{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:47:11Z","timestamp":1771519631258,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2020,3,26]],"date-time":"2020-03-26T00:00:00Z","timestamp":1585180800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,26]],"date-time":"2020-03-26T00:00:00Z","timestamp":1585180800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11276-020-02312-4","type":"journal-article","created":{"date-parts":[[2020,3,26]],"date-time":"2020-03-26T22:04:15Z","timestamp":1585260255000},"page":"5817-5823","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Reliability enhancement and packet loss recovery of any steganographic method in voice over IP"],"prefix":"10.1007","volume":"26","author":[{"given":"Parvaneh","family":"Amirzade Dana","sequence":"first","affiliation":[]},{"given":"Zahra","family":"Esmaeilbeig","sequence":"additional","affiliation":[]},{"given":"Mohammad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,26]]},"reference":[{"issue":"2","key":"2312_CR1","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/TIFS.2011.2108649","volume":"6","author":"YF Huang","year":"2011","unstructured":"Huang, Y. F., Tang, S., & Yuan, J. (2011). Steganography in inactive frames of voip streams encoded by source codec. Transactions on Information Forensics and Security, 6(2), 296\u2013306.","journal-title":"Transactions on Information Forensics and Security"},{"issue":"6","key":"2312_CR2","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1093\/comjnl\/bxr111","volume":"55","author":"K Zhou","year":"2012","unstructured":"Zhou, K., Feng, D., Tian, H., & Jiang, H. (2012). Transparency-orientated encoding strategies for voice-over-ip steganography. The Computer Journal, 55(6), 702\u2013716.","journal-title":"The Computer Journal"},{"issue":"2","key":"2312_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSPEC.2010.5397787","volume":"47","author":"J Lubacz","year":"2010","unstructured":"Lubacz, J., Mazurczyk, W., & Szczypiorski, K. (2010). Vice over ip. Spectrum, 47(2), 42\u201347. IEEE.","journal-title":"Spectrum"},{"issue":"8","key":"2312_CR4","first-page":"2069","volume":"86","author":"N Komaki","year":"2003","unstructured":"Komaki, N., Aoki, N., & Yamamoto, T. (2003). A packet loss concealment technique for voip using steganography. Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 86(8), 2069\u20132072. IEICE.","journal-title":"Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"issue":"7","key":"2312_CR5","first-page":"1279","volume":"93","author":"A Ito","year":"2010","unstructured":"Ito, A., Suzuki, Y., et al. (2010). Information hiding for G.711 speech based on substitution of least significant bits and estimation of tolerable distortion. Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 93(7), 1279\u20131286. IEICE.","journal-title":"Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"2312_CR6","unstructured":"Wu, Z., & Yang, W. (2006). G. 711-based adaptive speech information hiding approach. In International conference on intelligent computing, (pp. 1139\u20131144). New York: Springer."},{"key":"2312_CR7","doi-asserted-by":"crossref","unstructured":"Takahashi, T., & Lee, W. (2007). An assessment of voip covert channel threats. In International conference on security and privacy in communications networks and the workshops-secure comm, (pp. 371\u2013380). IEEE.","DOI":"10.1109\/SECCOM.2007.4550357"},{"key":"2312_CR8","unstructured":"Xu, T., & Yang, Z. (2009). Simple and effective speech steganography in g.723.1 low-rate codes. In  International conference on wireless communications and signal processing, (pp. 1\u20134). IEEE."},{"key":"2312_CR9","unstructured":"Crandall, R. (1998). Some notes on steganography. Posted on steganography mailing list, pp. 1-6."},{"key":"2312_CR10","doi-asserted-by":"crossref","unstructured":"Westfeld, A. (2001) F5a steganographic algorithm. InInternational workshop on information hiding, (pp. 289\u2013302)New York: Springer.","DOI":"10.1007\/3-540-45496-9_21"},{"key":"2312_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.sigpro.2015.05.001","volume":"117","author":"H Tian","year":"2015","unstructured":"Tian, H., Qin, J., Huang, Y., Chen, Y., Wang, T., Liu, J., et al. (2015). Optimal matrix embedding for voice-over-ip steganography. Signal Processing, 117, 33\u201343.","journal-title":"Signal Processing"},{"key":"2312_CR12","doi-asserted-by":"crossref","unstructured":"Mehic, M., lachta, J. & Voznak, M.(2015). Hiding data in sip session. In International conference on telecommunications and signal processing (TSP), (pp. 1\u20135) IEEE.","DOI":"10.1109\/TSP.2015.7296445"},{"key":"2312_CR13","doi-asserted-by":"crossref","unstructured":"Arackaparambil, C., Yan, G., Bratus, S., & Caglayan, A. (2012). On tuning the knobs of distribution-based methods for detecting voip covert channels. In Hawaii international conference on system sciences, (pp. 2431\u20132440) IEEE.","DOI":"10.1109\/HICSS.2012.456"},{"key":"2312_CR14","unstructured":"Mazurczyk, W., & Szczypiorski, K. (2008). Covert channels in sip for voip signalling. In International Conference on Global e-Security, (pp. 65\u201372). New York: Springer."},{"key":"2312_CR15","doi-asserted-by":"publisher","first-page":"9292","DOI":"10.1109\/ACCESS.2018.2802783","volume":"6","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Tan, Y., Liang, C., Li, Y., & Li, J. (2018). A covert channel over volte via adjusting silence periods. Access, 6, 9292\u20139302. IEEE.","journal-title":"Access"},{"key":"2312_CR16","unstructured":"Kundur, D., & Ahsan, K. (2003). Practical internet steganography: data hiding in IP. In Proc. Texas wksp. Security of information systems."},{"key":"2312_CR17","unstructured":"Servetto, S. D., & Vetterli, M. (2001). Communication using phantoms:covert channels in the internet. In International symposium on information theory (IEEE Cat. No. 01CH37252), (p. 229). IEEE."},{"issue":"2\u20133","key":"2312_CR18","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s11235-009-9245-y","volume":"45","author":"W Mazurczyk","year":"2010","unstructured":"Mazurczyk, W., & Lubacz, J. (2010). Lacka voip steganographic method. Telecommunication Systems, 45(2\u20133), 153\u2013163.","journal-title":"Telecommunication Systems"},{"key":"2312_CR19","unstructured":"Neal, H., & ElAarag, H. (2015). A reliable covert communication scheme based on VoIP steganography. In Transactions on data hiding and multimedia security, (pp. 55\u201368) New York: Springer."},{"key":"2312_CR20","doi-asserted-by":"crossref","unstructured":"Neal, H., & ElAarag, H. (2012). A packet loss tolerant algorithm for information hiding in voice over IP. In Proceedings of IEEE Southeastcon,(pp. 1\u20136). IEEE.","DOI":"10.1109\/SECon.2012.6196945"},{"issue":"4","key":"2312_CR21","first-page":"54","volume":"12","author":"Y Jiang","year":"2016","unstructured":"Jiang, Y., Tang, S., Zhang, L., Xiong, M., & Yip, Y. J. (2016). Covert voice over Internet protocol communications with packet loss based on fractal interpolation. Transactions on Multimedia Computing, Communications and Applications (TOMM), 12(4), 54. ACM.","journal-title":"Transactions on Multimedia Computing, Communications and Applications (TOMM)"},{"issue":"2","key":"2312_CR22","first-page":"20","volume":"46","author":"W Mazurczyk","year":"2013","unstructured":"Mazurczyk, W. (2013). Voip steganography and its detectiona survey. Computing Surveys (CSUR), 46(2), 20. ACM.","journal-title":"Computing Surveys (CSUR)"},{"issue":"6","key":"2312_CR23","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1109\/TIFS.2012.2218599","volume":"7","author":"Y Huang","year":"2012","unstructured":"Huang, Y., Liu, C., Tang, S., & Bai, S. (2012). Steganography integration into a low-bit rate speech codec. Transactions on Information Forensics and Security, 7(6), 1865\u20131875. IEEE.","journal-title":"Transactions on Information Forensics and Security"},{"key":"2312_CR24","doi-asserted-by":"crossref","unstructured":"Hamdaqa, M., & Tahvildari, L. (2011). Relack: a reliable voip steganography approach. In International conference on secure software integration and reliability improvement (SSIRI), (pp. 189\u2013197). IEEE.","DOI":"10.1109\/SSIRI.2011.24"},{"issue":"12","key":"2312_CR25","doi-asserted-by":"publisher","first-page":"1394","DOI":"10.1002\/sec.502","volume":"5","author":"W Mazurczyk","year":"2012","unstructured":"Mazurczyk, W. (2012). Lost audio packets steganography: the first practical evaluation. Security and Communication Networks, 5(12), 1394\u20131403.","journal-title":"Security and Communication Networks"},{"key":"2312_CR26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in digital media: principles, algorithms, and applications","author":"J Fridrich","year":"2009","unstructured":"Fridrich, J. (2009). Steganography in digital media: principles, algorithms, and applications. Cambridge: Cambridge University Press."},{"key":"2312_CR27","unstructured":"\u201cLinphone open source voip project,\u201d http:\/\/www.linphone.org\/, Accessed: (2019)."},{"key":"2312_CR28","unstructured":"\u201cTIMIT acoustic-phonetic continuous speech corpus,\u201d https:\/\/catalog.ldc.upenn.edu\/LDC93S1."},{"key":"2312_CR29","unstructured":"\u201cITU-T recommendation P.862 perceptual evaluation of speech quality (PESQ),\u201d ITU-T, Feb. (2001)."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02312-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-020-02312-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02312-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,26]],"date-time":"2021-03-26T01:02:05Z","timestamp":1616720525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-020-02312-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,26]]},"references-count":29,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["2312"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02312-4","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,26]]},"assertion":[{"value":"26 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}