{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:51:18Z","timestamp":1766137878070,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,11,27]],"date-time":"2021-11-27T00:00:00Z","timestamp":1637971200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,11,27]],"date-time":"2021-11-27T00:00:00Z","timestamp":1637971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100008111","name":"Hainan Provincial Department of Science and Technology","doi-asserted-by":"publisher","award":["ZDKJ2020010"],"award-info":[{"award-number":["ZDKJ2020010"]}],"id":[{"id":"10.13039\/501100008111","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s12652-021-03608-9","type":"journal-article","created":{"date-parts":[[2021,11,27]],"date-time":"2021-11-27T05:03:29Z","timestamp":1637989409000},"page":"8421-8431","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Frame-level steganalysis of QIM steganography in compressed speech based on multi-dimensional perspective of codeword correlations"],"prefix":"10.1007","volume":"14","author":[{"given":"Miao","family":"Wei","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7243-5159","authenticated-orcid":false,"given":"Songbin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yongfeng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Qiandong","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Jingang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,27]]},"reference":[{"key":"3608_CR1","doi-asserted-by":"publisher","unstructured":"Aoki N (2010) A semi-lossless steganography technique for G.711 telephony speech. In: Proceedings\u20142010 6th international conference on intelligent information hiding and multimedia signal processing, IIHMSP, pp 534\u2013537, https:\/\/doi.org\/10.1109\/IIHMSP.2010.136","DOI":"10.1109\/IIHMSP.2010.136"},{"issue":"9","key":"3608_CR2","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/35.620527","volume":"35","author":"A Benyassine","year":"1997","unstructured":"Benyassine A, Shlomot E, Su H, Massaloux D, Lamblin C, Petit J (1997) Itu-t recommendation g.729 annex b: a silence compression scheme for use with g.729 optimized for v.70 digital simultaneous voice and data applications. IEEE Commun Mag 35(9):64\u201373. https:\/\/doi.org\/10.1109\/35.620527","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"3608_CR3","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen B, Wornell G (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423\u20131443. https:\/\/doi.org\/10.1109\/18.923725","journal-title":"IEEE Trans Inf Theory"},{"key":"3608_CR4","doi-asserted-by":"publisher","unstructured":"Chen B, Luo W, Li H (2017) Audio steganalysis with convolutional neural network. In: IH and MMSec 2017\u2014proceedings of the 2017 ACM workshop on information hiding and multimedia security, ACM Press, New York, USA, pp 85\u201390, https:\/\/doi.org\/10.1145\/3082031.3083234, http:\/\/dl.acm.org\/citation.cfm?doid=3082031.3083234","DOI":"10.1145\/3082031.3083234"},{"key":"3608_CR5","doi-asserted-by":"crossref","unstructured":"Chollet F (2017) Xception: deep learning with depthwise separable convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR)","DOI":"10.1109\/CVPR.2017.195"},{"key":"3608_CR6","doi-asserted-by":"publisher","unstructured":"Gers F, Schmidhuber J, Cummins F (1999) Learning to forget: Continual prediction with LSTM. IEE conference publication, IEE, Vol. 2, pp. 850\u2013855. https:\/\/doi.org\/10.1049\/cp:19991218","DOI":"10.1049\/cp:19991218"},{"key":"3608_CR7","doi-asserted-by":"crossref","unstructured":"Gong C, Yi X, Zhao X, Ma Y (2019) Recurrent convolutional neural networks for AMR steganalysis based on pulse position. In: IH and MMSec 2019\u2014proceedings of the ACM workshop on information hiding and multimedia security, association for computing machinery, Inc, New York, NY, USA, pp 2\u201313, https:\/\/dl.acm.org\/doi\/10.1145\/3335203.3335708","DOI":"10.1145\/3335203.3335708"},{"key":"3608_CR8","doi-asserted-by":"publisher","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE conference on computer vision and pattern recognition (CVPR), pp 770\u2013778, https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"3608_CR9","doi-asserted-by":"publisher","unstructured":"Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inf Secur https:\/\/doi.org\/10.1186\/1687-417X-2014-1","DOI":"10.1186\/1687-417X-2014-1"},{"key":"3608_CR10","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Albanie S, Sun G, Wu E (2017) Squeeze-and-excitation networks. 1709.01507","DOI":"10.1109\/CVPR.2018.00745"},{"key":"3608_CR11","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.neucom.2020.08.002","volume":"419","author":"Y Hu","year":"2021","unstructured":"Hu Y, Huang Y, Yang Z, Huang Y (2021) Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams. Neurocomputing 419:70\u201379. https:\/\/doi.org\/10.1016\/j.neucom.2020.08.002","journal-title":"Neurocomputing"},{"issue":"C","key":"3608_CR12","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.sigpro.2016.04.005","volume":"128","author":"G Hua","year":"2016","unstructured":"Hua G, Huang J, Shi Y, Goh J, Thing V (2016) Twenty years of digital audio watermarking-a comprehensive review. Signal Process 128(C):222\u2013242","journal-title":"Signal Process"},{"key":"3608_CR13","doi-asserted-by":"publisher","unstructured":"Huang Y, Xiao B, Xiao H (2008) Implementation of covert communication based on steganography. In: Proceedings\u20142008 4th international conference on intelligent information hiding and multimedia signal processing, IIH-MSP 2008, pp 1512\u20131515, https:\/\/doi.org\/10.1109\/IIH-MSP.2008.174","DOI":"10.1109\/IIH-MSP.2008.174"},{"issue":"7","key":"3608_CR14","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1049\/iet-com.2010.0348","volume":"5","author":"Y Huang","year":"2011","unstructured":"Huang Y, Tang S, Zhang Y (2011) Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis. IET Commun 5(7):929\u2013936. https:\/\/doi.org\/10.1049\/iet-com.2010.0348","journal-title":"IET Commun"},{"issue":"6","key":"3608_CR15","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1109\/TIFS.2012.2218599","volume":"7","author":"Y Huang","year":"2012","unstructured":"Huang Y, Liu C, Tang S, Bai S (2012) Steganography integration into a low-bit rate speech codec. IEEE Trans Inf Forensics Secur 7(6):1865\u20131875. https:\/\/doi.org\/10.1109\/TIFS.2012.2218599","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"3608_CR16","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1007\/s11431-016-0707-3","volume":"60","author":"Y Huang","year":"2017","unstructured":"Huang Y, Tao H, Xiao B, Chang C (2017) Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys. Sci China Technol Sci 60(10):1585\u20131596. https:\/\/doi.org\/10.1007\/s11431-016-0707-3","journal-title":"Sci China Technol Sci"},{"issue":"4","key":"3608_CR17","doi-asserted-by":"publisher","first-page":"352","DOI":"10.4992\/jjpsy.80.352","volume":"80","author":"G Kazuhiro","year":"2009","unstructured":"Kazuhiro G (2009) global and local processing in vision: perspectives from comparative cognition. Shinrigaku Kenkyu Jpn J Psychol 80(4):352","journal-title":"Shinrigaku Kenkyu Jpn J Psychol"},{"issue":"1","key":"3608_CR18","first-page":"141","volume":"26","author":"M Kim","year":"2020","unstructured":"Kim M, Kim J, Shin M (2020) Word embedding based knowledge representation with extracting relationship between scientific terminologies. Intell Autom Soft Comput 26(1):141\u2013147","journal-title":"Intell Autom Soft Comput"},{"issue":"7","key":"3608_CR19","doi-asserted-by":"publisher","first-page":"1854","DOI":"10.1109\/TIFS.2018.2806741","volume":"13","author":"Z Lin","year":"2018","unstructured":"Lin Z, Huang Y, Wang J (2018) RNN-SM: fast steganalysis of VoIP streams using recurrent neural network. IEEE Trans Inf Forensics Secur 13(7):1854\u20131868. https:\/\/doi.org\/10.1109\/TIFS.2018.2806741","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3608_CR20","doi-asserted-by":"publisher","unstructured":"Liu L, Li M, Li Q, Liang Y (2008) Perceptually transparent information hiding in G.729 bitstream. In: Proceedings\u20142008 4th international conference on intelligent information hiding and multimedia signal processing, IIH-MSP 2008, pp. 406\u2013409, https:\/\/doi.org\/10.1109\/IIH-MSP.2008.297","DOI":"10.1109\/IIH-MSP.2008.297"},{"key":"3608_CR21","doi-asserted-by":"publisher","unstructured":"Munoz R, David O, Ponomaryov V, Reyes R, Cruz C, Ponomaryov D (2019) Steganographic framework for hiding a color image into digital images. In: 2019 IEEE international scientific-practical conference: problems of infocommunications science and technology, PIC S and T 2019\u2014proceedings, Institute of Electrical and Electronics Engineers Inc., pp. 63\u201366, https:\/\/doi.org\/10.1109\/PICST47496.2019.9061223","DOI":"10.1109\/PICST47496.2019.9061223"},{"issue":"3","key":"3608_CR22","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/0010-0285(77)90012-3","volume":"9","author":"D Navon","year":"1977","unstructured":"Navon D (1977) Forest before trees: the precedence of global features in visual perception. Cogn Psychol 9(3):353\u2013383. https:\/\/doi.org\/10.1016\/0010-0285(77)90012-3","journal-title":"Cogn Psychol"},{"issue":"10","key":"3608_CR23","doi-asserted-by":"publisher","first-page":"12095","DOI":"10.1007\/s11042-017-4860-1","volume":"77","author":"Y Ren","year":"2018","unstructured":"Ren Y, Wu H, Wang L (2018) An AMR adaptive steganography algorithm based on minimizing distortion. Multimed Tools Appl 77(10):12095\u201312110. https:\/\/doi.org\/10.1007\/s11042-017-4860-1","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"3608_CR24","doi-asserted-by":"publisher","first-page":"2649","DOI":"10.1109\/TIFS.2019.2905760","volume":"14","author":"Y Ren","year":"2019","unstructured":"Ren Y, Yang H, Wu H, Tu W, Wang L (2019) A secure AMR fixed codebook steganographic scheme based on pulse distribution model. IEEE Trans Inf Forensics Secur 14(10):2649\u20132661. https:\/\/doi.org\/10.1109\/TIFS.2019.2905760","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"17","key":"3608_CR25","doi-asserted-by":"publisher","first-page":"7063","DOI":"10.1007\/s11042-014-1952-z","volume":"74","author":"M Sadek","year":"2015","unstructured":"Sadek M, Khalifa A, Mostafa M (2015) Video steganography: a comprehensive review. Multimed Tools Appl 74(17):7063\u20137094","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"3608_CR26","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s00530-013-0302-8","volume":"20","author":"H Tian","year":"2014","unstructured":"Tian H, Liu J, Li S (2014) Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimed Syst 20(2):143\u2013154. https:\/\/doi.org\/10.1007\/s00530-013-0302-8","journal-title":"Multimed Syst"},{"key":"3608_CR27","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez A, Kaiser \u0141, Polosukhin I (2017) Attention is all you need. In: Guyon I, Luxburg UV, Bengio S, Wallach H, Fergus R, Vishwanathan S, Garnett R (eds) arXiv, Curran Associates, Inc., pp. 5998\u20136008, http:\/\/papers.nips.cc\/paper\/7181-attention-is-all-you-need.pdf"},{"key":"3608_CR28","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1109\/LSP.2021.3062233","volume":"28","author":"H Wu","year":"2021","unstructured":"Wu H, Yi B, Ding F, Feng G, Zhang X (2021) Linguistic steganalysis with graph neural networks. IEEE Signal Process Lett 28:558\u2013562. https:\/\/doi.org\/10.1109\/LSP.2021.3062233","journal-title":"IEEE Signal Process Lett"},{"key":"3608_CR29","doi-asserted-by":"crossref","unstructured":"Xiao B, Huang Y, Tang S (2008) An approach to information hiding in low bit-rate speech stream. In: IEEE GLOBECOM 2008\u20142008 IEEE global telecommunications conference, pp. 1\u20135","DOI":"10.1109\/GLOCOM.2008.ECP.375"},{"key":"3608_CR30","doi-asserted-by":"crossref","unstructured":"Yang H, Yang Z, Bao Y, Huang Y (2019) Hierarchical representation network for steganalysis of qim steganography in low-bit-rate speech signals. In: International conference on information and communications security, Springer, pp. 783\u2013798","DOI":"10.1007\/978-3-030-41579-2_45"},{"key":"3608_CR31","doi-asserted-by":"publisher","unstructured":"Yang H, Yang Z, Bao Y, Liu S, Huang Y (2020) Fcem: a novel fast correlation extract model for real time steganalysis of voip stream via multi-head attention. In: ICASSP 2020\u20142020 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp. 2822\u20132826, https:\/\/doi.org\/10.1109\/ICASSP40776.2020.9054361","DOI":"10.1109\/ICASSP40776.2020.9054361"},{"issue":"14","key":"3608_CR32","doi-asserted-by":"publisher","first-page":"18827","DOI":"10.1007\/s11042-017-5223-7","volume":"77","author":"H Zhao","year":"2018","unstructured":"Zhao H, Dai Q, Ren J, Wei W, Xiao Y, Li C (2018) Robust information hiding in low-resolution videos with quantization index modulation in DCT-CS domain. Multimed Tools Appl 77(14):18827\u201318847. https:\/\/doi.org\/10.1007\/s11042-017-5223-7","journal-title":"Multimed Tools Appl"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03608-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-021-03608-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03608-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T21:33:57Z","timestamp":1686087237000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-021-03608-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,27]]},"references-count":32,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["3608"],"URL":"https:\/\/doi.org\/10.1007\/s12652-021-03608-9","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2021,11,27]]},"assertion":[{"value":"21 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}