Uninformed: Informative Information for the Uninformed

Vol 8» 2007.Sep


VoIP Steganography

A few previous research efforts have been made to employ steganography with various VoIP technologies. A complete analysis of such efforts identified prior to embarking upon the research presented in this paper has previously been provided[13]. In summary, most identified research efforts were utilizing steganographic techniques but not achieving the primary goal of steganography or otherwise employing steganographic techniques to accomplish an otherwise overt goal.