1. |
C. Y.Gu and X. L. Cao, “Research on Information Hiding Technology,” inProceedings of 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet 2012), pp. 2035-2037, Shanghai, China, April 2012
|
2. |
C. D.Wang and D. F. Ma, “Information Hiding based on Real-Time Voice in DCT Domain,” Computer Engineering and Design, Vol. 22, No. 2, pp. 474-478, February 2012 (in Chinese)
|
3. |
F. F. Li, B. B. Li, L. X. Peng, W. B. Chen, L. G. Zheng,K. F. Xu, “A Steganographic Method based on High Bit Rates Speech Codec of G.723.1,” inProceedings of 2018 the 4th International Conference Cloud Computing and Security, pp. 312-322, Haikou, China, June 2018
|
4. |
L. Ma, Z. J. Wu,W. Yang, “Approach to Hiding Secret Speech Information in G.721 Scheme,” inProceedings of 3rd International Conference on Intelligent Computing (ICIC 2007), pp. 1315-1324, Qingdao, China, August 2007
|
5. |
R. Mannell,“The Combined Effect of Speech Codec Quality and Transmission Delay on Human Performance during Complex Spoken Interactions,” International Journal of Speech Technology, Vol. 9, No. 3-4, pp. 53-74, December 2006
|
6. |
P. Liu, S. B. Li,H. Q. Wang, “Steganography Integrated into Linear Predictive Coding for Low Bit-Rate Speech Codec,” Multimedia Tools and Applications, Vol. 76, No. 2, pp. 2837-2859, 2017
|
7. |
P. Liu, S. Li,H. Wang, “Steganography in Vector Quantization Process of Linear Predictive Coding for Low-Bit-Rate Speech Codec,” Multimedia Systems, Vol. 23, No. 4, pp. 485-497, 2017
|
8. |
S. T.Guo and H. Tian, “An Information Hiding Method based on G.729a Speech,” Journal of Huaqiao University (Natural Science), Vol. 35, No. 3, pp. 277-282, May 2014 (in Chinese)
|
9. |
Y. F. Huang, S. Y. Tang,J. Yuan, “Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec,” IEEE Transactions on Information Forensics and Security, Vol. 6, No. 2, pp. 296-306, June 2011
|
10. |
L. J. Zhang, X. Y. Hu, W. Rasheed, T. W. Huang,C. H. Zhao, “An Enhanced Steganographic Code and its Application in Voice-over-IP Steganography,”IEEE Access, Vol. 7, pp. 97187-97195, 2019
|
11. |
Z. L. Yang, X. S. Peng, Y. F. Huang,C. C. Chang, “A Novel Method of Speech Information Hiding based on 3D-Magic Matrix,” Journal of Internet Technology, Vol. 20, No. 4, pp. 1167-1175, 2019
|