Login / Signup
A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP.
Hui Tian
Ke Zhou
Yongfeng Huang
Dan Feng
Jin Liu
Published in:
ICYCS (2008)
Keyphrases
</>
voice over ip
reed solomon codes
artificial neural networks
communication networks
network architecture
data hiding