{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:06:37Z","timestamp":1745467597751,"version":"3.40.4"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:00:00Z","timestamp":1742947200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:00:00Z","timestamp":1742947200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,26]]},"DOI":"10.1109\/icit63637.2025.10965294","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T17:38:10Z","timestamp":1745343490000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Comparative Analysis of Steganographic Methods for Covert Embedding Information into Speech Signals"],"prefix":"10.1109","author":[{"given":"Mishina","family":"Olga","sequence":"first","affiliation":[{"name":"School of Electronics and Information Engineering, Harbin Institute of Technology,Harbin,China"}]},{"given":"Yaqin","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Harbin Institute of Technology,Harbin,China"}]},{"given":"Longwen","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Harbin Institute of Technology,Harbin,China"}]},{"given":"Liang","family":"Zhao","sequence":"additional","affiliation":[{"name":"Institute of Industrial and Electrical Testing, China Railway Harbin Group Co. Ltd,Harbin,China"}]},{"given":"Chentong","family":"Wu","sequence":"additional","affiliation":[{"name":"14th Research Institute, China Electronics Technology Group Corporation,Nanjing,China"}]},{"given":"Dongming","family":"Luo","sequence":"additional","affiliation":[{"name":"Beijing Institute of Mechanical and Electrical Engineering,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.15514\/ISPRAS-2020-32(4)-11"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3022779"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.04.227"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.38197\/2072-2060-2020-223-3-551-556"},{"issue":"2 (260)","key":"ref5","first-page":"99","article-title":"Steganographic Transformation Method of Web Documents Based on Raster Graphics and RGB Model \/\/Proceedings of BSTU","author":"Saveleva","year":"2022","journal-title":"Series 3: Physical-Mathematical Sciences and Informatics"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.33581\/2520-6508-2021-3-68-83"},{"key":"ref7","first-page":"1","article-title":"Interpolation and Masking Effects of Heteroassociative Compressive Transformations","volume-title":"J. Phys.: Conf. Ser.","volume":"1902","author":"Dryuchenko","year":"2020"},{"issue":"2","key":"ref8","first-page":"230","article-title":"Forecasting Threats in Complex Distributed Systems Based on Intelligent Analysis of Large Data from Automated Monitoring Tools","author":"Palchevsky","year":"2021","journal-title":"Software Products and Systems"},{"issue":"6 (46)","key":"ref9","first-page":"113","article-title":"Classification of Ground Equipment by Acoustic Signal Based on Continuous Wavelet Transformation and Support Vector Method","author":"Yakovleva","year":"2020","journal-title":"Science Without Borders"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3022779"},{"issue":"12","key":"ref11","first-page":"2","article-title":"Detection of Primary Features of the Speech Signal","author":"Burachenok","year":"2020","journal-title":"Bulletin of Polotsk State University. Series C Fundamental"},{"issue":"4","key":"ref12","first-page":"565572","article-title":"Intelligent Gathering of Information from Distributed Sources","author":"Efimova","year":"2019","journal-title":"Software Products and Systems"},{"key":"ref13","first-page":"80","article-title":"System of Standards for Measuring the Quality of Modern Sound Equipment","volume-title":"SibSUTI","author":"Abrosimova","year":"2021"},{"issue":"1","key":"ref14","first-page":"80","article-title":"Hiding Information in Audio Signals Using Deterministic Chaos","author":"Shelukhin","year":"2021","journal-title":"High- Technology in Space Research of Earth"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105375"},{"key":"ref16","first-page":"1621","article-title":"Generative Steganography Network","volume-title":"MM\u201922: Proc 30th ACM Int Conf on Multimedia","author":"Ping","year":"2022"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3022779"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EIConRus49466.2020.9039155"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/icssit48917.2020.9214220"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2953504"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMANTIC.2019.8884266"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01385-0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918086"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5124364"},{"key":"ref25","first-page":"1","article-title":"LSB Data Hiding in Digital Media: A Survey","author":"Ninh","year":"2022","journal-title":"Industrial Networks and Intelligent Systems"},{"issue":"64","key":"ref26","first-page":"1","article-title":"A Method for Processing Watermarks of a Color Image Based on the Haar Wavelet","author":"Wang","year":"2019","journal-title":"J. Vis. Communications to Represent the Image"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.30898\/1684-1719.2019.5.10"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6444-0"},{"issue":"55","key":"ref29","doi-asserted-by":"crossref","first-page":"35","DOI":"10.17223\/20710410\/55\/3","article-title":"Steganalysis of Digital Images Using Deep Neural Networks and Heteroassociative Integral Transformations","author":"Dryuchenko","year":"2022","journal-title":"PDM"},{"key":"ref30","first-page":"312","article-title":"Heteroassociative Compressive Transformations of Digital Images and Their Interpolating and Masking Properties","volume-title":"Proceedings of the International ScientificTechnical Conference \u201cCurrent Problems of Applied Mathematics, Informatics and Mechanics","author":"Dryuchenko","year":"2020"},{"issue":"2","key":"ref31","first-page":"100","article-title":"Digital Filter Banks for Modern Sound Signal Processing Tasks","author":"Vashkevich","year":"2019","journal-title":"Reports of BSUIR"},{"issue":"6","key":"ref32","first-page":"14","article-title":"Study on the Applicability of DPF- Modulated Filter Banks in Systems with Significant Enhancement of Spectral Components","author":"Sanko","year":"2021","journal-title":"Reports of BSUIR"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.18413\/2518-1092-2021-6-4-0-6"},{"issue":"3","key":"ref34","first-page":"610","article-title":"On the Stability of Sub-band Hidden Data Embedding in Images Based on Sub-band Cosine Transform Matrices","author":"Chernomorets","year":"2021","journal-title":"Economics. Informatics"},{"key":"ref35","first-page":"309","article-title":"On Intelligent Information Technology for Hidden Data Encryption in Images","volume-title":"Proceedings of the VIII International Scientific and Technical Conference \u201cInformation Technologies in Science, Education and Production (ITNOP-2020)","author":"Chernomorets","year":"2020"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.18413\/2518-1092-2021-6-2-0-7"},{"issue":"3","key":"ref37","first-page":"36","article-title":"Increasing the Volume of Stealthily Embedded Data in Images","author":"Chernomorets","year":"2020","journal-title":"Bulletin of Voronezh Institute of MVD of Russia"},{"issue":"3 (12)","key":"ref38","first-page":"63","article-title":"On Subinterval Hidden Data Embedding in Images within the Cosine Conversion","author":"Chernomorets","year":"2020","journal-title":"Information Technologies. Problems and Solutions"},{"issue":"3 (55)","key":"ref39","first-page":"15","article-title":"On the Accuracy of Hidden Sub-band Data Embedding in Color Components of Images","author":"Chernomorets","year":"2021","journal-title":"Caspian Journal: Management and High Technologies"},{"issue":"3","key":"ref40","first-page":"85","article-title":"The Algorithm for Performing Frequency- Time Analysis of Signals Using Continuous Wavelet Transformation and the Periodogram Method and Its Implementation on a Graphics Processor","author":"Kozlov","year":"2021","journal-title":"Bulletin of VSTU."},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ElConRus51938.2021.9396291"},{"issue":"11","key":"ref42","first-page":"32","article-title":"Image Compression Method Based on Haar Wavelet Transform","author":"Lyasheva","year":"2020","journal-title":"StudNet"},{"issue":"2 (30)","key":"ref43","first-page":"3","article-title":"Use of Continuous Wavelet Transformation for Identifying Changes in the Carrier Frequency of Signals","author":"Makarov","year":"2021","journal-title":"Auditorium"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.17586\/2226-1494-2023-23-1-79-87"},{"issue":"1 (68)","key":"ref45","first-page":"139","article-title":"Identification of Single- Phase Earth Faults in 6-35 kV Networks Based on Wavelet Transformation","author":"Dolgikh","year":"2023","journal-title":"Bulletin of Southern Federal University"},{"issue":"2","key":"ref46","first-page":"3","article-title":"On the Need to Refine the Techniques for Assessing the Quality of Sound Paths by Applying Psychoacoustic Criteria","author":"Abrosimova","year":"2023","journal-title":"Bulletin of SibSUTI"},{"issue":"7 (59)","key":"ref47","first-page":"29","article-title":"Speech Coding","author":"Kuanyshov","year":"2020","journal-title":"Colloquium-journal"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.52254\/1857-0070.2021.4-52.11"},{"issue":"6","key":"ref49","first-page":"155","article-title":"Sound in Human-Machine Interaction Interfaces","author":"Nosulenko","year":"2020","journal-title":""},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.32743\/unitech.2023.115.10.16126"}],"event":{"name":"2025 IEEE International Conference on Industrial Technology (ICIT)","start":{"date-parts":[[2025,3,26]]},"location":"Wuhan, China","end":{"date-parts":[[2025,3,28]]}},"container-title":["2025 IEEE International Conference on Industrial Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10965190\/10965119\/10965294.pdf?arnumber=10965294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T05:10:27Z","timestamp":1745385027000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10965294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,26]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/icit63637.2025.10965294","relation":{},"subject":[],"published":{"date-parts":[[2025,3,26]]}}}