{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:34:34Z","timestamp":1762868074100,"version":"3.37.3"},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1933108"],"award-info":[{"award-number":["U1933108"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin City","doi-asserted-by":"publisher","award":["17JCZDJC30900"],"award-info":[{"award-number":["17JCZDJC30900"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010882","name":"Tianjin Municipal Education Commission","doi-asserted-by":"publisher","award":["2019KJ117"],"award-info":[{"award-number":["2019KJ117"]}],"id":[{"id":"10.13039\/501100010882","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012429","name":"Central Universities in China","doi-asserted-by":"publisher","award":["3122018D007","3122018C003"],"award-info":[{"award-number":["3122018D007","3122018C003"]}],"id":[{"id":"10.13039\/501100012429","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2970194","type":"journal-article","created":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T21:53:07Z","timestamp":1580334787000},"page":"23308-23316","source":"Crossref","is-referenced-by-count":8,"title":["Adaptive Speech Information Hiding Method Based on K-Means"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0691-1767","authenticated-orcid":false,"given":"Zhijun","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1703-0970","authenticated-orcid":false,"given":"Rong","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2236-9266","authenticated-orcid":false,"given":"Changliang","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2008.174"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962657"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198737"},{"key":"ref13","first-page":"297","article-title":"Efficient Least-significant-bits Steganography for VoIP","volume":"4","author":"liu","year":"2012","journal-title":"Int J Adv Comput Technol"},{"key":"ref14","first-page":"2735","article-title":"Adaptive voice-over-IP steganography based on quantitative performance ranking","volume":"44","author":"tian","year":"2016","journal-title":"ACTA Electron Sinica"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11771-010-0633-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2218599"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/APSIPA.2018.8659509"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4860-1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2905760"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11771-014-2459-5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1224-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108649"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2659718"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2015.01.026"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CESA.2006.4281615"},{"key":"ref2","first-page":"711","article-title":"A novel covert timing channel based on RTP\/RTCP","volume":"21","author":"ying","year":"2012","journal-title":"Chin J Electron"},{"key":"ref1","first-page":"2470","article-title":"Key issues in networks covert channel: A research survey","volume":"30","author":"li","year":"2019","journal-title":"J Softw"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2015.14"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ViTECoN.2019.8899667"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2017.8359834"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2014.75"},{"key":"ref23","first-page":"174","article-title":"Adaptive layered image steganography algorithm based on complexity","volume":"38","author":"wu","year":"2018","journal-title":"J Comput Appl"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08974234.pdf?arnumber=8974234","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:56:07Z","timestamp":1642002967000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8974234\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2970194","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}