Login / Signup

Design and evaluation of steganography for voice-over-IP.

Christian KrätzerJana DittmannThomas VogelReyk Hillert
Published in: ISCAS (2006)
Keyphrases
  • computer vision
  • design process
  • real time
  • neural network
  • information security