{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:14:22Z","timestamp":1761808462614,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-020-10228-6","type":"journal-article","created":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T03:28:01Z","timestamp":1617766081000},"page":"24469-24490","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Maximizing embedding capacity for speech steganography: a segment-growing approach"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0272-2659","authenticated-orcid":false,"given":"Mohammed","family":"Baziyad","sequence":"first","affiliation":[]},{"given":"Ismail","family":"Shahin","sequence":"additional","affiliation":[]},{"given":"Tamer","family":"Rabie","sequence":"additional","affiliation":[]},{"given":"Ali Bou","family":"Nassif","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,7]]},"reference":[{"issue":"13","key":"10228_CR1","doi-asserted-by":"publisher","first-page":"17799","DOI":"10.1007\/s11042-019-7166-7","volume":"78","author":"AA Abdulla","year":"2019","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimedia Tools and Applications 78(13):17799\u201317823","journal-title":"Multimedia Tools and Applications"},{"doi-asserted-by":"crossref","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition. In: Mobile multimedia\/image processing, security, and applications 2014, vol 9120, pp 912005. International Society for Optics and Photonics","key":"10228_CR2","DOI":"10.1117\/12.2050518"},{"unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Ph.D. Thesis, University of Buckingham","key":"10228_CR3"},{"issue":"1","key":"10228_CR4","doi-asserted-by":"publisher","first-page":"59","DOI":"10.3923\/jas.2010.59.64","volume":"10","author":"MA Ahmed","year":"2010","unstructured":"Ahmed MA, Kiah MLM, Zaidan BB, Zaidan AA (2010) A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J Appl Sci 10(1):59\u201364","journal-title":"J Appl Sci"},{"issue":"1","key":"10228_CR5","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/T-C.1974.223784","volume":"100","author":"N Ahmed","year":"1974","unstructured":"Ahmed N, Natarajan T, Rao KR (1974) Discrete cosine transform. IEEE transactions on Computers 100(1):90\u201393","journal-title":"IEEE transactions on Computers"},{"issue":"10","key":"10228_CR6","doi-asserted-by":"publisher","first-page":"9141","DOI":"10.1016\/j.eswa.2012.02.066","volume":"39","author":"DM BallesterosL","year":"2012","unstructured":"BallesterosL DM, MorenoA JM (2012) Highly transparent steganography model of speech signals using efficient wavelet masking. Expert Syst Appl 39 (10):9141\u20139149","journal-title":"Expert Syst Appl"},{"doi-asserted-by":"crossref","unstructured":"Baziyad M, Rabie T, Kamel I (2018) Extending steganography payload capacity using the l* a* b* color space. In: 2018 International conference on innovations in information technology (IIT), pp 1\u20136. IEEE","key":"10228_CR7","DOI":"10.1109\/INNOVATIONS.2018.8606008"},{"doi-asserted-by":"crossref","unstructured":"Baziyad M, Rabie T, Kamel I (2020) Achieving stronger compaction for dct-based steganography: A region-growing approach. In: World conference on information systems and technologies, pp 251\u2013261. Springer","key":"10228_CR8","DOI":"10.1007\/978-3-030-45691-7_24"},{"issue":"7","key":"10228_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2352\/ISSN.2470-1173.2018.07.MWSF-213","volume":"2018","author":"M Boroumand","year":"2018","unstructured":"Boroumand M, Fridrich J (2018) Deep learning for detecting processing history of images. Electronic Imaging 2018(7):1\u20139","journal-title":"Electronic Imaging"},{"key":"10228_CR10","volume-title":"Academic press library in signal processing","author":"R Chellappa","year":"2014","unstructured":"Chellappa R, Theodoridis S (2014) Academic press library in signal processing. Academic Press, Cambridge"},{"issue":"5","key":"10228_CR11","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1016\/j.dsp.2009.04.003","volume":"19","author":"Y Erfani","year":"2009","unstructured":"Erfani Y, Siahpoush S (2009) Robust audio watermarking using improved ts echo hiding. Digital Signal Processing 19(5):809\u2013814","journal-title":"Digital Signal Processing"},{"doi-asserted-by":"crossref","unstructured":"Kanhe A, Aghila G (2016) Dct based audio steganography in voiced and un-voiced frames. In: Proceedings of the international conference on informatics and analytics, p 47. ACM","key":"10228_CR12","DOI":"10.1145\/2980258.2980360"},{"issue":"11","key":"10228_CR13","doi-asserted-by":"publisher","first-page":"5049","DOI":"10.1007\/s00034-018-0805-9","volume":"37","author":"A Kanhe","year":"2018","unstructured":"Kanhe A, Aghila G (2018) A dct\u2013svd-based speech steganography in voiced frames. Circuits, Systems, and Signal Processing 37(11):5049\u20135068","journal-title":"Circuits, Systems, and Signal Processing"},{"key":"10228_CR14","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.jisa.2018.04.005","volume":"40","author":"K Karampidis","year":"2018","unstructured":"Karampidis K, Kavallieratou E, Papadourakis G (2018) A review of image steganalysis techniques for digital forensics. Journal of information security and applications 40:217\u2013235","journal-title":"Journal of information security and applications"},{"issue":"10B","key":"10228_CR15","first-page":"4633","volume":"19","author":"AM Kathum","year":"2016","unstructured":"Kathum AM, Al-Saad SN (2016) Speech steganography system using lifting wavelet transform. International Information Institute (Tokyo). Information 19 (10B):4633","journal-title":"International Information Institute (Tokyo). Information"},{"key":"10228_CR16","doi-asserted-by":"publisher","DOI":"10.1201\/b17668","volume-title":"Introduction to modern cryptography","author":"J Katz","year":"2014","unstructured":"Katz J, Lindell Y (2014) Introduction to modern cryptography. Chapman and Hall\/CRC, Boca Raton"},{"issue":"10","key":"10228_CR17","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.1984.1091825","volume":"22","author":"N Kitawaki","year":"1984","unstructured":"Kitawaki N, Honda M, Itoh K (1984) Speech-quality assessment methods for speech-coding systems. IEEE Commun Mag 22(10):26\u201333","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"10228_CR18","first-page":"1","volume":"10","author":"VI Korzhik","year":"2013","unstructured":"Korzhik VI, Morales-Luna G, Fedyanin I (2013) Audio watermarking based on echo hiding with zero error probability. IJCSA 10(1):1\u201310","journal-title":"IJCSA"},{"unstructured":"Kurapati S, Joglekar SP, Prasanna VI, Tyagi S, Thodime G, Khandelwal P, Manchenella C, Singh MK, Thodime RV (2013) System and method for providing network level and nodal level vulnerability protection in voip networks. US Patent 8,582,567","key":"10228_CR19"},{"key":"10228_CR20","volume-title":"Practical digital signal processing","author":"E Lai","year":"2003","unstructured":"Lai E (2003) Practical digital signal processing. Elsevier, Amsterdam"},{"doi-asserted-by":"crossref","unstructured":"Liu J, Zhou K, Tian H (2012) Least-significant-digit steganography in low bitrate speech. In: 2012 IEEE international conference on communications (ICC), pp 1133\u20131137. IEEE","key":"10228_CR21","DOI":"10.1109\/ICC.2012.6363997"},{"issue":"7","key":"10228_CR22","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1145\/360248.360253","volume":"19","author":"RM Metcalfe","year":"1976","unstructured":"Metcalfe RM, Boggs DR (1976) Ethernet: Distributed packet switching for local computer networks. Commun ACM 19(7):395\u2013404","journal-title":"Commun ACM"},{"key":"10228_CR23","doi-asserted-by":"publisher","first-page":"19143","DOI":"10.1109\/ACCESS.2019.2896880","volume":"7","author":"AB Nassif","year":"2019","unstructured":"Nassif AB, Shahin I, Attili I, Azzeh M, Shaalan K (2019) Speech recognition using deep neural networks: A systematic review. IEEE Access 7:19143\u201319165","journal-title":"IEEE Access"},{"issue":"6","key":"10228_CR24","doi-asserted-by":"publisher","first-page":"063001","DOI":"10.1117\/1.JEI.26.6.063001","volume":"26","author":"T Rabie","year":"2017","unstructured":"Rabie T, Baziyad M (2017) Visual fidelity without sacrificing capacity: an adaptive laplacian pyramid approach to information hiding. Journal of Electronic Imaging 26(6):063001","journal-title":"Journal of Electronic Imaging"},{"key":"10228_CR25","doi-asserted-by":"publisher","first-page":"21948","DOI":"10.1109\/ACCESS.2019.2898838","volume":"7","author":"T Rabie","year":"2019","unstructured":"Rabie T, Baziyad M (2019) The pixogram: addressing high payload demands for video steganography. IEEE Access 7:21948\u201321962","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Rabie T, Baziyad M (2020) Pixocomp: a novel video compression scheme utilizing temporal pixograms. Multimedia Tools and Applications, pp 1\u201318","key":"10228_CR26","DOI":"10.1007\/s11042-020-08660-9"},{"issue":"18","key":"10228_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-018-5713-2","volume":"77","author":"T Rabie","year":"2018","unstructured":"Rabie T, Baziyad M, Kamel I (2018) Enhanced high capacity image steganography using discrete wavelet transform and the laplacian pyramid. Multimedia Tools and Applications 77(18):1\u201326","journal-title":"Multimedia Tools and Applications"},{"doi-asserted-by":"crossref","unstructured":"Rabie T, Baziyad M, Kamel I (2019) High payload steganography: Surface-fitting the transform domain. In: 2019 International conference on communications, signal processing, and their applications (ICCSPA), pp 1\u20136. IEEE","key":"10228_CR28","DOI":"10.1109\/ICCSPA.2019.8713731"},{"doi-asserted-by":"crossref","unstructured":"Rabie T, Guerchi D (2015) Spectral magnitude speech steganography. International Journal of Computer Applications, 116(5)","key":"10228_CR29","DOI":"10.5120\/20329-2547"},{"issue":"10","key":"10228_CR30","doi-asserted-by":"publisher","first-page":"5939","DOI":"10.1007\/s11042-015-2557-x","volume":"75","author":"T Rabie","year":"2016","unstructured":"Rabie T, Kamel I (2016) On the embedding limits of the discrete cosine transform. Multimedia Tools and Applications 75(10):5939\u20135957","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"10228_CR31","doi-asserted-by":"publisher","first-page":"6473","DOI":"10.1007\/s11042-016-3301-x","volume":"76","author":"T Rabie","year":"2017","unstructured":"Rabie T, Kamel I (2017) High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimedia Tools and Applications 76(5):6473\u20136493","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"10228_CR32","doi-asserted-by":"publisher","first-page":"8627","DOI":"10.1007\/s11042-016-3501-4","volume":"76","author":"T Rabie","year":"2017","unstructured":"Rabie T, Kamel I (2017) Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach. Multimedia Tools and Applications 76(6):8627\u20138650","journal-title":"Multimedia Tools and Applications"},{"issue":"7","key":"10228_CR33","doi-asserted-by":"publisher","first-page":"8295","DOI":"10.1007\/s11042-017-4727-5","volume":"77","author":"T Rabie","year":"2018","unstructured":"Rabie T, Kamel I, Baziyad M (2018) Maximizing embedding capacity and stego quality: curve-fitting in the transform domain. Multimedia Tools and Applications 77(7):8295\u20138326","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"10228_CR34","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/1687-4722-2012-20","volume":"2012","author":"S Rekik","year":"2012","unstructured":"Rekik S, Guerchi D, Selouani S-A, Hamam H (2012) Speech steganography using wavelet and fourier transforms. EURASIP Journal on Audio, Speech, and Music Processing 2012(1):20","journal-title":"EURASIP Journal on Audio, Speech, and Music Processing"},{"issue":"2","key":"10228_CR35","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2015","unstructured":"Sedighi V, Cogranne R, Fridrich J (2015) Content-adaptive steganography by minimizing statistical detectability. IEEE Transactions on Information Forensics and Security 11(2):221\u2013234","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"10228_CR36","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1515\/jisys-2014-0118","volume":"25","author":"I Shahin","year":"2016","unstructured":"Shahin I (2016) Employing emotion cues to verify speakers in emotional talking environments. J Intell Syst 25(1):3\u201317","journal-title":"J Intell Syst"},{"issue":"7","key":"10228_CR37","first-page":"1","volume":"32","author":"I Shahin","year":"2018","unstructured":"Shahin I, Nassif AB, Hamsa S (2018) Novel cascaded gaussian mixture model-deep neural network classifier for speaker identification in emotional talking environments. Neural Comput & Applic 32(7):1\u201313","journal-title":"Neural Comput & Applic"},{"key":"10228_CR38","doi-asserted-by":"publisher","first-page":"26777","DOI":"10.1109\/ACCESS.2019.2901352","volume":"7","author":"I Shahin","year":"2019","unstructured":"Shahin I, Nassif AB, Hamsa S (2019) Emotion recognition using hybrid gaussian mixture model and deep neural network. IEEE Access 7:26777\u201326787","journal-title":"IEEE Access"},{"issue":"3","key":"10228_CR39","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s10772-013-9188-2","volume":"16","author":"IMA Shahin","year":"2013","unstructured":"Shahin IMA (2013) Employing both gender and emotion cues to enhance speaker identification performance in emotional talking environments. International Journal of Speech Technology 16(3):341\u2013351","journal-title":"International Journal of Speech Technology"},{"key":"10228_CR40","doi-asserted-by":"publisher","DOI":"10.1201\/9781315121109","volume-title":"Digital watermarking and steganography: fundamentals and techniques","author":"FY Shih","year":"2017","unstructured":"Shih FY (2017) Digital watermarking and steganography: fundamentals and techniques. CRC press, Boca Raton"},{"doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza S, Manzuri-Shalmani MT (2008) High capacity error free wavelet domain speech steganography. In: 2008 IEEE international conference on acoustics, speech and signal processing, pp 1729\u20131732. IEEE","key":"10228_CR41","DOI":"10.1109\/ICASSP.2008.4517963"},{"doi-asserted-by":"crossref","unstructured":"Sridevi R, Damodaram A, Narasimham SVL (2009) Efficient method of audio steganography by modified lsb algorithm and strong encryption key with enhanced security. Journal of Theoretical & Applied Information Technology, 5(6)","key":"10228_CR42","DOI":"10.1016\/S1353-4858(09)70100-X"},{"issue":"2","key":"10228_CR43","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1137\/S0036141095289051","volume":"29","author":"W Sweldens","year":"1998","unstructured":"Sweldens W (1998) The lifting scheme: A construction of second generation wavelets. SIAM journal on mathematical analysis 29(2):511\u2013546","journal-title":"SIAM journal on mathematical analysis"},{"doi-asserted-by":"crossref","unstructured":"Xu T, Yang Z (2009) Simple and effective speech steganography in g. 723.1 low-rate codes. In: 2009 International conference on wireless communications & signal processing, pp 1\u20134. IEEE","key":"10228_CR44","DOI":"10.1109\/WCSP.2009.5371745"},{"doi-asserted-by":"crossref","unstructured":"Xu T, Yang Z, Shao X (2009) Novel speech secure communication system based on information hiding and compressed sensing. In: 2009 Fourth international conference on systems and networks communications, pp 201\u2013206. IEEE","key":"10228_CR45","DOI":"10.1109\/ICSNC.2009.71"},{"issue":"6","key":"10228_CR46","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1049\/ecej:20020603","volume":"14","author":"Y Zhang","year":"2002","unstructured":"Zhang Y (2002) Sip-based voip network and its interworking with the pstn. Electronics & Communication Engineering Journal 14(6):273\u2013282","journal-title":"Electronics & Communication Engineering Journal"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10228-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10228-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10228-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T04:17:37Z","timestamp":1625458657000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10228-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,7]]},"references-count":46,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10228"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10228-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,4,7]]},"assertion":[{"value":"2 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}