Sciweavers

54 search results - page 11 / 11
» Steganography of VoIP streams
Sort
View
EJWCN
2010
138views more  EJWCN 2010»
12 years 11 months ago
An Interference-Aware Admission Control Design for Wireless Mesh Networks
With the increasing popularity of wireless mesh networks (WMNs), the demand for multimedia services encompassing VoIP, multimedia streaming and interactive gaming is increasing rap...
Devu Manikantan Shila, Tricha Anjali
ICIP
2007
IEEE
14 years 6 months ago
Estimating Steganographic Capacity for Odd-Even Based Embedding and its Use in Individual Compensation
We present a method to compute the steganographic capacity for images, with odd-even based hiding in the quantized discrete cosine transform domain. The method has been generalize...
Anindya Sarkar, B. S. Manjunath
IH
2005
Springer
13 years 10 months ago
ID Modulation: Embedding Sensor Data in an RFID Timeseries
This paper reports the first use of ID Modulation to embed a bitstream representing sensor information in a standards-compliant Radio Frequency Identification (RFID) channel. Like ...
Joshua R. Smith, Bing Jiang, Sumit Roy, Matthai Ph...
IH
1998
Springer
13 years 9 months ago
Attacks on Copyright Marking Systems
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects....
Fabien A. P. Petitcolas, Ross J. Anderson, Markus ...