ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1111.1250
  4. Cited By
Using Transcoding for Hidden Communication in IP Telephony

Using Transcoding for Hidden Communication in IP Telephony

4 November 2011
W. Mazurczyk
Pawel Szaga
K. Szczypiorski
ArXiv (abs)PDFHTML

Papers citing "Using Transcoding for Hidden Communication in IP Telephony"

12 / 12 papers shown
Title
The MESA Security Model 2.0: A Dynamic Framework for Mitigating Stealth
  Data Exfiltration
The MESA Security Model 2.0: A Dynamic Framework for Mitigating Stealth Data Exfiltration
Sanjeev Pratap Singh
Naveed Afzal
55
3
0
17 May 2024
A Revised Taxonomy of Steganography Embedding Patterns
A Revised Taxonomy of Steganography Embedding Patterns
S. Wendzel
L. Caviglione
W. Mazurczyk
A. Mileva
J. Dittmann
...
K. Lamshöft
C. Vielhauer
Laura Hartmann
J. Keller
Tom Neubert
48
33
0
16 Jun 2021
Presenting a Method for Improving Echo Hiding
Presenting a Method for Improving Echo Hiding
Haniyeh Rafiee
M. Fakhredanesh
19
0
0
12 Feb 2021
A novel method of speech information hiding based on 3D-Magic Matrix
A novel method of speech information hiding based on 3D-Magic Matrix
Zhongliang Yang
X. Peng
Yongfeng Huang
Chinchen Chang
21
6
0
09 Sep 2018
MoveSteg: A Method of Network Steganography Detection
MoveSteg: A Method of Network Steganography Detection
K. Szczypiorski
Tomasz Tyl
20
7
0
06 Oct 2016
Systemization of Pluggable Transports for Censorship Resistance
Systemization of Pluggable Transports for Censorship Resistance
Sheharbano Khattak
Laurent Simon
Steven J. Murdoch
27
13
0
23 Dec 2014
Steganography in Modern Smartphones and Mitigation Techniques
Steganography in Modern Smartphones and Mitigation Techniques
W. Mazurczyk
L. Caviglione
46
108
0
27 Aug 2014
Hidden and Uncontrolled - On the Emergence of Network Steganographic
  Threats
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
S. Wendzel
W. Mazurczyk
L. Caviglione
M. Meier
64
32
0
08 Jul 2014
Steganalysis of Transcoding Steganography
Steganalysis of Transcoding Steganography
Artur Janicki
W. Mazurczyk
K. Szczypiorski
70
37
0
22 Oct 2012
IP over Voice-over-IP for censorship circumvention
IP over Voice-over-IP for censorship circumvention
Amir Houmansadr
Thomas J. Riedl
Nikita Borisov
A. Singer
46
14
0
11 Jul 2012
VoIP Steganography and Its Detection - A Survey
VoIP Steganography and Its Detection - A Survey
W. Mazurczyk
87
98
0
20 Mar 2012
Influence of Speech Codecs Selection on Transcoding Steganography
Influence of Speech Codecs Selection on Transcoding Steganography
Artur Janicki
W. Mazurczyk
K. Szczypiorski
81
17
0
30 Jan 2012
1