{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T19:57:20Z","timestamp":1760385440445},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,8,6]],"date-time":"2015-08-06T00:00:00Z","timestamp":1438819200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61302094"],"award-info":[{"award-number":["61302094"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U1405254"],"award-info":[{"award-number":["U1405254"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61370007"],"award-info":[{"award-number":["61370007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61202468"],"award-info":[{"award-number":["61202468"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61305085"],"award-info":[{"award-number":["61305085"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Foundation of Fujian Province of China","award":["2014J01238"],"award-info":[{"award-number":["2014J01238"]}]},{"name":"Education and Science Research Program for Young and Middle-aged Teacher of Fujian Province of China","award":["JA13012"],"award-info":[{"award-number":["JA13012"]}]},{"name":"Promotion Program for Young and Middle-aged Teacher in Science and Technology Research of Huaqiao University","award":["ZQN-PY115"],"award-info":[{"award-number":["ZQN-PY115"]}]},{"name":"Program for Science & Technology Innovation Teams and Leading Talents of Huaqiao University","award":["2014KJTD13"],"award-info":[{"award-number":["2014KJTD13"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["14BS210"],"award-info":[{"award-number":["14BS210"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s00500-015-1816-0","type":"journal-article","created":{"date-parts":[[2015,8,5]],"date-time":"2015-08-05T14:41:47Z","timestamp":1438785707000},"page":"795-804","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Distributed steganalysis of compressed speech"],"prefix":"10.1007","volume":"21","author":[{"given":"Hui","family":"Tian","sequence":"first","affiliation":[]},{"given":"Yanpeng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yiqiao","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Yongfeng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yonghong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,6]]},"reference":[{"key":"1816_CR1","doi-asserted-by":"publisher","unstructured":"Bao C, Huang Y, Zhu C (2006) Steganalysis of compressed speech. In: Proceedings of the international multi-conference on computational engineering in systems applications, vol 1. IEEE, pp 5\u201310. doi: 10.1109\/CESA.2006.4281614","DOI":"10.1109\/CESA.2006.4281614"},{"key":"1816_CR2","doi-asserted-by":"publisher","unstructured":"Bai LY, Huang Y, Hou G, Xiao B (2008) Covert channels based on jitter field of the rtcp header. In: Proceedings of the 4th international conference on intelligent information hiding and multimedia signal processing. IEEE, pp 1388\u20131391. doi: 10.1109\/IIH-MSP.2008.169","DOI":"10.1109\/IIH-MSP.2008.169"},{"key":"1816_CR3","doi-asserted-by":"publisher","unstructured":"Cai Y, Wang J, Chen Y, Wang T, Tian H, Luo W (2014) Adaptive direction information in differential evolution for numerical optimization. Soft Comput 1\u201330. doi: 10.1007\/s00500-014-1517-0","DOI":"10.1007\/s00500-014-1517-0"},{"issue":"3","key":"1816_CR4","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1961189.1961199","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang CC, Lin CJ (2011) LIBSVM: a library for support vector machines. ACM Trans Intell Syst Technol 2(3):27. doi: 10.1145\/1961189.1961199","journal-title":"ACM Trans Intell Syst Technol"},{"issue":"5","key":"1816_CR5","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.jss.2006.07.006","volume":"80","author":"A Castiglione","year":"2007","unstructured":"Castiglione A, Santis AD, Soriente C (2007) Taking advantages of a disadvantage: digital forensics and steganography using document metadata. J Syst Softw 80(5):50\u2013764","journal-title":"J Syst Softw"},{"key":"1816_CR6","doi-asserted-by":"publisher","unstructured":"Castiglione A, D\u2019Alessio B, Santis AD (2011a) Steganography and secure communication on online social networks and online photo sharing. In: Proceedings of 2011 international conference on broadband and wireless computing, communication and applications (BWCCA), Barcelona, Spain, October 2011, pp 363\u2013368. doi: 10.1109\/BWCCA.2011.60","DOI":"10.1109\/BWCCA.2011.60"},{"key":"1816_CR7","doi-asserted-by":"publisher","unstructured":"Castiglione A, Santis AD, Fiore U, et al (2011b) E-mail-based covert channels for asynchronous message steganography. In: Proceedings of 2011 fifth international conference on innovative mobile and internet services in ubiquitous computing (IMIS), Seoul, Korea, 30 June\u20132 July 2011, pp 503-508. doi: 10.1109\/IMIS.2011.133","DOI":"10.1109\/IMIS.2011.133"},{"key":"1816_CR8","doi-asserted-by":"publisher","unstructured":"Castiglione A, D\u2019Alessio B, Santis AD et al (2011c) New steganographic techniques for the OOXML file format. In: Proceedings of 2011 IFIP WG 8.4\/8.9 international cross domain conference and workshop, Vienna, Austria, August 2011, pp 344\u2013358. doi: 10.1007\/978-3-642-23300-5_27","DOI":"10.1007\/978-3-642-23300-5_27"},{"key":"1816_CR9","unstructured":"Castiglione A, D\u2019Alessio B, Santis AD (2011d) Hiding information into OOXML documents: new steganographic perspectives. J Wirel Mobile Netw Ubiquitous Comput Dependable Appl 2(4):59\u201383"},{"issue":"2","key":"1816_CR10","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.camwa.2011.07.068","volume":"63","author":"A Castiglione","year":"2012","unstructured":"Castiglione A, Santis AD, Fiore U et al (2012) An asynchronous covert channel using spam. Comput Math Appl 63(2):437\u2013447. doi: 10.1016\/j.camwa.2011.07.068","journal-title":"Comput Math Appl"},{"issue":"43","key":"1816_CR11","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.future.2014.07.001","volume":"1","author":"A Castiglione","year":"2015","unstructured":"Castiglione A, Pizzolante R, Santis AD, Carpentieri B, Palmieri F (2015) Cloud-based adaptive compression and secure management services for 3d healthcare data. Future Gen Comput Syst 1(43):120\u2013134. doi: 10.1016\/j.future.2014.07.001","journal-title":"Future Gen Comput Syst"},{"key":"1816_CR12","doi-asserted-by":"publisher","unstructured":"Dittmann J, Hesse D, Hillert R (2005) Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. In: Proceedings of the SPIE 2005, security, steganography, and watermarking of multimedia contents VII, SPIE, vol 5681, pp 607\u2013618. doi: 10.1117\/12.586579","DOI":"10.1117\/12.586579"},{"key":"1816_CR13","doi-asserted-by":"publisher","unstructured":"Ding Q, Ping X (2010a) Steganalysis of compressed speech based on histogram features. In: Proceedings of the 2010 international conference on wireless communications, networking and mobile computing. IEEE, pp 1\u20134. doi: 10.1109\/WICOM.2010.5600125","DOI":"10.1109\/WICOM.2010.5600125"},{"key":"1816_CR14","doi-asserted-by":"publisher","unstructured":"Ding Q, Ping X (2010b) Steganalysis of analysis-by-synthesis compressed speech. In: Proceedings of the 2010 international conference on multimedia information networking and security, IEEE, pp 681\u2013685. doi: 10.1109\/MINES.2010.148","DOI":"10.1109\/MINES.2010.148"},{"issue":"4","key":"1816_CR15","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1007\/s10586-013-0261-z","volume":"16","author":"C Esposito","year":"2013","unstructured":"Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Clust Comput 16(4):887\u2013903. doi: 10.1007\/s10586-013-0261-z","journal-title":"Clust Comput"},{"issue":"1","key":"1816_CR16","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1049\/iet-ipr.2013.0877","volume":"9","author":"F Farhat","year":"2015","unstructured":"Farhat F, Ghaemmaghami S (2015) Towards blind detection of low-rate spatial embedding in image steganalysis. IET Image Process 9(1):31\u201342. doi: 10.1049\/iet-ipr.2013.0877","journal-title":"IET Image Process"},{"issue":"6","key":"1816_CR17","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/TDSC.2010.46","volume":"8","author":"S Gianvecchio","year":"2011","unstructured":"Gianvecchio S, Wang H (2011) An entropy-based approach to detecting covert timing channels. IEEE Trans Dependable Secure Comput 8(6):785\u2013797. doi: 10.1109\/TDSC.2010.46","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"7","key":"1816_CR18","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1049\/iet-com.2010.0348","volume":"5","author":"Y Huang","year":"2011","unstructured":"Huang Y, Tang S, Zhang Y (2011a) Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis. IET Commun 5(7):929\u2013936. doi: 10.1049\/iet-com.2010.0348","journal-title":"IET Commun"},{"issue":"1","key":"1816_CR19","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1049\/iet-ifs.2010.0032","volume":"5","author":"Y Huang","year":"2011","unstructured":"Huang Y, Tang S, Bao C, Yip YJ (2011b) Steganalysis of compressed speech to detect covert voice over Internet protocol channels. IET Inf Secur 5(1):26\u201332. doi: 10.1049\/iet-ifs.2010.0032","journal-title":"IET Inf Secur"},{"issue":"2","key":"1816_CR20","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s12652-010-0031-1","volume":"2","author":"G Iovane","year":"2011","unstructured":"Iovane G, Giordano P, Borysenko SD (2011) Image watermarking via wavelet approach and face biometrics. J Ambient Intell Hum Comput 2(2):91\u2013101. doi: 10.1007\/s12652-010-0031-1","journal-title":"J Ambient Intell Hum Comput"},{"key":"1816_CR21","unstructured":"ITU-T Recommendation P. 862 (2001) Perceptual evaluation of speech quality (PESQ): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. International Telecommunications Union, Geneva, Switzerland"},{"key":"1816_CR22","doi-asserted-by":"publisher","unstructured":"Kr\u00e4etzer C, Dittmann J (2007) Mel-cepstrum-based steganalysis for VoIP steganography. In: Proceedings of international society for optics and photonics, electronic imaging, SPIE, 650 505-650505-12. doi: 10.1117\/12.704040","DOI":"10.1117\/12.704040"},{"issue":"8","key":"1816_CR23","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1631\/jzus.C1100374","volume":"13","author":"S Li","year":"2012","unstructured":"Li S, Tao H, Huang Y (2012) Detection of quantization index modulation steganography in G. 723.1 bit stream based on quantization index sequence analysis. J Zhejiang Univ Sci C 13(8):624\u2013634","journal-title":"J Zhejiang Univ Sci C"},{"issue":"2","key":"1816_CR24","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/2543581.2543587","volume":"46","author":"W Mazurczyk","year":"2013","unstructured":"Mazurczyk W (2013) VoIP steganography and its detection\u2014a survey. ACM Comput Surv 46(2):20. doi: 10.1145\/2543581.2543587 (article no. 20)","journal-title":"ACM Comput Surv"},{"issue":"2\u20133","key":"1816_CR25","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s11235-009-9245-y","volume":"45","author":"W Mazurczyk","year":"2010","unstructured":"Mazurczyk W, Lubacz J (2010) LACK: a voip steganographic method. Telecommun Syst 45(2\u20133):53\u2013163. doi: 10.1007\/s11235-009-9245-y","journal-title":"Telecommun Syst"},{"key":"1816_CR26","doi-asserted-by":"publisher","unstructured":"Miao R, Huang Y (2011) An approach of covert communication based on the adaptive steganography scheme on voice over IP. In: Proceedings of the 46th IEEE international conference on communications. IEEE, pp 1\u20135. doi: 10.1109\/icc.2011.5962657","DOI":"10.1109\/icc.2011.5962657"},{"key":"1816_CR27","doi-asserted-by":"publisher","unstructured":"Su Y, Huang Y, Li X (2006) Steganography-oriented noisy resistance model of G.729a. In: Proceedings of the 2006 multi-conference on computational engineering in systems applications. IEEE, pp 11\u201315. doi: 10.1109\/CESA.2006.4281615","DOI":"10.1109\/CESA.2006.4281615"},{"key":"1816_CR28","doi-asserted-by":"publisher","unstructured":"Sadek MM, Khalifa AS, Mostafa MGM (2014) Video steganography: a comprehensive review. Multimed Tools Appl 1\u201332. doi: 10.1007\/s11042-014-1952-z","DOI":"10.1007\/s11042-014-1952-z"},{"key":"1816_CR29","doi-asserted-by":"publisher","unstructured":"Tian H, Zhou K, Huang Y et al (2008) A covert communication model based on least significant bits steganography in voice over IP. In: Proceedings of the 9th international conference for young computer scientists. IEEE, pp 647\u2013652. doi: 10.1109\/ICYCS.2008.394","DOI":"10.1109\/ICYCS.2008.394"},{"issue":"18","key":"1816_CR30","doi-asserted-by":"publisher","first-page":"2236","DOI":"10.1016\/j.comcom.2011.07.003","volume":"34","author":"H Tian","year":"2011","unstructured":"Tian H, Jiang H, Zhou K, Feng D (2011) Adaptive partial-matching steganography for voice over ip using triple m sequences. Comput Commun 34(18):2236\u20132247. doi: 10.1016\/j.comcom.2011.07.003","journal-title":"Comput Commun"},{"issue":"4","key":"1816_CR31","first-page":"18","volume":"4","author":"H Tian","year":"2012","unstructured":"Tian H, Guo R, Lu J, Chen Y (2012) Implementing covert communication over voice conversations with windows live messenger. Adv Inf Sci Serv Sci 4(4):18\u201326","journal-title":"Adv Inf Sci Serv Sci"},{"issue":"5","key":"1816_CR32","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1007\/s00500-014-1337-2","volume":"19","author":"J Wang","year":"2015","unstructured":"Wang J, Cai Y (2015) Multiobjective evolutionary algorithm for frequency assignment problem in satellite communications. Soft Comput 19(5):1229\u20131253. doi: 10.1007\/s00500-014-1337-2","journal-title":"Soft Comput"},{"issue":"1","key":"1816_CR33","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/TIFS.2006.890517","volume":"2","author":"Y Wang","year":"2007","unstructured":"Wang Y, Moulin P (2007) Optimized feature extraction for learning-based image steganalysis. IEEE Trans Inf Forensics Secur 2(1):31\u201345. doi: 10.1109\/TIFS.2006.890517","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1816_CR34","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/s12652-013-0212-9","volume":"5","author":"Z Wei","year":"2014","unstructured":"Wei Z, Zhao B, Liu B, Su J, Xu L, Xu E (2014) A novel steganography approach for voice over IP. J Ambient Intell Hum Comput 5:601\u2013610. doi: 10.1007\/s12652-013-0212-9","journal-title":"J Ambient Intell Hum Comput"},{"issue":"1","key":"1816_CR35","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1049\/cje.2015.01.026","volume":"24","author":"Z Wu","year":"2015","unstructured":"Wu Z, Cao H, Li D (2015) An approach of steganography in G.729 bitstream based on matrix coding and interleaving. Chin J Electron 24(1):157\u2013165","journal-title":"Chin J Electron"},{"issue":"2","key":"1816_CR36","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1109\/TIFS.2012.2231861","volume":"8","author":"H Zhao","year":"2013","unstructured":"Zhao H, Shi YQ (2013) Detecting covert channels in computer networks based on chaos theory. IEEE Trans Inf Forensics Secur 8(2):273\u2013282. doi: 10.1109\/TIFS.2012.2231861","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"1816_CR37","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/2566590.2566610","volume":"5","author":"E Zielinska","year":"2014","unstructured":"Zielinska E, Mazurczyk W, Szczypiorski K (2014) Trends in steganography. Commun ACM 5(2):86\u201395. doi: 10.1145\/2566590.2566610","journal-title":"Commun ACM"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1816-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-015-1816-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1816-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1816-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T16:49:58Z","timestamp":1589561398000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-015-1816-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,6]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["1816"],"URL":"https:\/\/doi.org\/10.1007\/s00500-015-1816-0","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,6]]}}}