{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:33:00Z","timestamp":1775323980578,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,12,19]],"date-time":"2018-12-19T00:00:00Z","timestamp":1545177600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61572456"],"award-info":[{"award-number":["61572456"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["Bk20151241"],"award-info":[{"award-number":["Bk20151241"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11042-018-6941-1","type":"journal-article","created":{"date-parts":[[2018,12,19]],"date-time":"2018-12-19T03:05:27Z","timestamp":1545188727000},"page":"8513-8534","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An improved entropy-based approach to steganalysis of compressed speech"],"prefix":"10.1007","volume":"78","author":[{"given":"ChuanPeng","family":"Guo","sequence":"first","affiliation":[]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,19]]},"reference":[{"key":"6941_CR1","unstructured":"(2012) The cmu audio databases. Available at: http:\/\/www.speech.cs.cmu.edu\/databases\/"},{"key":"6941_CR2","unstructured":"(2013) Cool edit pro 2.1. Available at: https:\/\/cool-edit-pro.soft32.com\/"},{"key":"6941_CR3","unstructured":"(2017) Speech codec speech processing functions; adaptive multi-rate - wideband (amr-wb) speech codec; transcoding functions. Available at: https:\/\/cool-edit-pro.soft32.com\/"},{"key":"6941_CR4","unstructured":"(2018) Amr speech encoder and decoder. Available at: http:\/\/www.3gpp.org\/ftp\/\/Specs\/archive\/26_series\/26.073\/"},{"issue":"3","key":"6941_CR5","first-page":"27","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang CC, Lin CJ (2011) Libsvm: a library for support vector machines. ACM Trans Intell Syst Technol (TIST) 2(3):27","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"key":"6941_CR6","volume-title":"Elements of information theory","author":"TM Cover","year":"2012","unstructured":"Cover TM, Thomas JA (2012) Elements of information theory. Wiley, New York"},{"key":"6941_CR7","doi-asserted-by":"crossref","unstructured":"Ding Q, Ping X (2010) Steganalysis of compressed speech based on histogram features. In: 6th international conference on wireless communications networking and mobile computing (WiCOM). IEEE, pp 1\u20134","DOI":"10.1109\/WICOM.2010.5600125"},{"key":"6941_CR8","doi-asserted-by":"crossref","unstructured":"Dittmann J, Hesse D, Hillert R (2005) Steganography and steganalysis in voice-over ip scenarios: operational aspects and first experiences with a new steganalysis tool set. In: International society for optics and photonics, security, steganography, and watermarking of multimedia contents VII, vol 5681, pp 607\u2013619","DOI":"10.1117\/12.586579"},{"key":"6941_CR9","first-page":"355","volume-title":"Information Hiding","author":"Sorina Dumitrescu","year":"2002","unstructured":"Dumitrescu S, Wu X, Wang Z (2002) Detection of lsb steganography via sample pair analysis, pp 355\u2013372"},{"issue":"4","key":"6941_CR10","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J Fridrich","year":"2001","unstructured":"Fridrich J, Goljan M, Du R (2001) Detecting lsb steganography in color, and gray-scale images. IEEE multimedia 8(4):22\u201328","journal-title":"IEEE multimedia"},{"key":"6941_CR11","doi-asserted-by":"crossref","unstructured":"Geiser B, Vary P (2007) Backwards compatible wideband telephony in mobile networks: Celp watermarking and bandwidth extension 4:IV\u2013533","DOI":"10.1109\/ICASSP.2007.366967"},{"key":"6941_CR12","doi-asserted-by":"crossref","unstructured":"Geiser B, Vary P (2008) High rate data hiding in acelp speech codecs, pp 4005\u20134008","DOI":"10.1109\/ICASSP.2008.4518532"},{"issue":"6","key":"6941_CR13","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/TDSC.2010.46","volume":"8","author":"S Gianvecchio","year":"2011","unstructured":"Gianvecchio S, Wang H (2011) An entropy-based approach to detecting covert timing channels. IEEE Transactions on Dependable and Secure Computing 8(6):785\u2013797","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"7","key":"6941_CR14","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1049\/iet-com.2010.0348","volume":"5","author":"Y Huang","year":"2011","unstructured":"Huang Y, Tang S, Zhang Y (2011) Detection of covert voice-over internet protocol communications using sliding window-based steganalysis. IET communications 5(7):929\u2013936","journal-title":"IET communications"},{"issue":"10","key":"6941_CR15","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1007\/s11431-016-0707-3","volume":"60","author":"Y Huang","year":"2017","unstructured":"Huang Y, Tao H, Xiao B, Chang C (2017) Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys. Sci China Technol Sci 60(10):1585\u20131596","journal-title":"Sci China Technol Sci"},{"key":"6941_CR16","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.procs.2015.04.251","volume":"49","author":"S Jagtap","year":"2015","unstructured":"Jagtap S, Mulye M, Uplane M (2015) Speech coding techniques. Procedia Computer Science 49:253\u2013263","journal-title":"Procedia Computer Science"},{"key":"6941_CR17","doi-asserted-by":"crossref","unstructured":"Kraetzer C, Dittmann J (2007) Mel-cepstrum-based steganalysis for voip steganography 6505:650505","DOI":"10.1117\/12.704040"},{"key":"6941_CR18","doi-asserted-by":"crossref","unstructured":"Kratzer C, Dittmann J, Vogel T, Hillert R (2006) Design and evaluation of steganography for voice-over-ip. In: IEEE international symposium on circuits and systems, 2006. ISCAS 2006. Proceedings. IEEE, pp 4\u2013pp","DOI":"10.1109\/ISCAS.2006.1693105"},{"issue":"6","key":"6941_CR19","doi-asserted-by":"publisher","first-page":"1168","DOI":"10.3724\/SP.J.1016.2013.01168","volume":"36","author":"S Li","year":"2013","unstructured":"Li S, Huang Y, Lu J (2013) Detection of qim steganography in low bit-rate speech codec based on statistical models and svm. Chin J Comput 36(6):1168\u20131176","journal-title":"Chin J Comput"},{"issue":"5","key":"6941_CR20","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1109\/TASLP.2017.2676356","volume":"25","author":"S Li","year":"2017","unstructured":"Li S, Jia Y, Kuo CCJ (2017) Steganalysis of qim steganography in low-bit-rate speech signals. IEEE\/ACM Transactions on Audio, Speech, and Language Processing 25(5):1011\u20131022","journal-title":"IEEE\/ACM Transactions on Audio, Speech, and Language Processing"},{"issue":"1","key":"6941_CR21","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s12652-015-0315-6","volume":"7","author":"J Liu","year":"2016","unstructured":"Liu J, Tian H, Lu J, Chen Y (2016) Neighbor-index-division steganography based on qim method for g. 723.1 speech streams. J Ambient Intell Humaniz Comput 7(1):139\u2013147","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"6941_CR22","unstructured":"Liu L, Li M, Li Q, Liang Y (2008) Perceptually transparent information hiding in g. 729 bitstream, pp 406\u2013409"},{"issue":"2","key":"6941_CR23","doi-asserted-by":"publisher","first-page":"2837","DOI":"10.1007\/s11042-016-3257-x","volume":"76","author":"P Liu","year":"2017","unstructured":"Liu P, Li S, Wang H (2017) Steganography integrated into linear predictive coding for low bit-rate speech codec. Multimedia Tools and Applications 76(2):2837\u20132859","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"6941_CR24","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1093\/ietisy\/E88-D.2.330","volume":"88","author":"ZM Lu","year":"2005","unstructured":"Lu ZM, Yan B, Sun SH (2005) Watermarking combined with celp speech coding for authentication. IEICE Trans Inf Syst 88(2):330\u2013334","journal-title":"IEICE Trans Inf Syst"},{"issue":"2","key":"6941_CR25","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/2543581.2543587","volume":"46","author":"W Mazurczyk","year":"2013","unstructured":"Mazurczyk W (2013) Voip steganography and its detection\u2014a survey. ACM Comput Surv 46(2):20","journal-title":"ACM Comput Surv"},{"issue":"6","key":"6941_CR26","doi-asserted-by":"publisher","first-page":"1490","DOI":"10.1016\/j.compeleceng.2012.05.003","volume":"38","author":"H Miao","year":"2012","unstructured":"Miao H, Huang L, Chen Z, Yang W, Al-Hawbani A (2012) A new scheme for covert communication via 3g encoded speech. Comput Electr Eng 38(6):1490\u20131501","journal-title":"Comput Electr Eng"},{"key":"6941_CR27","unstructured":"Miao H, Huang L, Shen Y, Lu X, Chen Z (2013) Steganalysis of compressed speech based on markov and entropy. In: International workshop on digital watermarking. Springer, pp 63\u201376"},{"issue":"7","key":"6941_CR28","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"FA Petitcolas","year":"1999","unstructured":"Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062\u20131078","journal-title":"Proc IEEE"},{"issue":"9","key":"6941_CR29","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1109\/TIFS.2015.2421322","volume":"10","author":"Y Ren","year":"2015","unstructured":"Ren Y, Cai T, Tang M, Wang L (2015) Amr steganalysis based on the probability of same pulse position. IEEE Trans Inf Forensic Secur 10(9):1801\u20131811","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"6941_CR30","doi-asserted-by":"crossref","unstructured":"Takahashi T, Lee W (2007) An assessment of voip covert channel threats. In: 3rd international conference on security and privacy in communications networks and the workshops. SecureComm 2007. IEEE, pp 371\u2013380","DOI":"10.1109\/SECCOM.2007.4550357"},{"key":"6941_CR31","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.sigpro.2015.05.001","volume":"117","author":"H Tian","year":"2015","unstructured":"Tian H, Qin J, Huang Y, Chen Y, Wang T, Liu J, Cai Y (2015) Optimal matrix embedding for voice-over-ip steganography. Signal Process 117:33\u201343","journal-title":"Signal Process"},{"key":"6941_CR32","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.sigpro.2016.11.013","volume":"134","author":"H Tian","year":"2017","unstructured":"Tian H, Wu Y, Chang CC, Huang Y, Chen Y, Wang T, Cai Y, Liu J (2017) Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs. Signal Process 134:9\u201322","journal-title":"Signal Process"},{"key":"6941_CR33","unstructured":"Westfeld A, Pfitzmann A (1999) Attacks on steganographic systems. In: International workshop on information hiding. Springer, pp 61\u201376"},{"issue":"1","key":"6941_CR34","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1049\/cje.2015.01.026","volume":"24","author":"Z Wu","year":"2015","unstructured":"Wu Z, Cao H, Li D (2015) An approach of steganography in g. 729 bitstream based on matrix coding and interleaving. Chin J Electron 24(1):157\u2013165","journal-title":"Chin J Electron"},{"key":"6941_CR35","doi-asserted-by":"crossref","unstructured":"Xiao B, Huang Y, Tang S (2008) An approach to information hiding in low bit-rate speech stream. IEEE, pp 1\u20135","DOI":"10.1109\/GLOCOM.2008.ECP.375"},{"issue":"4","key":"6941_CR36","doi-asserted-by":"publisher","first-page":"854","DOI":"10.7544\/issn1000-1239.2018.20161042","volume":"55","author":"G Zhanzhan","year":"2018","unstructured":"Zhanzhan G, Guangming T, Shuo W (2018) A novel voip steganography method based on bayesian network and matrix embedding. Journal of Computer Research and Development 55(4):854\u2013863. https:\/\/doi.org\/10.7544\/issn1000-1239.2018.20161042","journal-title":"Journal of Computer Research and Development"},{"key":"6941_CR37","doi-asserted-by":"crossref","unstructured":"Zhijun W, Yongpeng S (2016) An implementation of speech steganography for ilbc by using fixed codebook. In: 2nd IEEE international conference on computer and communications (ICCC). IEEE, pp 1970\u20131974","DOI":"10.1109\/CompComm.2016.7925046"},{"issue":"3","key":"6941_CR38","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/2566590.2566610","volume":"57","author":"E Zielinska","year":"2014","unstructured":"Zielinska E, Mazurczyk W, Szczypiorski K (2014) Trends in steganography. Commun ACM 57(3):86\u201395","journal-title":"Commun ACM"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6941-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6941-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6941-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T16:23:22Z","timestamp":1775319802000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6941-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,19]]},"references-count":38,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["6941"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6941-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,19]]},"assertion":[{"value":"5 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}