{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:59:42Z","timestamp":1760709582383,"version":"3.37.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788128"},{"type":"electronic","value":"9783319788135"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78813-5_40","type":"book-chapter","created":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T06:03:21Z","timestamp":1523340201000},"page":"752-762","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8027-9560","authenticated-orcid":false,"given":"Zhongliang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xueshun","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yongfeng","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,11]]},"reference":[{"key":"40_CR1","doi-asserted-by":"crossref","unstructured":"Janicki, A.: Novel method of hiding information in IP telephony using pitch approximation. In: 2015 10th International Conference on Availability, Reliability and Security (ARES). IEEE (2015)","DOI":"10.1109\/ARES.2015.12"},{"issue":"3","key":"40_CR2","doi-asserted-by":"publisher","first-page":"2139","DOI":"10.1007\/s11042-012-1224-8","volume":"70","author":"W Mazurczyk","year":"2014","unstructured":"Mazurczyk, W., Szaga, P., Szczypiorski, K.: Using transcoding for hidden communication in IP telephony. Multimed. Tools App. 70(3), 2139\u20132165 (2014)","journal-title":"Multimed. Tools App."},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"Yang, Z., Huang, Y.F., Tao, H.Z., Yang, W.X.: Protocol of steganography in streaming media on VoIP network based on variable length coding. In: National Conference on Information Technology and Computer Science (CITCS 2012), Lanzhou, China (2012)","DOI":"10.2991\/citcs.2012.267"},{"issue":"22","key":"40_CR4","first-page":"826","volume":"4","author":"J Yuan","year":"2013","unstructured":"Yuan, J., Huang, Y.F., Li, X.: A quantitation method to the imperceptibility of hiding-vector in multi-dimensional hiding space. Chin. J. Electron. 4(22), 826\u2013832 (2013)","journal-title":"Chin. J. Electron."},{"issue":"2","key":"40_CR5","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/TIFS.2011.2108649","volume":"6","author":"YF Huang","year":"2011","unstructured":"Huang, Y.F., Tang, S.Y., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296\u2013306 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Zhou, K., Liu, J., Tian, H., Li, C.: State-based steganography in low bit rate speech. In: Proceedings of 20th ACM Multimedia Conference (ACM-MM2012), Nara, Japan, 29 Oct\u20132 Nov 2012, pp. 1109\u20131112 (2012)","DOI":"10.1145\/2393347.2396395"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Chou, Y.C., Kieu, T.D.: An information hiding scheme using sudoku. In: Proceedings of 3rd International Conference on Innovative Computing Information and Control (ICICIC), Dalian, China, p. 17, June 2008","DOI":"10.1109\/ICICIC.2008.149"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Chen, Y.H., Wang, Z.H., Li, M.C.: A data embedding scheme based on a magic matrix and wet paper codes. In: Proceedings of 2009 International Conference on Computational Intelligence and Natural Computing (CINC), Wuhan, China, pp. 303\u2013306, June 2009","DOI":"10.1109\/CINC.2009.250"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Liu, L.H., Li, M.Y., Liang, Y.: Perceptually transparent information hiding in G.729 bitstream. In: Proceedings of IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), Harbin, China, pp. 406\u2013409 (2008)","DOI":"10.1109\/IIH-MSP.2008.297"},{"issue":"5","key":"40_CR10","first-page":"194","volume":"35","author":"P You","year":"2008","unstructured":"You, P., Ji, X., Lu, P.: Performance analysis of using G.723.1\u2019s high-rate codes to hiding information in packed communication system. Comput. Sci. 35(5), 194\u2013197 (2008)","journal-title":"Comput. Sci."},{"issue":"3","key":"40_CR11","first-page":"1334","volume":"4","author":"NA Malhotra","year":"2014","unstructured":"Malhotra, N.A., Tahilramani, N.: Steganography approach of weighted speech analysis with and without vector quantization using variation in weight factor. Int. J. Curr. Eng. Technol. 4(3), 1334\u20131336 (2014)","journal-title":"Int. J. Curr. Eng. Technol."},{"issue":"4","key":"40_CR12","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization Index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423\u20131443 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"40_CR13","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1109\/TIFS.2012.2218599","volume":"7","author":"YF Huang","year":"2012","unstructured":"Huang, Y.F., Liu, J., Tang, S.Y., Sen, B.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865\u20131875 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"40_CR14","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s00530-013-0302-8","volume":"20","author":"H Tian","year":"2014","unstructured":"Tian, H., Liu, J., Li, S.: Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimed. Syst. 20(2), 143\u2013154 (2014)","journal-title":"Multimed. Syst."},{"issue":"1","key":"40_CR15","first-page":"57","volume":"24","author":"J Zhi","year":"2015","unstructured":"Zhi, J., Hai, J., Dou, Z.: An approach of steganography in G.729 bitstream based on matrix coding and interleaving. Chin. J. Electron. 24(1), 57\u2013165 (2015)","journal-title":"Chin. J. Electron."},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Bilal, I., Kumar, R., Roj, M.S., Mishra, P.K.: Recent advancement in audio steganography. In: International Conference on Parallel Distributed and Grid Computing, vol. 11, pp. 1945\u20131953. IEEE (2015)","DOI":"10.1109\/PDGC.2014.7030779"},{"issue":"3","key":"40_CR17","first-page":"2741","volume":"2","author":"P Sarada","year":"2012","unstructured":"Sarada, P., BalaSwamy, C.: Improving image data hiding capacity scheme using sudoku puzzle in color images. Int. J. Eng. Res. App. (IJERA) 2(3), 2741\u20132744 (2012)","journal-title":"Int. J. Eng. Res. App. (IJERA)"},{"key":"40_CR18","doi-asserted-by":"crossref","unstructured":"Maji, A.K., Pal, R.K., Roy, S.: A novel steganographic scheme using sudoku. In: Proceedings of IEEE International Conference on Electrical Information and Communication Technology (EICT), Khulna, pp. 1\u20136, February 2014","DOI":"10.1109\/EICT.2014.6777849"},{"key":"40_CR19","doi-asserted-by":"crossref","unstructured":"Valandar, M.Y., Ayubi, P., Barani, M.J.: High secure digital image steganography based on 3D chaotic map. In: Information and Knowledge Technology. IEEE (2015)","DOI":"10.1109\/IKT.2015.7288810"},{"key":"40_CR20","doi-asserted-by":"crossref","unstructured":"Peng, X.S., Huang, Y.F., Li, F.F.: A steganography scheme in a low-bit rate speech codec based on 3D-sudoku matrix. In: 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN 2016), Beijing (2016)","DOI":"10.1109\/ICCSN.2016.7586638"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78813-5_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,14]],"date-time":"2019-10-14T17:57:19Z","timestamp":1571075839000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78813-5_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788128","9783319788135"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78813-5_40","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}