Sciweavers

54 search results - page 2 / 11
» Steganography of VoIP streams
Sort
View
TC
2008
13 years 4 months ago
Improving Quality of VoIP Streams over WiMax
Real-time services such as VoIP are becoming popular and are major revenue earners for network service providers. These services are no longer confined to the wired domain and are ...
Shamik Sengupta, Mainak Chatterjee, Samrat Ganguly
ICMCS
2005
IEEE
140views Multimedia» more  ICMCS 2005»
13 years 10 months ago
CSR: Speaker Recognition from Compressed VoIP Packet Stream
VoIP applications require the ability to identify speakers in real time. This paper presents Compressed Speaker Recognition (CSR), an innovative approach to perform speaker recogn...
Charu C. Aggarwal, David P. Olshefski, Debanjan Sa...
IJNSEC
2007
253views more  IJNSEC 2007»
13 years 4 months ago
Stream or Block Cipher for Securing VoIP?
When the network is homogeneous, choosing the cipher type for a packet telephony application is simple. It is clear that stream ciphers perform better than block ciphers over land...
Ashraf D. Elbayoumy, Simon J. Shepherd
ICC
2007
IEEE
105views Communications» more  ICC 2007»
13 years 11 months ago
VoIP Capacity over Multiple IEEE 802.11 WLANs
– It is well known that IEEE 802.11 WLAN is highly inefficient for transporting voice data. For example, if one simply takes the data rate of 802.11b, 11Mbps, and divide it by tw...
An Chan, Soung Chang Liew
VLDB
2009
ACM
165views Database» more  VLDB 2009»
14 years 5 months ago
Online pairing of VoIP conversations
This paper answers the following question; given a multiplicity of evolving 1-way conversations, can a machine or an algorithm discern the conversational pairs in an online fashio...
Michail Vlachos, Aris Anagnostopoulos, Olivier Ver...