Login / Signup

A Reliable Covert Communication Scheme Based on VoIP Steganography.

Harrison NealHala ElAarag
Published in: Trans. Data Hiding Multim. Secur. (2015)
Keyphrases
  • secret message
  • data embedding
  • high capacity
  • computer networks
  • data hiding