{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T22:26:39Z","timestamp":1772749599449,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2020,4,13]],"date-time":"2020-04-13T00:00:00Z","timestamp":1586736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,4,13]],"date-time":"2020-04-13T00:00:00Z","timestamp":1586736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61472092"],"award-info":[{"award-number":["61472092"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61977018"],"award-info":[{"award-number":["61977018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the Natural Science Foundation of China","doi-asserted-by":"crossref","award":["11271097"],"award-info":[{"award-number":["11271097"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Guangdong Provincial Science and Technology Plan Fund","award":["2013B010401037"],"award-info":[{"award-number":["2013B010401037"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s00521-020-04882-y","type":"journal-article","created":{"date-parts":[[2020,4,13]],"date-time":"2020-04-13T18:02:17Z","timestamp":1586800937000},"page":"11507-11520","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Research on covert communication channel based on modulation of common compressed speech codec"],"prefix":"10.1007","volume":"34","author":[{"given":"Fufang","family":"Li","sequence":"first","affiliation":[]},{"given":"Binbin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yongfeng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yuanyong","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Lingxi","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Naqin","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,13]]},"reference":[{"issue":"5","key":"4882_CR1","first-page":"1031","volume":"7","author":"Q-Y Zhang","year":"2016","unstructured":"Zhang Q-Y, Yu S, Chen N, Hu W-J, Qiao S-B (2016) An information hiding algorithm for speech perceptual hashing authentication system in G.729 bitstream. J Inf Hiding Multimed Signal Process 7(5):1031\u20131040","journal-title":"J Inf Hiding Multimed Signal Process"},{"issue":"2","key":"4882_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2543581.2543587)","volume":"46","author":"W Mazurczyk","year":"2013","unstructured":"Mazurczyk W (2013) VoIP steganography and its detection\u2014a survey. ACM Comput Surv 46(2):1\u201321. https:\/\/doi.org\/10.1145\/2543581.2543587)","journal-title":"ACM Comput Surv"},{"key":"4882_CR3","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2019.1699454","author":"H Dutta","year":"2019","unstructured":"Dutta H, Das RK, Nandi S, Prasanna SM (2019) An overview of digital audio steganography. IETE Tech Rev. https:\/\/doi.org\/10.1080\/02564602.2019.1699454","journal-title":"IETE Tech Rev"},{"issue":"4","key":"4882_CR4","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/s00530-015-0500-7","volume":"23","author":"P Liu","year":"2017","unstructured":"Liu P, Li S, Wang H (2017) Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec. Multimed Syst 23(4):485\u2013497. https:\/\/doi.org\/10.1007\/s00530-015-0500-7","journal-title":"Multimed Syst"},{"issue":"4","key":"4882_CR5","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/s12652-013-0212-9","volume":"5","author":"Z Wei","year":"2014","unstructured":"Wei Z, Zhao B, Liu B (2014) A novel steganography approach for voice over IP. J Ambient Intell Humaniz Comput 5(4):601\u2013610. https:\/\/doi.org\/10.1007\/s12652-013-0212-9","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"4882_CR6","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/tifs.2011.2108649","volume":"6","author":"YF Huang","year":"2011","unstructured":"Huang YF, Tang S, Yuan J (2011) Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans Inf Forensics Secur 6(2):296\u2013306. https:\/\/doi.org\/10.1109\/tifs.2011.2108649","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4882_CR7","doi-asserted-by":"publisher","first-page":"6117","DOI":"10.1109\/ACCESS.2019.2962009","volume":"8","author":"H Tian","year":"2020","unstructured":"Tian H, Liu J, Chang C-C, Huang Y, Cai Y (2020) Detecting steganography in inactive voice-over-IP frames based on statistic characteristics of fundamental frequency. IEEE Access 8:6117\u20136129. https:\/\/doi.org\/10.1109\/ACCESS.2019.2962009","journal-title":"IEEE Access"},{"issue":"4","key":"4882_CR8","doi-asserted-by":"publisher","first-page":"522","DOI":"10.3963\/j.issn.1007-144x.2010.04.002","volume":"32","author":"C Wang","year":"2010","unstructured":"Wang C, Huang Y, Wang W, Deng B (2010) A large-capability self-adaptive steganography algorithm based on G.723.1. J Wuhan Univ Technol (Inf Manag Eng) 32(4):522\u2013525. https:\/\/doi.org\/10.3963\/j.issn.1007-144x.2010.04.002(in Chinese)","journal-title":"J Wuhan Univ Technol (Inf Manag Eng)"},{"key":"4882_CR9","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2020.1720827","author":"F Li","year":"2020","unstructured":"Li F, Tang H, Zou Y, Huang Y, Feng Y, Peng L (2020) Research on information security in text emotional steganography based on machine learning. Enterp Inf Syst. https:\/\/doi.org\/10.1080\/17517575.2020.1720827","journal-title":"Enterp Inf Syst"},{"issue":"5","key":"4882_CR10","first-page":"916","volume":"7","author":"R-S Lin","year":"2016","unstructured":"Lin R-S (2016) A synchronization scheme for hiding information in encoded bitstream of inactive speech signal. J Inf Hiding Multimed Signal Process 7(5):916\u2013929","journal-title":"J Inf Hiding Multimed Signal Process"},{"issue":"2","key":"4882_CR11","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1117\/12.420835","volume":"22","author":"S Yang","year":"2001","unstructured":"Yang S, Zhou JL, Yu SS (2001) Clustering optimization strategy for G.723.1 speech coder and its application. J Commun 22(2):113\u2013117. https:\/\/doi.org\/10.1117\/12.420835(in Chinese)","journal-title":"J Commun"},{"key":"4882_CR12","doi-asserted-by":"publisher","unstructured":"Li F, Li B, Peng L, Chen W, Zheng L, Xu K (2018) A steganographic method based on high bit rates speech codec of G.723.1. In: Sun X, Pan Z, Bertino E (eds) Cloud computing and security. ICCCS 2018. Lecture notes in computer science, vol 11068. Springer, Cham, pp 312\u2013322. https:\/\/doi.org\/10.1007\/978-3-030-00021-9_29","DOI":"10.1007\/978-3-030-00021-9_29"},{"issue":"3","key":"4882_CR13","doi-asserted-by":"publisher","first-page":"277","DOI":"10.11830\/issn.1000-5013.2014.03.0277","volume":"35","author":"S Guo","year":"2014","unstructured":"Guo S, Tian H (2014) An information hiding method based on G.729a speech. J Huaqiao Univ (Nat Sci) 35(3):277\u2013282. https:\/\/doi.org\/10.11830\/issn.1000-5013.2014.03.0277(in Chinese)","journal-title":"J Huaqiao Univ (Nat Sci)"},{"issue":"17","key":"4882_CR14","doi-asserted-by":"publisher","first-page":"68","DOI":"10.16652\/j.issn.1004-373x.2013.17.035","volume":"36","author":"Y Cao","year":"2013","unstructured":"Cao Y, Bai S, Cai K, Li WD (2013) Study on convert communication system based on G.729 compressed voice stream. Mod Electron Tech 36(17):68\u201370. https:\/\/doi.org\/10.16652\/j.issn.1004-373x.2013.17.035(in Chinese)","journal-title":"Mod Electron Tech"},{"issue":"24","key":"4882_CR15","doi-asserted-by":"publisher","first-page":"34373","DOI":"10.1007\/s11042-019-08122-x","volume":"78","author":"SE El-Khamy","year":"2019","unstructured":"El-Khamy SE, Korany NO, El-Sherif MH (2019) Highly secured image hiding technique in stereo audio signal based on complete complementary codes. Multimed Tools Appl 78(24):34373\u201334395. https:\/\/doi.org\/10.1007\/s11042-019-08122-x","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"4882_CR16","doi-asserted-by":"publisher","first-page":"625","DOI":"10.12785\/amis\/080220","volume":"8","author":"FF Li","year":"2014","unstructured":"Li FF, Xie D, Qi D, Xie G (2014) Research on effective and intelligent resource management in internet computing. Appl Math Inf Sci 8(2):625\u2013631","journal-title":"Appl Math Inf Sci"},{"issue":"6","key":"4882_CR17","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1109\/TIFS.2012.2218599","volume":"7","author":"Y Huang","year":"2012","unstructured":"Huang Y, Liu C, Tang S (2012) Steganography integration into a low-bit rate speech codec. IEEE Trans Inf Forensics Secur 7(6):1865\u20131875. https:\/\/doi.org\/10.1109\/TIFS.2012.2218599","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4882_CR18","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.cmpb.2016.07.020","volume":"134","author":"L Peng","year":"2016","unstructured":"Peng L, Chen W, Zhou W, Li F (2016) An immune-inspired semi-supervised algorithm for breast cancer diagnosis. Comput Methods Programs Biomed 134:259\u2013265. https:\/\/doi.org\/10.1016\/j.cmpb.2016.07.020","journal-title":"Comput Methods Programs Biomed"},{"issue":"2","key":"4882_CR19","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/bf02827918","volume":"5","author":"H Yong-feng","year":"2000","unstructured":"Yong-feng H, Jiang-ling Z (2000) Implementation of ITU-T G. 729 speech codec in IP telephony gateway. Wuhan Univ J Nat Sci 5(2):159\u2013163. https:\/\/doi.org\/10.1007\/bf02827918","journal-title":"Wuhan Univ J Nat Sci"},{"key":"4882_CR20","doi-asserted-by":"publisher","unstructured":"Cheng H, Yang Y, Hu R, Wang S (2011) Research of error concealment and control based on G.729.1 and AMR_WB. Audio Eng 35:68\u201372\u2009+\u200983. https:\/\/doi.org\/10.16311\/j.audioe.2011.12.018(in Chinese)","DOI":"10.16311\/j.audioe.2011.12.018"},{"issue":"4","key":"4882_CR21","doi-asserted-by":"publisher","first-page":"842","DOI":"10.3969\/j.issn.0372-2112.2012.04.036","volume":"40","author":"SB Li","year":"2012","unstructured":"Li SB, Sun DH, Yuan J, Huang YF (2012) A steganalysis method for G.729 A compressed speech stream based on codeword distribution characteristics. Acta Electron Sin 40(4):842\u2013846. https:\/\/doi.org\/10.3969\/j.issn.0372-2112.2012.04.036","journal-title":"Acta Electron Sin"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-020-04882-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-020-04882-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-020-04882-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T22:20:57Z","timestamp":1744150857000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-020-04882-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,13]]},"references-count":21,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["4882"],"URL":"https:\/\/doi.org\/10.1007\/s00521-020-04882-y","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,13]]},"assertion":[{"value":"11 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}