[1] LIU L, LI M, LI Q, et al. Perceptually transparent information hiding in G. 729 bitstream[C]//Proceedings of the 2008 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Piscataway, NJ:IEEE, 2008:406-409. [2] HUANG Y, TANG S, YUAN J. Steganography in inactive frames of VoIP streams encoded by source codec[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(2):296-306. [3] LIU J, ZHOU K, TIAN H. Least-significant-digit steganography in low bitrate speech[C]//Proceedings of the 2012 IEEE International Conference on Communications. Piscataway, NJ:IEEE, 2012:1133-1137. [4] LIN R. An imperceptible information hiding in encoded bits of speech signal[C]//Proceedings of the 2015 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Piscataway, NJ:IEEE, 2015:37-40. [5] LIN R. High capacity information hiding scheme using VAD algorithm[C]//Proceedings of the 2016 IEEE International Conference on Consumer Electronics-Taiwan. Piscataway, NJ:IEEE, 2016:1-2. [6] WU Z, CAO H, LI D. An approach of steganography in G.729 bitstream based on matrix coding and interleaving[J]. Chinese Journal of Electronics, 2015, 24(1):157-165. [7] 田晖,郭舒婷,秦界,等.基于可量化性能分级的自适应IP语音隐写方法[J].电子学报,2016,44(11):2735-2741.(TIAN H, GUO S T, QIN J, et al. Adaptive voice-over-IP steganography based on quantitative performance ranking[J]. Acta Electronica Sinica, 2016, 44(11):2735-2741.) [8] 吴秋玲,吴蒙.一种挖掘低速率语音编码最低有效位的新方法[J].计算机应用与软件,2016,33(8):273-276.(WU Q L, WU M. A new method of mining least significant bit in low bit-rate speech code[J]. Computer Applications and Software, 2016, 33(8):273-276.) [9] XIAO B, HUANG Y, TANG S. An approach to information hiding in low bit-rate speech stream[C]//Proceedings of the 2008 IEEE Global Telecommunications Conference. N Piscataway, NJ:IEEE, 2008:1-5. [10] WU Z, GAO W, WEI Y. LPC parameters substitution for speech information hiding[J]. The Journal of China Universities of Posts and Telecommunications, 2009, 16(6):103-112. [11] KHADEMI M, TINATI M A. Audio steganography by using of linear predictive coding analysis in the safe places of discrete wavelet transform domain[C]//Proceedings of the 2011 IEEE Iranian Conference on Electrical Engineering. Piscataway, NJ:IEEE, 2011:1-5. [12] TIAN H, LIU J, LI S. Improving security of quantization-index-modulation steganography in low bit-rate speech streams[J]. Multimedia Systems, 2014, 20(2):143-154. [13] LIU P, LI S, WANG H. Steganography integrated into linear predictive coding for low bit-rate speech codec[J]. Multimedia Tools and Applications, 2017, 76(2):2837-2859. [14] LIU P, LI S, WANG H. Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec[J]. Multimedia Systems, 2017, 23(4):485-497. [15] GEISER B, VARY P. High rate data hiding in ACELP speech codecs[C]//Proceedings of the 2008 IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway, NJ:IEEE, 2008:4005-4008. [16] MIAO H, HUANG L, CHEN Z, et al. A new scheme for covert communication via 3G encoded speech[J]. Computers & Electrical Engineering, 2012, 38(6):1490-1501. [17] YAN S, TANG G, CHEN Y. Incorporating data hiding into G.729 speech codec[J]. Multimedia Tools and Applications, 2016, 75(18):11493-11512. [18] REN Y, WU H, WANG L. An AMR adaptive steganography algorithm based on minimizing distortion[J/OL]. Multimedia Tools and Applications[2017-07-15]. https://doi.org/10.1007/s11042-017-4860-1. [19] NISHIMURA A. Data hiding in pitch delay data of the adaptive multi-rate narrow-band speech codec[C]//Proceedings of the 2009 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Piscataway, NJ:IEEE, 2009:483-486. [20] 余迟,黄刘生,杨威,等.一种针对基音周期的3G信息隐藏方法[J].小型微型计算机系统,2012,33(7):1445-1449.(YU C, HUANG L S, YANG W, et al. A 3G speech data hiding method based on pitch period[J]. Journal of Chinese Computer Systems, 2012, 33(7):1445-1449.) [21] HUANG Y, LIU C, TANG S, et al. Steganography integration into a low-bit rate speech codec[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(6):1865-1875. [22] 刘程浩,柏森,黄永峰,等.一种基于基音预测的信息隐藏算法[J].计算机工程,2013,39(2):137-140.(LIU C H, BAI S, HUANG Y F, et al. An information hiding algorithm based on pitch prediction[J]. Computer Engineering, 2013, 39(2):137-140.) [23] 严书凡,汤光明,孙怡峰.基于基音周期预测的低速率语音隐写[J].计算机应用研究,2015,32(6):1774-1777.(YAN S F, TANG G M, SUN Y F. Steganography for low bit-rate speech based on pitch period prediction[J]. Application Research of Computers, 2015, 32(6):1774-1777.) [24] JANICKI A. Pitch-based steganography for speech voice codec[J]. Security and Communication Networks, 2016, 9(15):2923-2933. [25] CHEN B, WORNELL G W. Quantization index modulation:a class of provably good methods for digital watermarking and information embedding[J]. IEEE Transactions on Information Theory, 2001, 47(4):1423-43. [26] LI S, TAO H, HUANG Y. Detection of quantization index modulation steganography in G. 723.1 bit stream based on quantization index sequence analysis[J]. Journal of Zhejiang University-Science C, 2012, 13(8):624-634. [27] LIU Q, SUNG AH, QIAO M. Temporal derivative-based spectrum and mel-cepstrum audio steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(3):359-368. |