Login / Signup
Design and evaluation of steganography for voice-over-IP.
Christian Krätzer
Jana Dittmann
Thomas Vogel
Reyk Hillert
Published in:
ISCAS (2006)
Keyphrases
</>
computer vision
design process
real time
neural network
information security