Informative Information for the Uninformed | ||||||||||||||
|
||||||||||||||
VoIP SteganographyA few previous research efforts have been made to employ steganography with various VoIP technologies. A complete analysis of such efforts identified prior to embarking upon the research presented in this paper has previously been provided[13]. In summary, most identified research efforts were utilizing steganographic techniques but not achieving the primary goal of steganography or otherwise employing steganographic techniques to accomplish an otherwise overt goal.
|