{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T17:21:51Z","timestamp":1767374511311,"version":"3.40.5"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819725847"},{"type":"electronic","value":"9789819725854"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-2585-4_21","type":"book-chapter","created":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T05:02:07Z","timestamp":1713934927000},"page":"292-303","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["VStego800K: Large-Scale Steganalysis Dataset for Streaming Voice"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-1326-4282","authenticated-orcid":false,"given":"Xuan","family":"Xu","sequence":"first","affiliation":[]},{"given":"Shengnan","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Zhengyang","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Pengcheng","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zhongliang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Linna","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,25]]},"reference":[{"key":"21_CR1","unstructured":"Theohary, C.A.: Terrorist Use of the Internet: Information Operations in Cyberspace. DIANE Publishing (2011)"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/978-3-030-43575-2_29","volume-title":"Digital Forensics and Watermarking","author":"Z Yang","year":"2020","unstructured":"Yang, Z., Wang, Ke., Ma, S., Huang, Y., Kang, X., Zhao, X.: Istego100k: large-scale image steganalysis dataset. In: Wang, H., Zhao, X., Shi, Y., Kim, H.J., Piva, A. (eds.) IWDW 2019. LNCS, vol. 12022, pp. 352\u2013364. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-43575-2_29"},{"key":"21_CR3","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1007\/978-3-319-78813-5_40","volume-title":"Security and Privacy in Communication Networks","author":"Z Yang","year":"2018","unstructured":"Yang, Z., Peng, X., Huang, Y.: A sudoku matrix-based method of pitch period steganography in low-rate speech coding. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) SecureComm 2017. LNICSSITE, vol. 238, pp. 752\u2013762. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78813-5_40"},{"key":"21_CR4","unstructured":"Yang, Z., Du, X., Tan, Y., Huang, Y., Zhang, Y.J.: Aag-stega: automatic audio generation-based steganography.\u00a0arXiv preprint arXiv:1809.03463 (2018)"},{"issue":"5","key":"21_CR5","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2018.2871746","volume":"14","author":"ZL Yang","year":"2018","unstructured":"Yang, Z.L., Guo, X.Q., Chen, Z.M., Huang, Y.F., Zhang, Y.J.: RNN-stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280\u20131295 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1109\/TIFS.2020.3023279","volume":"16","author":"ZL Yang","year":"2020","unstructured":"Yang, Z.L., Zhang, S.Y., Hu, Y.T., Hu, Z.W., Huang, Y.F.: VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Trans. Inf. Forensics Secur. 16, 880\u2013895 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-030-00012-7_24","volume-title":"Cloud Computing and Security","author":"Z Yang","year":"2018","unstructured":"Yang, Z., Zhang, P., Jiang, M., Huang, Y., Zhang, Y.-J.: Rits: real-time interactive text steganography based on automatic dialogue model. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICCCS 2018. LNCS, vol. 11065, pp. 253\u2013264. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00012-7_24"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Johnson, N.F., Sallee, P.A.: Detection of hidden information, covert channels and information flows.\u00a0Wiley Handbook of Science and Technology for Homeland Security, pp. 1\u201337 (2008)","DOI":"10.1002\/9780470087923.hhs427"},{"issue":"9","key":"21_CR9","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/JPROC.2002.802005","volume":"90","author":"B Goode","year":"2002","unstructured":"Goode, B.: Voice over internet protocol (VoIP). Proc. IEEE 90(9), 1495\u20131517 (2002)","journal-title":"Proc. IEEE"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Hamdaqa, M., Tahvildari, L.: ReLACK: a reliable VoIP steganography approach. In:\u00a02011 Fifth International Conference on Secure Software Integration and Reliability Improvement, pp. 189\u2013197. IEEE (2011)","DOI":"10.1109\/SSIRI.2011.24"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Tian, H., Zhou, K., Jiang, H., Huang, Y., Liu, J., Feng, D.: An adaptive steganography scheme for voice over IP. In:\u00a02009 IEEE International Symposium on Circuits and Systems, pp. 2922\u20132925. IEEE (2009)","DOI":"10.1109\/ISCAS.2009.5118414"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Xu, E., Liu, B., Xu, L., Wei, Z., Zhao, B., Su, J.: Adaptive VoIP steganography for information hiding within network audio streams. In:\u00a02011 14th International Conference on Network-Based Information Systems, pp. 612\u2013617. IEEE (2011)","DOI":"10.1109\/NBiS.2011.103"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Ballesteros L.D.M., Moreno A.J.M.: Highly transparent steganography model of speech signals using efficient wavelet masking.\u00a0Exp. Syst. Appl.\u00a039(10), 9141-9149 (2012)","DOI":"10.1016\/j.eswa.2012.02.066"},{"issue":"2","key":"21_CR14","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/TIFS.2011.2108649","volume":"6","author":"YF Huang","year":"2011","unstructured":"Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296\u2013306 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"21_CR15","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s00530-013-0302-8","volume":"20","author":"H Tian","year":"2014","unstructured":"Tian, H., Liu, J., Li, S.: Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimedia Syst. 20(2), 143\u2013154 (2014)","journal-title":"Multimedia Syst."},{"issue":"6","key":"21_CR16","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1109\/TIFS.2012.2218599","volume":"7","author":"Y Huang","year":"2012","unstructured":"Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865\u20131875 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR17","doi-asserted-by":"publisher","unstructured":"Simmons, G.J.: The prisoners\u2019 problem and the subliminal channel. In: Chaum, D. (eds)\u00a0Advances in Cryptology, pp. 51\u201367. Springer, Boston (1984). https:\/\/doi.org\/10.1007\/978-1-4684-4730-9_5","DOI":"10.1007\/978-1-4684-4730-9_5"},{"issue":"3","key":"21_CR18","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/TIFS.2009.2024718","volume":"4","author":"Q Liu","year":"2009","unstructured":"Liu, Q., Sung, A.H., Qiao, M.: Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forensics Secur. 4(3), 359\u2013368 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"21_CR19","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/s10772-016-9352-6","volume":"19","author":"C Paulin","year":"2016","unstructured":"Paulin, C., Selouani, S.A., Hervet, E.: Audio steganalysis using deep belief networks. Int. J. Speech Technol. 19(3), 585\u2013591 (2016)","journal-title":"Int. J. Speech Technol."},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Kraetzer, C., Dittmann, J.: Mel-cepstrum based steganalysis for VoIP steganography. In: Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, p. 650505. International Society for Optics and Photonics (2007)","DOI":"10.1117\/12.704040"},{"issue":"1","key":"21_CR21","doi-asserted-by":"publisher","first-page":"325","DOI":"10.32604\/cmc.2020.09784","volume":"64","author":"J Wang","year":"2020","unstructured":"Wang, J., Huang, L., Zhang, Y., Zhu, Y., Ni, J., et al.: An effective steganalysis algorithm for histogram-shifting based reversible data hiding. Comput. Mater. Continua 64(1), 325\u2013344 (2020)","journal-title":"Comput. Mater. Continua"},{"issue":"2","key":"21_CR22","doi-asserted-by":"publisher","first-page":"633","DOI":"10.32604\/cmc.2019.06154","volume":"60","author":"C Yang","year":"2019","unstructured":"Yang, C., Wang, J., Lin, C., Chen, H., Wang, W.: Locating steganalysis of LSB matching based on spatial and wavelet filter fusion. Comput. Mater. Continua 60(2), 633\u2013644 (2019)","journal-title":"Comput. Mater. Continua"},{"issue":"7","key":"21_CR23","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1049\/iet-com.2010.0348","volume":"5","author":"YF Huang","year":"2011","unstructured":"Huang, Y.F., Tang, S., Zhang, Y.: Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis. IET Commun. 5(7), 929\u2013936 (2011)","journal-title":"IET Commun."},{"issue":"4","key":"21_CR24","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J Fridrich","year":"2001","unstructured":"Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4), 22\u201328 (2001)","journal-title":"IEEE Multimedia"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Li, S.B., Tao, H.Z., Huang, Y.F.: Detection of quantization index modulation steganography in G. 723.1 bit stream based on quantization index sequence analysis.\u00a0J. Zhejiang Univ. SCI. C,\u00a013(8), 624\u2013634 (2012)","DOI":"10.1631\/jzus.C1100374"},{"issue":"7","key":"21_CR26","doi-asserted-by":"publisher","first-page":"1854","DOI":"10.1109\/TIFS.2018.2806741","volume":"13","author":"Z Lin","year":"2018","unstructured":"Lin, Z., Huang, Y., Wang, J.: RNN-SM: fast steganalysis of VoIP streams using recurrent neural network. IEEE Trans. Inf. Forensics Secur. 13(7), 1854\u20131868 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR27","unstructured":"Yang, Z., Yang, H., Hu, Y., Huang, Y., Zhang, Y.J.: Real-time steganalysis for stream media based on multi-channel convolutional sliding windows.\u00a0arXiv preprint arXiv:1902.01286 (2019)"},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"Yang, H., Yang, Z., Huang, Y.: Steganalysis of voip streams with cnn-lstm network. In:\u00a0Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 204\u2013209 (2019)","DOI":"10.1145\/3335203.3335735"},{"key":"21_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1007\/978-3-030-41579-2_45","volume-title":"Information and Communications Security","author":"H Yang","year":"2020","unstructured":"Yang, H., Yang, Z., Bao, Y., Huang, YongFeng: Hierarchical representation network for steganalysis of qim steganography in low-bit-rate speech signals. In: Zhou, J., Luo, X., Shen, Q., Xu, Z. (eds.) ICICS 2019. LNCS, vol. 11999, pp. 783\u2013798. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41579-2_45"},{"key":"21_CR30","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1109\/LSP.2019.2961610","volume":"27","author":"H Yang","year":"2019","unstructured":"Yang, H., Yang, Z., Bao, Y., Liu, S., Huang, Y.: Fast steganalysis method for voip streams. IEEE Signal Process. Lett. 27, 286\u2013290 (2019)","journal-title":"IEEE Signal Process. Lett."},{"issue":"4","key":"21_CR31","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423\u20131443 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"21_CR32","doi-asserted-by":"crossref","unstructured":"Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In:\u00a0IEEE GLOBECOM 2008\u20132008 IEEE Global Telecommunications Conference, pp. 1\u20135. IEEE (2008)","DOI":"10.1109\/GLOCOM.2008.ECP.375"},{"key":"21_CR33","doi-asserted-by":"crossref","unstructured":"Nishimura, A.: Data hiding in pitch delay data of the adaptive multi-rate narrow-band speech codec. In:\u00a02009 fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing,\u00a0pp. 483\u2013486. IEEE (2009)","DOI":"10.1109\/IIH-MSP.2009.83"},{"issue":"15","key":"21_CR34","doi-asserted-by":"publisher","first-page":"2923","DOI":"10.1002\/sec.1428","volume":"9","author":"A Janicki","year":"2016","unstructured":"Janicki, A.: Pitch-based steganography for Speex voice codec. Secur. Commun. Netw. 9(15), 2923\u20132933 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"10","key":"21_CR35","first-page":"2107","volume":"37","author":"SB Li","year":"2014","unstructured":"Li, S.B., Jia, Y.Z., Fu, J.Y., Dai, Q.X.: Detection of pitch modulation information hiding based on codebook correlation network. Chinese J. Comput. 37(10), 2107\u20132117 (2014)","journal-title":"Chinese J. Comput."},{"key":"21_CR36","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.neucom.2020.08.002","volume":"419","author":"Y Hu","year":"2021","unstructured":"Hu, Y., Huang, Y., Yang, Z., Huang, Y.: Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams. Neurocomputing 419, 70\u201379 (2021)","journal-title":"Neurocomputing"},{"issue":"1","key":"21_CR37","doi-asserted-by":"publisher","first-page":"155014771989956","DOI":"10.1177\/1550147719899569","volume":"16","author":"J Wang","year":"2020","unstructured":"Wang, J., Yang, C., Wang, P., Song, X., Lu, J.: Payload location for JPEG image steganography based on co-frequency sub-image filtering. Int. J. Distrib. Sens. Netw. 16(1), 1550147719899569 (2020)","journal-title":"Int. J. Distrib. Sens. Netw."}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-2585-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T05:05:30Z","timestamp":1713935130000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-2585-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819725847","9789819725854"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-2585-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"25 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jinan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwdw.site\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}