Login / Signup
A Reliable Covert Communication Scheme Based on VoIP Steganography.
Harrison Neal
Hala ElAarag
Published in:
Trans. Data Hiding Multim. Secur. (2015)
Keyphrases
</>
secret message
data embedding
high capacity
computer networks
data hiding