{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T15:49:35Z","timestamp":1768837775222,"version":"3.49.0"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T00:00:00Z","timestamp":1641427200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T00:00:00Z","timestamp":1641427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s10489-021-02938-7","type":"journal-article","created":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T00:03:39Z","timestamp":1641427419000},"page":"9441-9459","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["High capacity speech steganography for the G723.1 coder based on quantised line spectral pairs interpolation and CNN auto-encoding"],"prefix":"10.1007","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9532-2453","authenticated-orcid":false,"given":"Hamza","family":"Kheddar","sequence":"first","affiliation":[]},{"given":"David","family":"Meg\u00edas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,6]]},"reference":[{"issue":"12","key":"2938_CR1","doi-asserted-by":"publisher","first-page":"694","DOI":"10.3390\/sym10120694","volume":"10","author":"DM Ballesteros","year":"2018","unstructured":"Ballesteros DM, Renza D (2018) Secure speech content based on scrambling and adaptive hiding. Symmetry 10(12):694","journal-title":"Symmetry"},{"key":"2938_CR2","unstructured":"Berk V, Giani A, Cybenko G, Hanover N (2005) Detection of covert channel encoding in network packet delays. Rapport technique TR536, de lUniversit\u00e9 de Dartmouth, pp 19"},{"key":"2938_CR3","doi-asserted-by":"crossref","unstructured":"Bobade S, Goudar R (2015) Secure data communication using protocol steganography in ipv6. In: 2015 international conference on Computing communication control and automation (ICCUBEA). IEEE, pp 275\u2013279","DOI":"10.1109\/ICCUBEA.2015.59"},{"key":"2938_CR4","doi-asserted-by":"crossref","unstructured":"Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann","DOI":"10.1016\/B978-012372585-1.50015-2"},{"issue":"12","key":"2938_CR5","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673\u20131687","journal-title":"IEEE Trans Image Process"},{"key":"2938_CR6","doi-asserted-by":"crossref","unstructured":"Cvejic N, Seppanen T (2002) A wavelet domain lsb insertion algorithm for high capacity audio steganography. In: Digital Signal Processing Workshop, 2002 and the 2nd Signal Processing Education Workshop. Proceedings of 2002 IEEE 10th, pp 53\u201355. IEEE","DOI":"10.1109\/DSPWS.2002.1231075"},{"issue":"2","key":"2938_CR7","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s00034-008-9019-x","volume":"27","author":"A Delforouzi","year":"2008","unstructured":"Delforouzi A, Pooyan M (2008) Adaptive digital audio steganography based on integer wavelet transform. Circ Syst Signal Process 27(2):247\u2013259","journal-title":"Circ Syst Signal Process"},{"issue":"4","key":"2938_CR8","first-page":"55","volume":"8","author":"MA Elsadig","year":"2018","unstructured":"Elsadig MA, Fadlalla YA (2018) Packet length covert channels crashed. J Comput Sci Comput Math (JCSCM) 8(4):55\u201362","journal-title":"J Comput Sci Comput Math (JCSCM)"},{"key":"2938_CR9","doi-asserted-by":"crossref","unstructured":"Fraczek W, Mazurczyk W, Szczypiorski K (2010) Stream control transmission protocol steganography. In: 2010 international conference on Multimedia information networking and security (MINES). IEEE, pp 829\u2013834","DOI":"10.1109\/MINES.2010.176"},{"key":"2938_CR10","doi-asserted-by":"crossref","unstructured":"Garofolo JS, Lamel LF, Fisher WM, Fiscus JG, Pallett DS (1993) Darpa timit acoustic-phonetic continous speech corpus cd-rom. nist speech disc 1-1.1. NASA STI\/Recon technical report n 93","DOI":"10.6028\/NIST.IR.4930"},{"key":"2938_CR11","doi-asserted-by":"crossref","unstructured":"Geiser B, Vary P (2008) High rate data hiding in acelp speech codecs. In: 2008 IEEE International conference on acoustics, speech and signal processing, pp 4005\u20134008","DOI":"10.1109\/ICASSP.2008.4518532"},{"key":"2938_CR12","doi-asserted-by":"crossref","unstructured":"Ghasemzadeh H, Kayvanrad MH (2015) Toward a robust and secure echo steganography method based on parameters hopping. In: 2015 Signal processing and intelligent systems conference (SPIS). IEEE, pp 143\u2013147","DOI":"10.1109\/SPIS.2015.7422329"},{"key":"2938_CR13","doi-asserted-by":"crossref","unstructured":"Gong C, Yi X, Zhao X (2018) Pitch delay based adaptive steganography for amr speech stream. In: International workshop on digital watermarking. Springer, pp 275\u2013289","DOI":"10.1007\/978-3-030-11389-6_21"},{"key":"2938_CR14","doi-asserted-by":"crossref","unstructured":"Gopalan K, Wenndt S, Noga A, Haddad D, Adams S (2003) Covert speech communication via cover speech by tone insertion. In: Proc. 2003 IEEE aerospace conference, vol 4, pp 4_1647\u20134_1653","DOI":"10.1109\/AERO.2003.1235095"},{"key":"2938_CR15","doi-asserted-by":"crossref","unstructured":"Hamdaqa M, Tahvildari L (2011) Relack: a reliable voip steganography approach. In: 2011 fifth international conference on Secure software integration and reliability improvement (SSIRI). IEEE, pp 189\u2013197","DOI":"10.1109\/SSIRI.2011.24"},{"key":"2938_CR16","doi-asserted-by":"crossref","unstructured":"He J, Chen J, Xiao S, Huang X, Tang S (2018) A novel amr-wb speech steganography based on diameter-neighbor codebook partition. Security and Communication Networks 2018","DOI":"10.1155\/2018\/7080673"},{"key":"2938_CR17","doi-asserted-by":"crossref","unstructured":"Hu Y, Loizou PC (2006) Evaluation of objective measures for speech enhancement. In: Ninth international conference on spoken language processing","DOI":"10.21437\/Interspeech.2006-84"},{"key":"2938_CR18","doi-asserted-by":"crossref","unstructured":"Huang T, Zhang L, Hu X, Lei X (2018) A data validation method based on ip covert channel packet ordering. In: 2018 14Th international conference on computational intelligence and security (CIS). IEEE, pp 223\u2013227","DOI":"10.1109\/CIS2018.2018.00056"},{"issue":"6","key":"2938_CR19","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1109\/TIFS.2012.2218599","volume":"7","author":"Y Huang","year":"2012","unstructured":"Huang Y, Liu C, Tang S, Bai S (2012) Steganography integration into a low-bit rate speech codec. IEEE Trans Inf Forensic Secur 7(6):1865\u20131875","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"2938_CR20","doi-asserted-by":"crossref","unstructured":"Huang Y, Xiao B, Xiao H (2008) Implementation of covert communication based on steganography. In: 2008. IIHMSP\u201908 international conference on Intelligent information hiding and multimedia signal processing. IEEE, pp 1512\u20131515","DOI":"10.1109\/IIH-MSP.2008.174"},{"issue":"2","key":"2938_CR21","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/TIFS.2011.2108649","volume":"6","author":"Y Huang","year":"2011","unstructured":"Huang Y, Tang S, Yuan J (2011) Steganography in inactive frames of voip streams encoded by source codec. IEEE Trans Inf Forensic Secur 6(2):296\u2013306","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"2938_CR22","unstructured":"ITU I (1996) 723.1: Dual rate speech coder for multimedia communications transmitting at 5.3 and 6.3 kbit\/s. Telecommunication Standardization Sector of ITU"},{"key":"2938_CR23","unstructured":"ITU-T DRSC (2006) For multimedia communications transmitting at 5.3 and 6.3 kbit\/s. ITU-T Recommendation G 723"},{"key":"2938_CR24","unstructured":"ITU-T Recommendation (2001) Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. Rec. ITU-T P. 862"},{"issue":"15","key":"2938_CR25","doi-asserted-by":"publisher","first-page":"2923","DOI":"10.1002\/sec.1428","volume":"9","author":"A Janicki","year":"2016","unstructured":"Janicki A (2016) Pitch-based steganography for speex voice codec. Secur Commun Netw 9 (15):2923\u20132933","journal-title":"Secur Commun Netw"},{"key":"2938_CR26","doi-asserted-by":"publisher","first-page":"75081","DOI":"10.1109\/ACCESS.2019.2920663","volume":"7","author":"HY Keles","year":"2019","unstructured":"Keles HY, Rozhon J, Ilk HG, Voznak M (2019) Deepvocoder: a cnn model for compression and coding of narrow band speech. IEEE Access 7:75081\u201375089","journal-title":"IEEE Access"},{"issue":"3","key":"2938_CR27","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1049\/iet-spr.2018.5339","volume":"13","author":"H Kheddar","year":"2019","unstructured":"Kheddar H, Bouzid M, Meg\u00edas D (2019) Pitch and fourier magnitude based steganography for hiding 2.4 kbps melp bitstream. IET Signal Process 13(3):396\u2013407","journal-title":"IET Signal Process"},{"key":"2938_CR28","doi-asserted-by":"crossref","unstructured":"Liu J, Zhou K, Tian H (2012) Least-significant-digit steganography in low bitrate speech. In: 2012 IEEE international conference on Communications (ICC). IEEE , pp 1133\u20131137","DOI":"10.1109\/ICC.2012.6363997"},{"issue":"7","key":"2938_CR29","doi-asserted-by":"publisher","first-page":"8447","DOI":"10.1007\/s11042-018-6867-7","volume":"78","author":"X Liu","year":"2019","unstructured":"Liu X, Tian H, Huang Y, Lu J (2019) A novel steganographic method for algebraic-code-excited-linear-prediction speech streams based on fractional pitch delay search. Multimed Tools Appl 78(7):8447\u20138461","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"2938_CR30","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/2543581.2543587","volume":"46","author":"W Mazurczyk","year":"2013","unstructured":"Mazurczyk W (2013) Voip steganography and its detection\u2014a survey. ACM Comput Surv (CSUR) 46(2):20","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"2-3","key":"2938_CR31","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s11235-009-9245-y","volume":"45","author":"W Mazurczyk","year":"2010","unstructured":"Mazurczyk W, Lubacz J (2010) Lack\u2014a voip steganographic method. Telecommun Syst 45 (2-3):153\u2013163","journal-title":"Telecommun Syst"},{"issue":"3","key":"2938_CR32","doi-asserted-by":"publisher","first-page":"2139","DOI":"10.1007\/s11042-012-1224-8","volume":"70","author":"W Mazurczyk","year":"2014","unstructured":"Mazurczyk W, Szaga P, Szczypiorski K (2014) Using transcoding for hidden communication in ip telephony. Multimed Tools Appl 70(3):2139\u20132165","journal-title":"Multimed Tools Appl"},{"key":"2938_CR33","doi-asserted-by":"crossref","unstructured":"Mazurczyk W, Szczypiorski K (2008) Covert channels in sip for voip signalling. In: Global e-security. Springer, pp 65\u201372","DOI":"10.1007\/978-3-540-69403-8_9"},{"key":"2938_CR34","doi-asserted-by":"crossref","unstructured":"Mazurczyk W, Szczypiorski K (2008) Steganography of voip streams. In: OTM Confederated international conferences\u201d on the move to meaningful internet systems. Springer, pp 1001\u20131018","DOI":"10.1007\/978-3-540-88873-4_6"},{"issue":"6","key":"2938_CR35","doi-asserted-by":"publisher","first-page":"1490","DOI":"10.1016\/j.compeleceng.2012.05.003","volume":"38","author":"H Miao","year":"2012","unstructured":"Miao H, Huang L, Chen Z, Yang W, Al-Hawbani A (2012) A new scheme for covert communication via 3G encoded speech. Comput Electr Eng 38(6):1490\u20131501","journal-title":"Comput Electr Eng"},{"key":"2938_CR36","doi-asserted-by":"crossref","unstructured":"Miao R, Huang Y (2011) An approach of covert communication based on the adaptive steganography scheme on voice over ip. In: 2011 IEEE international conference on Communications (ICC). IEEE, pp 1\u20135","DOI":"10.1109\/icc.2011.5962657"},{"key":"2938_CR37","doi-asserted-by":"crossref","unstructured":"Peng J, Jiang Y, Tang S, Meziane F (2019) Security of streaming media communications with logistic map and self-adaptive detection-based steganography. IEEE Transactions on Dependable and Secure Computing","DOI":"10.1109\/TDSC.2019.2946138"},{"key":"2938_CR38","doi-asserted-by":"crossref","unstructured":"Peng J, Tang S (2020) Covert communication over voip streaming media with dynamic key distribution and authentication. IEEE Transactions on Industrial Electronics","DOI":"10.1109\/TIE.2020.2979567"},{"issue":"1","key":"2938_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-015-0028-6","volume":"2016","author":"Q Qi","year":"2016","unstructured":"Qi Q, Peng D, Sharif H (2016) Dst approach to enhance audio quality on lost audio packet steganography. EURASIP J Inf Secur 2016(1):1\u201310","journal-title":"EURASIP J Inf Secur"},{"issue":"9","key":"2938_CR40","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1109\/TIFS.2015.2421322","volume":"10","author":"Y Ren","year":"2015","unstructured":"Ren Y, Cai T, Tang M, Wang L (2015) AMR steganalysis based on the probability of same pulse position. IEEE Trans Inf Forensic Secur 10(9):1801\u20131811","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"7","key":"2938_CR41","doi-asserted-by":"publisher","first-page":"8091","DOI":"10.1007\/s11042-018-6600-6","volume":"78","author":"Y Ren","year":"2019","unstructured":"Ren Y, Liu D, Yang J, Wang L (2019) An AMR adaptive steganographic scheme based on the pitch delay of unvoiced speech. Multimed Tools Appl 78(7):8091\u20138111","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"2938_CR42","doi-asserted-by":"publisher","first-page":"12095","DOI":"10.1007\/s11042-017-4860-1","volume":"77","author":"Y Ren","year":"2018","unstructured":"Ren Y, Wu H, Wang L (2018) An AMR adaptive steganography algorithm based on minimizing distortion. Multimed Tools Appl 77(10):12095\u201312110","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"2938_CR43","doi-asserted-by":"publisher","first-page":"2649","DOI":"10.1109\/TIFS.2019.2905760","volume":"14","author":"Y Ren","year":"2019","unstructured":"Ren Y, Yang H, Wu H, Tu W, Wang L (2019) A secure AMR fixed codebook steganographic scheme based on pulse distribution model. IEEE Trans Inf Forensic Secur 14(10):2649\u20132661","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"2938_CR44","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.cose.2018.08.006","volume":"79","author":"S Schmidt","year":"2018","unstructured":"Schmidt S, Mazurczyk W, Kulesza R, Keller J, Caviglione L (2018) Exploiting ip telephony with silence suppression for hidden data transfers. Comput Secur 79:17\u201332","journal-title":"Comput Secur"},{"key":"2938_CR45","doi-asserted-by":"crossref","unstructured":"Su Z, Li W, Zhang G, Hu D, Zhou X (2019) A steganographic method based on gain quantization for ilbc speech streams. Multimed Syst:1\u201311","DOI":"10.1007\/s00530-019-00624-w"},{"issue":"8","key":"2938_CR46","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1002\/sec.1183","volume":"9","author":"S Tang","year":"2016","unstructured":"Tang S, Chen Q, Zhang W, Huang Y (2016) Universal steganography model for low bit-rate speech codec. Secur Commun Netw 9(8):747\u2013754","journal-title":"Secur Commun Netw"},{"issue":"18","key":"2938_CR47","doi-asserted-by":"publisher","first-page":"2236","DOI":"10.1016\/j.comcom.2011.07.003","volume":"34","author":"H Tian","year":"2011","unstructured":"Tian H, Jiang H, Zhou K, Feng D (2011) Adaptive partial-matching steganography for voice over ip using triple m sequences. Comput Commun 34(18):2236\u20132247","journal-title":"Comput Commun"},{"issue":"2","key":"2938_CR48","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s00530-013-0302-8","volume":"20","author":"H Tian","year":"2014","unstructured":"Tian H, Liu J, Li S (2014) Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimed Syst 20(2):143\u2013154","journal-title":"Multimed Syst"},{"key":"2938_CR49","doi-asserted-by":"crossref","unstructured":"Wang Y, Yang K, Yi X, Zhao X, Xu Z (2018) Cnn-based steganalysis of mp3 steganography in the entropy code domain. In: Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp 55\u201365","DOI":"10.1145\/3206004.3206011"},{"issue":"24","key":"2938_CR50","doi-asserted-by":"publisher","first-page":"11763","DOI":"10.1007\/s11042-014-2265-y","volume":"74","author":"S Yan","year":"2015","unstructured":"Yan S, Tang G, Sun Y, Gao Z, Shen L (2015) A triple-layer steganography scheme for low bit-rate speech streams. Multimed Tools Appl 74(24):11763\u201311782","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"2938_CR51","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1049\/cje.2017.09.026","volume":"26","author":"W Yang","year":"2017","unstructured":"Yang W, Tang S, Li M, Cheng Y, Zhou Z (2017) Steganalysis of low embedding rates lsb speech based on histogram moments in frequency domain. Chin J Electron 26(6):1254\u20131260","journal-title":"Chin J Electron"},{"issue":"3","key":"2938_CR52","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1049\/iet-ifs.2009.0092","volume":"4","author":"A Yarg\u0131\u010bo\u0121lu","year":"2010","unstructured":"Yarg\u0131\u010bo\u0121lu A, \u0130lk HG (2010) Hidden data transmission in mixed excitation linear prediction coded speech using quantisation index modulation. IET Inf Secur 4(3):158\u2013166","journal-title":"IET Inf Secur"},{"key":"2938_CR53","doi-asserted-by":"crossref","unstructured":"Zhang L, Huang T, Rasheed W, Hu X, Zhao C (2019) An enlarging-the-capacity packet sorting covert channel. IEEE Access 7 145634\u2013145640","DOI":"10.1109\/ACCESS.2019.2945320"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02938-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02938-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02938-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T19:26:52Z","timestamp":1726428412000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02938-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,6]]},"references-count":53,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["2938"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02938-7","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,6]]},"assertion":[{"value":"18 October 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}