Adaptive security scheme for real-time VoIP using multi-layer steganography.
Shourok AbdelRahimSamy GhoneimyGamal SelimPublished in: ICSIE (2018)
Keyphrases
- multi layer
- real time
- information security
- single layer
- neural network
- neural nets
- error back propagation
- quality of service
- network security
- authentication protocol
- data embedding
- multiple layers
- authentication scheme
- security analysis
- least significant bit
- data hiding
- network architecture
- secret message
- genetic algorithm
- data mining