{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T03:01:53Z","timestamp":1761102113420},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2014,6,17]],"date-time":"2014-06-17T00:00:00Z","timestamp":1402963200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s00034-014-9830-5","type":"journal-article","created":{"date-parts":[[2014,6,19]],"date-time":"2014-06-19T07:53:39Z","timestamp":1403164419000},"page":"3901-3919","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Steganography Between Silence Intervals of Audio in Video Content Using Chaotic Maps"],"prefix":"10.1007","volume":"33","author":[{"given":"Muhammad Fahad","family":"Khan","sequence":"first","affiliation":[]},{"given":"Faisal","family":"Baig","sequence":"additional","affiliation":[]},{"given":"Saira","family":"Beg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,17]]},"reference":[{"key":"9830_CR1","doi-asserted-by":"crossref","first-page":"59","DOI":"10.3923\/jas.2010.59.64","volume":"10","author":"MA Ahmed","year":"2010","unstructured":"M.A. Ahmed, L.M. Kiah, B.B. Zaidan, A.A. Zaidan, A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J. Appl. Sci. 10, 59\u201364 (2010)","journal-title":"J. Appl. Sci."},{"key":"9830_CR2","first-page":"123","volume-title":"Communications and Multimedia Security","author":"W Andreas","year":"2013","unstructured":"W. Andreas, J. Wurzer, C. Fabian, E. Piller, Pit stop for an audio steganography algorithm, in Communications and Multimedia Security, ed. by B. De Decker, J. Dittmann, C. Kraetzer, C. Vielhauer (Springer, Berlin, 2013), pp. 123\u2013134"},{"issue":"4","key":"9830_CR3","doi-asserted-by":"crossref","first-page":"1192","DOI":"10.1016\/j.compeleceng.2013.02.006","volume":"39","author":"L Ballesteros","year":"2013","unstructured":"L. Ballesteros, M. Dora, J.M. Moreno, A real-time, speech-in-speech hiding scheme based on least significant bit substitution and adaptive key. Comput. Electr. Eng. 39(4), 1192\u20131203 (2013)","journal-title":"Comput. Electr. Eng."},{"key":"9830_CR4","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/ICASSP.1979.1170788","volume":"4","author":"M Berouti","year":"1979","unstructured":"M. Berouti, R. Schwartz, J. Makhoul, Enhancement of speech corrupted by acoustic noise. IEEE Int. Conf. Acoust. Speech Signal Process. 4, 208\u2013211 (1979)","journal-title":"IEEE Int. Conf. Acoust. Speech Signal Process."},{"key":"9830_CR5","first-page":"23","volume":"77","author":"D Bhattacharyya","year":"2010","unstructured":"D. Bhattacharyya, P. Dutta, M.O. Balitanas, T. Kim, P. Das, Hiding data in audio signal. Adv. Commun. Netw. Commun. Comput. Inf. Sci. 77, 23\u201329 (2010)","journal-title":"Adv. Commun. Netw. Commun. Comput. Inf. Sci."},{"key":"9830_CR6","unstructured":"J.J. Chae, B.S. Manjunath, in Data hiding in video. Proceedings of the 6th IEEE International Conference on Image Processing (1999), pp. 311\u2013315"},{"issue":"3","key":"9830_CR7","first-page":"764","volume":"2","author":"SS Christal Mary","year":"2010","unstructured":"S.S. Christal Mary, Improved protection in video steganography used compressed video bit streams. Int. J. Comput. Sci. Eng. 2(3), 764\u2013766 (2010)","journal-title":"Int. J. Comput. Sci. Eng."},{"issue":"5","key":"9830_CR8","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1109\/TSA.2003.811544","volume":"11","author":"I Cohen","year":"2003","unstructured":"I. Cohen, Noise spectrum estimation in adverse environments: improved minima controlled recursive averaging. IEEE Trans. Speech Audio Process. 11(5), 466\u2013475 (2003)","journal-title":"IEEE Trans. Speech Audio Process."},{"key":"9830_CR9","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-3-642-22543-7_2","volume-title":"Trends in Network and Communication","author":"R Darsana","year":"2011","unstructured":"R. Darsana, A. Vijayan, Audio steganography using modified LSB and PVD, in Trends in Network and Communication, ed. by D.C. Wyld, M. Wozniak, N. Chaki, N. Meghanathan, D. Nagamalai (Springer, Berlin, 2011), pp. 11\u201320"},{"issue":"2","key":"9830_CR10","first-page":"1","volume":"1","author":"K Dasgupta","year":"2012","unstructured":"K. Dasgupta, J.K. Mandal, P. DuttaL, Hash based least significant bit technique for video steganography (HLSB). Int. J. Secur. Priv. Trust Manage. 1(2), 1\u201311 (2012)","journal-title":"Int. J. Secur. Priv. Trust Manage."},{"issue":"8","key":"9830_CR11","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1002\/sec.644","volume":"6","author":"F Djebbar","year":"2013","unstructured":"F. Djebbar, B. Ayad, K. Abed-Meraim, H. Hamam, Unified phase and magnitude speech spectra data hiding algorithm. Secur. Commun. Netw. 6(8), 961\u2013971 (2013)","journal-title":"Secur. Commun. Netw."},{"issue":"12","key":"9830_CR12","doi-asserted-by":"crossref","first-page":"809","DOI":"10.1109\/LSP.2005.859530","volume":"12","author":"S Doclo","year":"2005","unstructured":"S. Doclo, M. Moonen, On the output SNR of the speech-distortion weighted multi-channel Wiener filter. IEEE Signal Process. Lett. 12(12), 809 (2005)","journal-title":"IEEE Signal Process. Lett."},{"issue":"2","key":"9830_CR13","first-page":"1","volume":"2","author":"P Dutta","year":"2009","unstructured":"P. Dutta, D. Bhattacharyya, T. Kim, Data hiding in audio signal: a review. J. Database Theory Appl. 2(2), 1\u20138 (2009)","journal-title":"J. Database Theory Appl."},{"key":"9830_CR14","unstructured":"EBU Tec. 3342, Loudness range, a descriptor to supplement loudness normalization according to EBU technical recommendation R128. Geneva (2010)"},{"issue":"6","key":"9830_CR15","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1109\/TASSP.1984.1164453","volume":"32","author":"Y Ephraim","year":"1984","unstructured":"Y. Ephraim, D. Malah, Speech enhancement using a minimum-mean square error short-time spectral amplitude estimator. IEEE Trans. Speech Signal Process. 32(6), 1109\u20131121 (1984)","journal-title":"IEEE Trans. Speech Signal Process."},{"issue":"4","key":"9830_CR16","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s11334-012-0191-6","volume":"8","author":"K Fahad","year":"2012","unstructured":"K. Fahad, S. Beg, Transference and retrieval of voice message over low signal strength in satellite communication. Innov. Syst. Softw. Eng. 8(4), 293\u2013299 (2012)","journal-title":"Innov. Syst. Softw. Eng."},{"key":"9830_CR17","unstructured":"R. Fahimeh, T. Ma, M. Hempel, D. Peng, H. Sharif, in An anti-steganographic approach for removing secret information in digital audio data hidden by spread spectrum methods. IEEE International Conference on Communications (ICC) (2013), pp. 2117\u20132122"},{"key":"9830_CR18","unstructured":"D.-Y. Fang, L. Chang, in Data hiding for digital video with phase of motion vector. IEEE International Symposium on Circuits and Systems (ISCAS) (2006), p. 4"},{"key":"9830_CR19","unstructured":"J. Fridrich, R. Du, M. Long, in Stag-analysis of LSB encoding in color images. IEEE International Conference on Multimedia and Expo (2000), pp. 1279\u20131282"},{"key":"9830_CR20","unstructured":"T. Hui, J. Liu, S. Li, Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimed. Syst. 1\u201312 (2013)"},{"key":"9830_CR21","unstructured":"L. Jin, K. Zhou, H. Tian, in Least-significant-digit steganography in low bit rate speech. 47th IEEE International Conference on Communications (ICC) (2012), pp. 1133\u20131137"},{"key":"9830_CR22","doi-asserted-by":"crossref","unstructured":"J.C. Judge, Steganography: Past, Present and Future (SANS Institute Info Sec Reading Room, version 1.2f. 2001)","DOI":"10.2172\/15006450"},{"key":"9830_CR23","unstructured":"V. Korzhik, G.M. Luna, I. Fedyanin, in The use of wet paper codes with audio watermarking based on echo hiding. IEEE Federated Conference on Computer Science and Information Systems (FedCSIS) (2012), pp. 727\u2013732"},{"key":"9830_CR24","unstructured":"J.R. Krenn, Steganography and Steganalysis (2004)"},{"key":"9830_CR25","unstructured":"M.L. Mat Kiah, B.B. Zaidan, A.A. Zaidan, A. Mohammed Ahmed, S. Hasan Al-bakri, A review of audio based steganography and digital watermarking. Int. J. Phys. Sci. 6(16), 3837\u20133850 (2011)"},{"key":"9830_CR26","volume-title":"Digital Signal Processing: A Computer Based Approach","author":"SK Mitra","year":"2006","unstructured":"S.K. Mitra, Digital Signal Processing: A Computer Based Approach (McGraw-Hill, New York, 2006)"},{"key":"9830_CR27","unstructured":"M. Nutzinger, J. Wurzer, in A novel phase coding technique for steganography in auditive media. IEEE Sixth International Conference on Availability, Reliability and Security (ARES) (2011), pp. 91\u201398"},{"key":"9830_CR28","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/978-3-642-20209-4_20","volume-title":"Technology Systems and Management","author":"N Parab","year":"2011","unstructured":"N. Parab, M. Nathan, K.T. Talele, Audio steganography using differential phase encoding, in Technology Systems and Management, ed. by K. Shah, V.R. Lakshmi Gorty, A. Phirke (Springer, Berlin, 2011), pp. 146\u2013151"},{"key":"9830_CR29","volume-title":"Digital Signal Processing, Principles, Algorithms and Applications","author":"J Proakis","year":"1992","unstructured":"J. Proakis, D. Manolakis, Digital Signal Processing, Principles, Algorithms and Applications, 2nd edn. (Macmillan Publishing Company, New York, 1992)","edition":"2"},{"key":"9830_CR30","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/978-81-322-1680-3_21","volume-title":"Computational Intelligence, Cyber Security and Computational Models","author":"AR Remya","year":"2014","unstructured":"A.R. Remya, M.H. Supriya, A. Sreekumar, A novel non-repudiate scheme with voice feature marking, in Computational Intelligence, Cyber Security and Computational Models, ed. by G. Sai Sundara Krishnan, R. Anitha, R.S. Lekshmi, M. Senthil Kumar, A. Bonato, M. Gra\u00f1a (Springer, India, 2014), pp. 183\u2013194"},{"key":"9830_CR31","unstructured":"V. Sampat, K. Dave, J. Madia, P. Toprani, in A novel video steganography technique using dynamic cover generation. National Conference on Advancement of Technologies\u2014Information Systems & Computer Networks: Proceedings published in International Journal of Computer Applications (2012), pp. 26\u201330"},{"key":"9830_CR32","unstructured":"A.M. Shiddiqi, T. Priambadha, B.A. Pratomo, Echo Data Hiding Steganography and RSA Cryptography on Audio, Media (2012)"},{"key":"9830_CR33","unstructured":"R. Siwar, D. Guerchi, S.A. Selouani, H. Hamam, Speech steganography using wavelet and Fourier transforms. EURASIP J. Audio Speech Music Process. 1, 1\u201314 (2012)"},{"key":"9830_CR34","unstructured":"D. Stanescu, M. Stratulat, B. Ciubotaru, D. Chiciudean, R. Cioarga, M. Micea, in Embedding data in video stream using steganography. IEEE 4th International Symposium on Applied Computational Intelligence and Informatics (2007), pp. 241\u2013244"},{"issue":"2","key":"9830_CR35","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1109\/TASSP.1979.1163209","volume":"27","author":"B Steven","year":"1979","unstructured":"B. Steven, Suppression of acoustic noise in speech using spectral subtraction. IEEE Trans. Acoust. Speech Signal Process. 27(2), 113\u2013120 (1979)","journal-title":"IEEE Trans. Acoust. Speech Signal Process."},{"key":"9830_CR36","unstructured":"D.T. Sudeep, S. Erandole, in Extended performance comparison of tiling based image compression using wavelet transforms & hybrid wavelet transforms. IEEE Conference on Information & Communication Technologies (ICT) (2013), pp. 1150\u20131155"},{"key":"9830_CR37","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/2946.001.0001","volume-title":"Extrapolation, Interpolation and Smoothing of Stationary Time Series with Engineering Applications","author":"N Wiener","year":"1949","unstructured":"N. Wiener, Extrapolation, Interpolation and Smoothing of Stationary Time Series with Engineering Applications (Wiley, New York, 1949)"},{"key":"9830_CR38","doi-asserted-by":"crossref","DOI":"10.1090\/coll\/019","volume-title":"Fourier Transforms in the Complex Domains","author":"N Wiener","year":"1934","unstructured":"N. Wiener, R.E.A.C. Paley, Fourier Transforms in the Complex Domains (American Mathematical Society, Providence, 1934)"},{"issue":"1","key":"9830_CR39","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TMM.2010.2080668","volume":"13","author":"Y Xiang","year":"2011","unstructured":"Y. Xiang, D. Peng, I. Natgunanathan, W. Zhou, Effective pseudo noise sequence and decoding function for imperceptibility and robustness enhancement in time-spread echo-based audio watermarking. IEEE Trans. Multimed. 13(1), 2\u201313 (2011)","journal-title":"IEEE Trans. Multimed."},{"key":"9830_CR40","unstructured":"C. Xu, X. Ping, T. Zhang, in Steganography in compressed video stream. Proceedings of the First International Conference on Innovative Computing, Information and Control (2006), pp. 269\u2013272"},{"key":"9830_CR41","doi-asserted-by":"crossref","first-page":"1545","DOI":"10.1002\/9780470172537.ch123","volume":"3","author":"WA Yost","year":"1997","unstructured":"W.A. Yost, M.C. Killion, Hearing thresholds. Encycl. Acoust. 3, 1545\u20131554 (1997)","journal-title":"Encycl. Acoust."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-014-9830-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00034-014-9830-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-014-9830-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T04:20:08Z","timestamp":1597983608000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00034-014-9830-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,17]]},"references-count":41,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["9830"],"URL":"https:\/\/doi.org\/10.1007\/s00034-014-9830-5","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6,17]]}}}