{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T18:40:02Z","timestamp":1746297602992,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662438855"},{"type":"electronic","value":"9783662438862"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43886-2_5","type":"book-chapter","created":{"date-parts":[[2014,7,8]],"date-time":"2014-07-08T09:11:39Z","timestamp":1404810699000},"page":"63-76","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Steganalysis of Compressed Speech Based on Markov and Entropy"],"prefix":"10.1007","author":[{"given":"Haibo","family":"Miao","sequence":"first","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Xiaorong","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Zhili","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,9]]},"reference":[{"issue":"7","key":"5_CR1","first-page":"1062","volume":"87","author":"FAP Petitcolas","year":"1999","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding - a survey. Proc. IEEE Spec. Issue Prot. Multimed. Content 87(7), 1062\u20131078 (1999)","journal-title":"Proc. IEEE Spec. Issue Prot. Multimed. Content"},{"issue":"10","key":"5_CR2","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1022594.1022597","volume":"47","author":"H Wang","year":"2004","unstructured":"Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Commun. ACM 47(10), 76\u201382 (2004)","journal-title":"Commun. ACM"},{"issue":"3","key":"5_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2000486.2000492","volume":"7","author":"Q Liu","year":"2011","unstructured":"Liu, Q., Sung, A.H., Qiao, M.: Derivative-based audio steganalysis. ACM Trans. Multimed. Comput. Commun. Appl. 7(3), 1\u201319 (2011)","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"5_CR4","unstructured":"Scott A. Moskowitz, Marc Cooperman.M.S.A., C. M.: Steganographic method and device. USA Patent (1997)"},{"issue":"3\u20134","key":"5_CR5","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3\u20134), 313\u2013336 (1996)","journal-title":"IBM Syst. J."},{"key":"5_CR6","unstructured":"Lee, C., Moallemi, K., Warren, R.: Method and apparatus for transporting auxiliary data in audio signals. USA Patent (1998)"},{"issue":"3","key":"5_CR7","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/30.883441","volume":"46","author":"S-K Lee","year":"2000","unstructured":"Lee, S.-K., Ho, Y.-S.: Digital audio watermarking in the cepstrum domain. IEEE Trans. Consum. Electron. 46(3), 744\u2013750 (2000)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/3-540-61996-8_48","volume-title":"Information Hiding","author":"D Gruhl","year":"1996","unstructured":"Gruhl, D., Bender, W., Lu, A.: Echo hiding. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 295\u2013315. Springer, Heidelberg (1996)"},{"key":"5_CR9","unstructured":"Gopalan, K., Wenndt, S., Noga, A., Haddad, D., Adams, S.: Covert speech communication via cover speech by tone insertion. In: Proceedings of the 2003 IEEE Aerospace Conference, Big Sky, MT (2003)"},{"key":"5_CR10","unstructured":"Gopalan, K., Wenndt, S.: Audio Steganography for covert data transmission by imperceptible tone insertion. In: Proceedings of the IASTED International Conference on Communication Systems and Applications, Banff, Canada (2004)"},{"issue":"6","key":"5_CR11","doi-asserted-by":"publisher","first-page":"1490","DOI":"10.1016\/j.compeleceng.2012.05.003","volume":"38","author":"H Miao","year":"2012","unstructured":"Miao, H., Huang, L., Chen, Z., Yang, W., Al-hawbani, A.: A new scheme for covert communication via 3G encoded speech. Comput. Electr. Eng. 38(6), 1490\u20131501 (2012)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"5_CR12","first-page":"545","volume":"15","author":"Z Wu","year":"2006","unstructured":"Wu, Z., Yang, W.: Speech information hiding in G.729. Chin. J. Electron. 15(3), 545\u2013549 (2006)","journal-title":"Chin. J. Electron."},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Lu, Z.M., Yan, B.: Watermarking combined with CELP speech coding for authentication. IEICE Trans. Inf. Syst. E88-D(2), 330\u2013334 (2005)","DOI":"10.1093\/ietisy\/E88-D.2.330"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Geiser, B., Vary, P.: Backwards compatible wideband telephony in mobile networks: CELP watermarking and bandwidth extension. In: Proceedings of ICASSP, Honolulu, Hawai\u2019i, USA (2007)","DOI":"10.1109\/ICASSP.2007.366967"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Geiser, B., Vary, P.: High rate data hiding in ACELP speech codec. In: Proceedings of ICASSP, Caesars Palace, Las Vegas, Nevada, USA (2008)","DOI":"10.1109\/ICASSP.2008.4518532"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/978-3-540-77370-2_24","volume-title":"Information Hiding","author":"C Kraetzer","year":"2008","unstructured":"Kraetzer, C., Dittmann, J.: Pros and cons of mel-cepstrum based audio steganalysis using SVM classification. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 359\u2013377. Springer, Heidelberg (2008)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Zeng, W., Ai, H., Hu, R.: A novel steganalysis algorithm of phase coding in audio signal. In: Proceedings of the International Conference on Advanced Language Processing and Web Information Technology, pp. 261\u2013264 (2007)","DOI":"10.1109\/ALPIT.2007.41"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Zeng, W., Ai, H., Hu, R.: An algorithm of echo steganalysis based on power cepstrum and pattern classification. In: Proceedings of the International Conference on Information and Automation, pp. 1667\u20131670 (2008)","DOI":"10.1109\/ICINFA.2008.4608272"},{"issue":"3","key":"5_CR19","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1121\/1.1755731","volume":"5","author":"I Paraskevas","year":"2004","unstructured":"Paraskevas, I., Chilton, E.: Combination of magnitude and phase statistical features for audio classification. Acoust. Res. Lett. Online Acoust. Soc. Am. 5(3), 111\u2013117 (2004)","journal-title":"Acoust. Res. Lett. Online Acoust. Soc. Am."},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Johnson, M.K., Lyu, S., Farid, H.: Steganalysis of recorded speech. In: Proceedings of Conference on Security, Steganography and Watermarking of Multimedia, Contents VII, pp. 664\u2013672 (2005)","DOI":"10.1117\/12.586941"},{"key":"5_CR21","unstructured":"Ozer, H., Avcibas, I., Sankur, B., Memon, N.D.: Steganalysis of audio based on audio quality metrics. In: Proceedings of the Conference on Security, Steganography and Watermarking of Multimedia, Contents V, vol. 5020, pp. 55\u201366 (2003)"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/978-3-540-85886-7_33","volume-title":"Information Security","author":"Y Liu","year":"2008","unstructured":"Liu, Y., Chiang, K., Corbett, C., Archibald, R., Mukherjee, B., Ghosal, D.: A novel audio steganalysis based on high-order statistics of a distortion measure with hausdorff distance. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 487\u2013501. Springer, Heidelberg (2008)"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Holotyak, T., Fridrich, J., Voloshynovskiy, S.: Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In: Proceedings of the 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security (2005)","DOI":"10.1007\/11552055_31"},{"issue":"2","key":"5_CR24","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/LSP.2005.862152","volume":"13","author":"I Avcibas","year":"2006","unstructured":"Avcibas, I.: Audio steganalysis with content-independent distortion measures. IEEE Sig. Process. Lett. 13(2), 92\u201395 (2006)","journal-title":"IEEE Sig. Process. Lett."},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Liu, Q., Sung, A.H., Qiao, M.: Novel stream mining for audio steganalysis. In: Proceedings of the 17th ACM international conference on multimedia, Beijing, pp. 95\u2013104 (2009)","DOI":"10.1145\/1631272.1631288"},{"key":"5_CR26","unstructured":"Qi, D., Xijian, P.: Steganalysis of compressed speech based on histogram features. In: Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Chengdu, China (2010)"},{"key":"5_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-642-18405-5_21","volume-title":"Digital Watermarking","author":"Z Chen","year":"2011","unstructured":"Chen, Z., Huang, L., Meng, P., Yang, W., Miao, H.: Blind linguistic steganalysis against translation based steganography. In: Kim, H.-J., Shi, Y.Q., Barni, M. (eds.) IWDW 2010. LNCS, vol. 6526, pp. 251\u2013265. Springer, Heidelberg (2011)"},{"key":"5_CR28","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001), Software. http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm"}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43886-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T18:11:27Z","timestamp":1746295887000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-43886-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662438855","9783662438862"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43886-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"9 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}