland defense and security, secure data transfer is still critical challenging due to the open nature of Internet. One of the solutions which came to the rescue is the VoIP (Voice over IP) steganography. VoIP is unquestionably the most popular real-time service in IP networks today. To date, existing VoIP steganography research commonly focus on information hiding in the LSB bits of network...
Nowadays, enterprises and individuals are increasing tending to store their data in the cloud storage systems, yet, these sensitive data will face serious security threats. Currently, cloud storage service providers mainly adopt encryption and authentication to protect sensitive data, and a lot of approaches have been proposed to ensure data security in cloud storage systems. Recently, audio steganography...
Recently, streaming steganography has attracted a lot of research efforts, however, since multimedia processing requires high performance hardware and software, most literatures in the streaming steganography community focus on simulations due to lack of a practical streaming steganography platform. Towards this issue, we design and develop VISOR, a novel VoIP Steganography Oriented platfoRm. VISOR...
With the rapid development of the Internet, steganography on Voice over IP (VoIP) has been attracted a lot of research efforts. To date, existing VoIP steganography research commonly focus on information hiding in the LSB bits of Network Audio Streams, yet, we found this approach may raise serious security threat, where the hidden information may be easily removed, detected and attacked. Towards this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.