Works matching IS 10184864 AND DT 2012 AND VI 49 AND IP 2
Results: 12
Evaluation of steganographic methods for oversized IP packets.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 207, doi. 10.1007/s11235-010-9362-7
- By:
- Publication type:
- Article
A performance analysis of HICCUPS-a steganographic system for WLAN.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 255, doi. 10.1007/s11235-010-9363-6
- By:
- Publication type:
- Article
Efficient data hiding with histogram-preserving property.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 179, doi. 10.1007/s11235-010-9364-5
- By:
- Publication type:
- Article
Spectrum-estimation based lossless information recovery for sparse array patterns.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 163, doi. 10.1007/s11235-010-9365-4
- By:
- Publication type:
- Article
Design and implementation of a reliable and authenticated satellite image communication.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 171, doi. 10.1007/s11235-010-9366-3
- By:
- Publication type:
- Article
Lightweight secure multimedia distribution based on homomorphic operations.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 187, doi. 10.1007/s11235-010-9367-2
- By:
- Publication type:
- Article
Network covert timing channel with distribution matching.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 199, doi. 10.1007/s11235-010-9368-1
- By:
- Publication type:
- Article
Multicarrier spread spectrum watermarking for secure error concealment in fading channel.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 219, doi. 10.1007/s11235-010-9369-0
- By:
- Publication type:
- Article
Image error concealment and quality access control based on data hiding and cryptography.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 239, doi. 10.1007/s11235-010-9371-6
- By:
- Publication type:
- Article
Efficient information hiding in H.264/AVC video coding.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 261, doi. 10.1007/s11235-010-9372-5
- By:
- Publication type:
- Article
Cryptanalysis on majority-voting based self-recovery watermarking scheme.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 231, doi. 10.1007/s11235-010-9380-5
- By:
- Publication type:
- Article
Toward network steganography detection.
- Published in:
- Telecommunication Systems, 2012, v. 49, n. 2, p. 161, doi. 10.1007/s11235-010-9361-8
- By:
- Publication type:
- Article