- A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727-752, 2010.##
- N. Aoki, “A packet loss concealment technique for VoIP using steganography,” In Proc. Of International Symposium on Intelligent Signal Processing and Communication System ISPACS 2003, Awaji Island, Japan, pp. 470-473, December 7-10, 2003.##
- Z.Wu and W.Yang , “G. 711-based adaptive speech information hiding approach,” ICIC 2006, LNCS4113, pp. 1139-1144, 2006.##
- H. Tian, H. Jiang, K. Zhou, and D. Feng, “Adaptive partial-matching steganography for voice over IP using triple M sequences,” Computer Communications journal, vol. 34, pp. 2236-2247, 2011.##
- W. Mazurczyk and Z. Kotulski, “New VoIP traffic security scheme with digital watermarking,” In Proc. of25-th International Conference on Computer Safety, Reliability, and Security SafeComp 2006, LectureNotes in Computer Science 4166, pp. 170-181, 2006.##
- W. Mazurczyk and Z. Kotulski, “New security and control protocol for VoIP based on steganography and digital watermarking,” In: Proc 5th Int Conf Computer Science-research and applications (IBIZA2006), Poland, Kazimierz Dolny, 2006.##
- F. Li, B. Li, L. Peng, W. Chen, L. Zheng, and K. Xu, “A Steganographic Method Based on High Bit Rates Speech Codec of G. 723.1,” Springer, pp. 312-322, 2018.##
- S. Schmidt, W. Mazurczyk, R. Kulesza, J. Keller, and L. Caviglione, “Exploiting IP telephony with silence suppression for hidden data transfers,” Computers Security, vol. 79, pp. 17-32, 2018.##
- Sh. AbdelRahim, S. Ghoneimy, and G. Selim, “Adaptive security scheme for real-time VoIP using multi-layer steganography,” Proceedings of the 7th International Conference on Software and Information Engineering, pp. 106-110, 2018.##
- اصفهانی، پ، ذوالفقارینژاد، م، کرمی، پ، ارائه یک روش نهاننگاری جدید و قابل اعتماد از طریق VoIP، شانزدهمین کنفرانس مهندسی برق ایران، شهریور1392.##
- http:// communication.howstuffworks.com/ip-telephony.htm.##
- http://www.voip-iran.com.##
- W.Mazurczyk, “VoIP Steganography and Its Detection – A Survey, ACM Computing Surveys,” accepted for publications, ISSN 0360-0300, 2013.##
- W. Mazurczyk and J.Lubacz, “LACK—a VoIP steganographic method,” Telecommunication Syst: Model Anal Des Manag, vol. 45, no. 2-3, pp. 153-163, 2010.##
- W. Mazurczyk and K. Szczypiorski, “Steganography of VoIP streams,” On the Move to Meaningful Internet Systems: OTM 2008, vol. 5332, pp. 1001-1018, 2008.##
- M. Hamdaqa and L. Tahvildari, “ReLACK: A Reliable VoIP Steganography Approach,” in Fifth Internatinal Conference on Secure Software Integration and Reliability Improvement, pp. 190-197, 2011.##
- N. Aoki, “VoIP packet loss concealment based on two-side pitch waveform replication technique using steganography,” IEEE, vol. 100, pp. 52-55, 2004.##
- C. Wang and Q. Wu, “ Information hiding in real-time VoIP streams,” in Proceedings of in Proceedings of Ninth IEEE International Symposium on Multimedia, ser.ISM’ 07. Washington, DC, USA: IEEE Computer Society, pp. 255-262, 2007.##
- Y. Huang, S. Tang, and J. Yuan, “Steganography in inactive frames of VoIP streams encoded by source codec,” IEEE Transactions on information forensics and security, vol. 6, no. 2, pp. 296-306, 2011.##
|