SUN Xinhao, WANG Kaixi. Codeword Replacement Based on Shortest Euclidean Distance for VoIP Steganography[J]. Computer Engineering and Applications, 2022, 58(13): 128-134.
[1] SHANNON C E.Communication theory of secrecy systems[J].Bell System Technical Journal,1949,28(4):656-715.
[2] 刘小康,田晖,刘杰,等.IP语音隐写及隐写分析研究[J].重庆邮电大学学报(自然科学版),2019,31(3):407-419.
LIU X K,TIAN H,LIU J,et al.Survey for voice-over-IP steganography and steganalysis[J].Journal of Chongqing University of Posts and Telecommunications(Natural science Edition),2019,31(3):407-419.
[3] XIAO B,HUANG Y F,TANG S.An approach to information hiding in low bit-rate speech stream[C]//Proceedings of 2008 IEEE Global Telecommunications Conference,2008:1-5.
[4] TIAN H,LIU J,LI S B.Improving security of quantization-index-modulation steganography in low bit-rate speech streams[J].Multimedia Systems,2014,20(2):143-154.
[5] YAN S,TANG G,SUN Y,et al.A triple-layer steganography scheme for low bit-rate speech streams[J].Multimedia Tools and Applications,2015,74:11763-11782.
[6] 刘程浩,柏森,黄永蜂,等.一种基于G729a基音预测的信息隐藏算法[C]//第十届全国信息隐藏暨多媒体信息安全学术大会CIHW2012论文集,北京,2012:15-18.
LIU C H,BAI S,HUANG Y F,et al.An information hiding algorithm based on G729a pitch prediction[C]//Proceedings of China Information Hiding Workshop,Beijing,2012:15-18.
[7] SU Y M,HUANG Y F,LI X.Steganography-oriented noisy resistance model of G.729a[C]//Proceedings of Conference on Computational Engineering in Systems Applications,2007:11-15.
[8] LIU L,LI M,LI Q,et al.Perceptually transparent information hiding in G.729 bitstream[C]//Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing,2008:406-409.
[9] XU T T,YANG Z.Simple and effective speech steganography in G.723.1 low-rate codes[C]//Proceedings of 2009 International Conference on Wireless Communications & Signal Processing,2009:1-4.
[10] YANG D,BAI S,SHU G B,et al.Information hiding algorithm of G.723.1 high-rate speech flow[J].Computer Engineering,2011,37(22):114-115.
[11] TIAN H,ZHOU K,JIANG H,et al.An m-sequence based steganography model for voice over IP[C]//Proceedings of IEEE International Conference on Communications.New York:IEEE Press,2009:1-5.
[12] CHEN B,WORNELL G W.Quantization index modulation:A class of provably good methods for digital watermarking and information embedding[J].IEEE Transactions on Information Theory,2001,47(4):1423-1443.
[13] 陈铭,张茹,刘凡凡,等.基于DCT域QIM的音频信息伪装算法[J].通信学报,2009,30(8):105-111.
CHEN M,ZHANG R,LIU F F,et al.Audio steganography by quantization index modulation in the DCT domain[J].Journal on Communications,2009,30(8):105-111.
[14] 周围,田茂,陈小莉,等.自适应量化索引调制音频信息隐藏算法[J].电子测量技术,2018,41(4):107-111. ZHOU W,TIAN M,CHEN X L,et al.Adaptive quantitative index modulation audio information hiding algorithm[J].Electronic Measurement Technology,2018,41(4):107-111.
[15] 赵力.语音信号处理[M].北京:机械工业出版社,2016:2016:31-95.
ZHAO L.Speech signal processing[M].Beijing:China Machine Press,2016:31-95.
[16] 马兰,沈笑云,万棣.精通Visual C++视频/音频编解码技术[M].北京:人民邮电出版社,2008:253-372. MA L,SHEN X Y,WAN D.Proficient in Visual C++ video/audio codec technology[M].Beijing:Posts & Telecom Press,2008:253-372.
[17] LIN Z N,HUANG Y F,WANG J L.RNN-SM:Fast steganalysis of VoIP streams using recurrent neural network[J].IEEE Transactions on Information Forensics and Security,2018,13(7):1854-1868.
[18] 王翠平,郭立,王昱洁,等.音频DCT系数分布函数的建模[J].中国科学院研究生院学报,2011,28(6):752-758.
WANG C P,GUO L,WANG Y J,et al.Distributions of audio DCT coefficients[J].Journal of the Graduate School of the Chinese Academy of Sciences,2011,28(6):752-758.