Coverless VoIP Steganography Using Hash and Hash

Deepikaa, S; Saravanan, R

CYBERNETICS AND INFORMATION TECHNOLOGIES, 2020; 20 (3): 102

Abstract

Performing secure and robust embedding and extracting in real time voice streams without deteriorating the voice quality is a great challenge. This pa......

Full Text Link