|
- 1
-
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson,
R. Sparks, M. Handley, and E. Schooler.
Sip: Session initiation protocol.
RFC 3261, Internet Society (IETF), June 2002.
- 2
-
Wikipedia.
H.323 -- wikipedia, the free encyclopedia.
http://en.wikipedia.org/w/index.php?title=H.323&oldid=146577248, 2007.
[Online; accessed 2-September-2007].
- 3
-
Wikipedia.
Skinny client control protocol -- wikipedia, the free
encyclopedia.
http://en.wikipedia.org/w/index.php?title=Skinny_Client_Control_Protocol&oldid=133621770, 2007.
[Online; accessed 2-September-2007].
- 4
-
H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson.
Rtp: A transport protocol for real-time applications.
RFC 1889, Internet Society (IETF), January 1996.
- 5
-
J. Postel.
User datagram protocol.
RFC 768, Internet Society (IETF), August 1980.
- 6
-
M. Baugher, D. McGrew, M. Naslund, E. Carrara, and K. Norrman.
The secure real-time transport protocol (srtp).
RFC 3711, Internet Society (IETF), March 2004.
- 7
-
Mehdi Kharrazi, Husrev T. Sencar, and Nasir Memon.
Image steganography: Concepts and practice.
Lecture Notes Series, Institute for Mathematical Sciences,
National University of Singapore, 2004.
- 8
-
Huaiqing Wang and Shuozhong Wang.
Cyber warfare: steganography vs. steganalysis.
Commun. ACM, 47(10):76-82, 2004.
- 9
-
Tayana Morkel, Jan H P Eloff, and Martin S Olivier.
An overview of image steganography.
In Proceedings of the Fifth Annual Information Security South
Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005.
Published electronically.
- 10
-
Unknown.
S-tools 4.0.
ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-tools4.zip, August 2006.
- 11
-
Fabien A. P. Petitcolas.
mp3stego.
http://www.petitcolas.net/fabien/steganography/mp3stego/, June
2006.
- 12
-
Heinz Repp.
Hide 4 pgp.
http://www.rugeley.demon.co.uk/security/hide4pgp.zip, December
1996.
- 13
-
I)ruid.
An analysis of voip steganography research efforts.
http://druid.caughq.org/papers/An-Analysis-of-VoIP-Steganography-Research-Efforts.pdf, September 2007.
- 14
-
I)ruid.
Real-time steganography with rtp.
http://druid.caughq.org/presentations/Real-time-Steganography-with-RTP.pdf, August 2007.
- 15
-
Defcon 15.
http://www.defcon.org/html/defcon-15/dc-15-schedule.html,
August 2007.
- 16
-
T. Takahashi and W. Lee.
An assessment of voip covert channel threats.
http://voipcc.gtisc.gatech.edu/download/securecomm.pdf, July
2007.
- 17
-
Wikipedia.
G.711 -- wikipedia, the free encyclopedia.
http://en.wikipedia.org/w/index.php?title=G.711&oldid=151887535, 2007.
[Online; accessed 6-September-2007].
- 18
-
Wikipedia.
Least significant bit -- wikipedia, the free encyclopedia.
http://en.wikipedia.org/w/index.php?title=Least_significant_bit&oldid=150766150, 2007.
[Online; accessed 6-September-2007].
- 19
-
Voip foro - codecs.
http://www.voipforo.com/en/codec/codecs.php, 2007.
[Online; accessed 5-September-2007].
- 20
-
I)ruid.
Steganrtp.
http://sourceforge.net/projects/steganrtp/, August 2007.
- 21
-
D. Eastlake 3rd and P. Jones.
Us secure hash algorithm 1 (sha1).
RFC 3174, Internet Society (IETF), September 2001.
- 22
-
X. Wang, Y.L. Yin, and H. Yu.
Finding collisions in the full SHA-1.
Advances in Cryptology-CRYPTO, 3621:17-36, 2005.
- 23
-
I)ruid.
libfindrtp.
http://sourceforge.net/projects/libfindrtp/, February 2007.
- 24
-
Netfilter.
http://www.netfilter.org/, 2007.
[Online; accessed 6-September-2007].
- 25
-
Wikipedia.
Type-length-value -- wikipedia, the free encyclopedia.
http://en.wikipedia.org/w/index.php?title=Type-length-value&oldid=128880452, 2007.
[Online; accessed 3-September-2007].
- 26
-
Bob Jenkins.
Netfilter.
http://www.burtleburtle.net/bob/c/lookup3.c, May 2006.
[Online; accessed 6-September-2007].
- 27
-
Wikipedia.
Exclusive or -- wikipedia, the free encyclopedia.
http://en.wikipedia.org/w/index.php?title=Exclusive_or&oldid=152332544,
2007.
[Online; accessed 5-September-2007].
- 28
-
J. Mason, K. Watkins, J. Eisner, and A. Stubblefield.
A natural language approach to automated cryptanalysis of two-time
pads.
Proceedings of the 13th ACM conference on Computer and
communications security, pages 235-244, 2006.
- 29
-
A. Griffing.
Solving XOR Plaintext Strings with the Viterbi Algorithm.
Cryptologia, 30(3):258-265, 2006.
- 30
-
E. Dawson and L. Nielsen.
AUTOMATED CRYPTANALYSIS OF XOR PLAINTEXT STRINGS.
Cryptologia, 20(2):165-181, 1996.
- 31
-
Wikipedia.
Forward error correction -- wikipedia, the free encyclopedia,
2007.
[Online; accessed 10-September-2007].
|