Citation: | WU Zhijun, GUO Anxin, SHEN Dandan. An Hiding Algorithm of Nonzero Pulses Position Information Based on G.729 Speech Coding[J]. Journal of Electronics & Information Technology, 2018, 40(6): 1438-1445. doi: 10.11999/JEIT170879 |
ZHOU Wenbo, ZHANG Weiming, and YU Nenghai. A new rule for cost reassignment in adaptive steganography[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(11): 2654-2667. doi: 10.1109/TIFS.2017.2718480.
|
REN Yanzhen, YANG Jing, WANG Jinwei, et al. AMR steganalysis based on second-order difference of pitch delay[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(6): 1345-1357. doi: 10.1109/TIFS.2016.2636087.
|
TIAN Hui, SUN Jun, CHANG Chinchen, et al. Hiding information into voice-over-IP streams using adaptive bitrate modulation[J]. IEEE Communications Letters, 2017, 21(4): 749-752. doi: 10.1109/LCOMM.2017.2659718.
|
WU Zhijun, GAO Wei, and YANG Wei. LPC parameters substitution for speech information hiding[J]. The Journal of China Universities of Posts and Telecommunications, 2009, 16(6): 103-112. doi: 10.1016/S1005-8885(08)60295-2.
|
WU Zhijun, CAO Haijuan, and LI Douzhe. An approach of steganography in G.729 bitstream based on matrix coding and interleaving[J]. Chinese Journal of Electronics, 2015, 24(1): 157-165. doi: 10.1049/cje.2015.01.026.
|
PENG Xueshun, HUANG Yongfeng, and LI Fufang. A steganography scheme in a low-bit rate speech codec based on 3D-sudoku matrix[C]. 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN), Beijing, China, 2016: 13-18.
|
XIAO Bo, HUANG Yongfeng, and TANG Shanyu. An approach to information hiding in low bit-rate speech stream[C]. 2008 IEEE Global Telecommunications Conference, New Orleans, USA, 2008: 1-5.
|
HUANG Yongfeng, TANG Shanyu, and YUAN Jian. Steganography in inactive frames of VoIP streams encoded by source codec[J]. IEEE Transactions on Information Forensics Security, 2011, 6(2): 296-306. doi: 10.1109/TIFS.2011. 2108649.
|
缪海波. 基于流媒体的网络隐信道研究[D]. [博士论文], 中国科学技术大学, 2014: 46-53.
|
MIAO Haibo. Research on covert channel based on streaming midea[D]. [Ph.D. dissertation], University of Science and Technology of China, 2014: 46-53.
|
LIU Lihua, LI Mingyu, LI Qiong, et al. Perceptually transparent information hiding in G.729 bitstream[C]. 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008: 406-409.
|
李松斌, 孙东红, 袁键, 等. 一种基于码字分布特性的G.729A压缩语音流隐写分析方法[J]. 电子学报, 2012, 40(4): 842-846. doi: 10.3969/j.issn.0372-2112.2012.04.036.
|
LI Songbin, SUN Donghong, YUAN Jian, et al. A steganalysis method for G.729A compressed speech stream based on codeword distribution characteristics[J]. Acta Electronica Sinica, 2013, 40(4): 842-846. doi: 10.3969/j.issn. 0372-2112.2012.04.036.
|
杨婉霞, 余晖, 胡萍. 在压缩语音编码中集成信息隐藏方法研究[J]. 电子学报, 2014, 42(7): 1305-1310. doi: 10.3969/j.issn. 0372-2112.2014.07.010.
|
YANG Wanxia, YU Hui, and HU Ping. Research on steganographic method integrated in the compressed speech codec[J]. Acta Electronica Sinica, 2014, 42(7): 1305-1310. doi: 10.3969/j.issn.0372-2112.2014.07.010.
|
白剑, 曹鹏. 语音信息隐藏容量研究[J]. 北京邮电大学学报, 2016, 39(S1): 76-80. doi: 10.13190/j.jbupt.2016.s.018.
|
BAI Jian and CAO Peng. Capacity estimation research for speech information hiding[J]. Journal of Beijing University of Posts and Telecommunications, 2016, 39(S1): 76-80. doi: 10.13190/j.jbupt.2016.s.018.
|
丁琦, 平西建. 基于脉冲位置参数统计特征的压缩域语音隐写分析[J]. 计算机科学, 2011, 38(1): 217-220.
|
DING Qi and PING Xijian. Steganalysis of compressed speech based on statistics of pulse position parameters[J]. Computer Science, 2011, 38(1): 217-220.
|
DJEBBAR F and AYAD B. A new steganalysis method to detect information hiding in speech[C]. 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 2017: 1879-1884.
|
吴秋玲, 吴蒙. 基于小波变换的语音信息隐藏新方法[J]. 电子与信息学报, 2016, 38(4): 834-840. doi: 10.11999/JEIT 150856.
|
WU Qiuling and WU Meng. Novel audio information hiding algorithm based on wavelet transform[J]. Journal of Electronics Information Technology, 2016, 38(4): 834-840. doi: 10.11999/JEIT150856.
|