{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:32Z","timestamp":1750306832210,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,3,3]],"date-time":"2014-03-03T00:00:00Z","timestamp":1393804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,3,3]]},"DOI":"10.1145\/2557547.2557567","type":"proceedings-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T13:21:11Z","timestamp":1393334471000},"page":"345-356","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Wiretap-proof"],"prefix":"10.1145","author":[{"given":"Hemant","family":"Sengar","sequence":"first","affiliation":[{"name":"VoDaSec Solutions, Fairfax, VA, USA"}]},{"given":"Haining","family":"Wang","sequence":"additional","affiliation":[{"name":"College of William and Mary, Williamsburg, VA, USA"}]},{"given":"Seyed Amir","family":"Iranmanesh","sequence":"additional","affiliation":[{"name":"College of William and Mary, Williamsburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Website http:\/\/peers.sourceforge.net\/","author":"Softphone Peers","year":"2013","unstructured":"Peers Softphone . Website http:\/\/peers.sourceforge.net\/ , 2013 . Peers Softphone. Website http:\/\/peers.sourceforge.net\/, 2013."},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/www.spychecker.com\/program\/stools.html","author":"Website Tools","year":"2013","unstructured":"S- Tools 4.0. Website , http:\/\/www.spychecker.com\/program\/stools.html , 2013 . S-Tools 4.0. Website, http:\/\/www.spychecker.com\/program\/stools.html, 2013."},{"volume-title":"http:\/\/steghide.sourceforge.net\/","year":"2013","key":"e_1_3_2_1_3_1","unstructured":"Steghide. Website , http:\/\/steghide.sourceforge.net\/ , 2013 . Steghide. Website, http:\/\/steghide.sourceforge.net\/, 2013."},{"key":"e_1_3_2_1_4_1","volume-title":"http:\/\/www.voiceage.com\/openinit_g729.php","author":"Website VoiceAge","year":"2013","unstructured":"VoiceAge - Open G.729. Website , http:\/\/www.voiceage.com\/openinit_g729.php , 2013 . VoiceAge - Open G.729. Website, http:\/\/www.voiceage.com\/openinit_g729.php, 2013."},{"key":"e_1_3_2_1_5_1","volume-title":"NDSS","author":"Bates A.","year":"2012","unstructured":"A. Bates , K. Butler , M. Sherr , C. Shields , and P. T. M. Blaze . Accountable Wiretapping -or- I know they can hear you now . In NDSS , 2012 . A. Bates, K. Butler, M. Sherr, C. Shields, and P. T. M. Blaze. Accountable Wiretapping -or- I know they can hear you now. In NDSS, 2012."},{"key":"e_1_3_2_1_6_1","unstructured":"D. McCullagh. Bin Laden: Steganography Master? Website http:\/\/www.wired.com\/politics\/law\/news\/2001\/02\/41658?currentPage=all 2012.  D. McCullagh. Bin Laden: Steganography Master? Website http:\/\/www.wired.com\/politics\/law\/news\/2001\/02\/41658?currentPage=all 2012."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.833869"},{"key":"e_1_3_2_1_8_1","unstructured":"Fabien Petitcolas. mp3stego. Website http:\/\/www.petitcolas.net\/fabien\/steganography\/mp3stego\/ 2013.  Fabien Petitcolas. mp3stego. Website http:\/\/www.petitcolas.net\/fabien\/steganography\/mp3stego\/ 2013."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/93.959097"},{"key":"e_1_3_2_1_10_1","unstructured":"Gary C. Kessler. Steganography: Hiding Data Within Data. Website http:\/\/www.garykessler.net\/library\/steganography.html 2012.  Gary C. Kessler. Steganography: Hiding Data Within Data. Website http:\/\/www.garykessler.net\/library\/steganography.html 2012."},{"key":"e_1_3_2_1_11_1","unstructured":"Heinz Repp. Hide4PGP.Website http:\/\/www.heinz-repp.onlinehome.de\/Hide4PGP.htm.  Heinz Repp. Hide4PGP.Website http:\/\/www.heinz-repp.onlinehome.de\/Hide4PGP.htm."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108649"},{"key":"e_1_3_2_1_13_1","volume-title":"Steganography of VoIP streams. CoRR, abs\/0805.2938","author":"Mazurczyk W.","year":"2008","unstructured":"W. Mazurczyk and K. Szczypiorski . Steganography of VoIP streams. CoRR, abs\/0805.2938 , 2008 . W. Mazurczyk and K. Szczypiorski. Steganography of VoIP streams. CoRR, abs\/0805.2938, 2008."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203220"},{"key":"e_1_3_2_1_15_1","volume-title":"SIP: Session Initiation Protocol. RFC 3261","author":"Rosenberg J.","year":"2002","unstructured":"J. Rosenberg , H. Schulzrinne , G. Camarillo , A. Johnston , J. Peterson , R. Sparks , M. Handley , and E. Schooler . SIP: Session Initiation Protocol. RFC 3261 , IETF Network Working Group , 2002 . J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler. SIP: Session Initiation Protocol. RFC 3261, IETF Network Working Group, 2002."},{"key":"e_1_3_2_1_16_1","unstructured":"|)ruid. DEFCON 15: Real-time Steganography with RTP. Website http:\/\/www.youtube.com\/watch?v=boTZ0ZAcF5I.  |)ruid. DEFCON 15: Real-time Steganography with RTP. Website http:\/\/www.youtube.com\/watch?v=boTZ0ZAcF5I."},{"key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653724"},{"key":"e_1_3_2_1_19_1","first-page":"497","volume-title":"LLRT Based Detection of LSB Hiding. In In Proceedings of ICIP","author":"Sullivan K.","year":"2003","unstructured":"K. Sullivan , O. Dabeer , U. Madhow , B. Manjunath , S. Chandrasekaran , and S. Chandrasekeran . LLRT Based Detection of LSB Hiding. In In Proceedings of ICIP , pages 497 -- 500 , 2003 . K. Sullivan, O. Dabeer, U. Madhow, B. Manjunath, S. Chandrasekaran, and S. Chandrasekeran. LLRT Based Detection of LSB Hiding. In In Proceedings of ICIP, pages 497--500, 2003."},{"key":"e_1_3_2_1_20_1","unstructured":"T. Mogg . Anonymous hacks call between FBI and Scotland Yard about hackers. Website http:\/\/www.digitaltrends.com\/international\/anonymous-hacks-call-between-fbi-and-scotland-yard-about-hackers 2012.  T. Mogg . Anonymous hacks call between FBI and Scotland Yard about hackers. Website http:\/\/www.digitaltrends.com\/international\/anonymous-hacks-call-between-fbi-and-scotland-yard-about-hackers 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550357"},{"key":"e_1_3_2_1_22_1","unstructured":"The Bots. The George W. Bush Public Domain Audio Archive. Website http:\/\/www.thebots.net\/GWBushSampleArchive.htm 2012.  The Bots. The George W. Bush Public Domain Audio Archive. Website http:\/\/www.thebots.net\/GWBushSampleArchive.htm 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1337689.1338249"},{"key":"e_1_3_2_1_24_1","first-page":"61","volume-title":"Information Hiding","author":"Westfeld A.","year":"1999","unstructured":"A. Westfeld and A. Pfitzmann . Attacks on Steganographic Systems . In Information Hiding , pages 61 -- 76 , 1999 . A. Westfeld and A. Pfitzmann. Attacks on Steganographic Systems. In Information Hiding, pages 61--76, 1999."},{"key":"e_1_3_2_1_25_1","volume-title":"http:\/\/en.wikipedia.org\/wiki\/Communications_Assistance_for_Law_Enforcement_Act","author":"Website A.","year":"2013","unstructured":"Wikipedia. CALE A. Website , http:\/\/en.wikipedia.org\/wiki\/Communications_Assistance_for_Law_Enforcement_Act , 2013 . Wikipedia. CALEA.Website, http:\/\/en.wikipedia.org\/wiki\/Communications_Assistance_for_Law_Enforcement_Act, 2013."},{"key":"e_1_3_2_1_26_1","unstructured":"Wikipedia. Greek wiretapping case. Website http:\/\/en.wikipedia.org\/wiki\/Greek_wiretapping_case_2004%E2%80%932005 2013.  Wikipedia. Greek wiretapping case. Website http:\/\/en.wikipedia.org\/wiki\/Greek_wiretapping_case_2004%E2%80%932005 2013."},{"key":"e_1_3_2_1_27_1","volume-title":"http:\/\/en.wikipedia.org\/wiki\/PESQ","author":"Website PESQ.","year":"2013","unstructured":"Wikipedia. PESQ. Website , http:\/\/en.wikipedia.org\/wiki\/PESQ , 2013 . Wikipedia. PESQ. Website, http:\/\/en.wikipedia.org\/wiki\/PESQ, 2013."},{"key":"e_1_3_2_1_28_1","volume-title":"http:\/\/en.wikipedia.org\/wiki\/Raj_Rajaratnam","author":"Rajaratnam Raj","year":"2013","unstructured":"Wikipedia. Raj Rajaratnam . Website , http:\/\/en.wikipedia.org\/wiki\/Raj_Rajaratnam , 2013 . Wikipedia. Raj Rajaratnam. Website, http:\/\/en.wikipedia.org\/wiki\/Raj_Rajaratnam, 2013."},{"key":"e_1_3_2_1_29_1","volume-title":"http:\/\/en.wikipedia.org\/wiki\/Rod_Blagojevich","author":"Blagojevich Rod","year":"2013","unstructured":"Wikipedia. Rod Blagojevich . Website , http:\/\/en.wikipedia.org\/wiki\/Rod_Blagojevich , 2013 . Wikipedia. Rod Blagojevich. Website, http:\/\/en.wikipedia.org\/wiki\/Rod_Blagojevich, 2013."},{"volume-title":"http:\/\/en.wikipedia.org\/wiki\/Steganography","year":"2013","key":"e_1_3_2_1_30_1","unstructured":"Wikipedia. Steganography. Website , http:\/\/en.wikipedia.org\/wiki\/Steganography , 2013 . Wikipedia. Steganography. Website, http:\/\/en.wikipedia.org\/wiki\/Steganography, 2013."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.21"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880029"}],"event":{"name":"CODASPY'14: Fourth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio Texas USA","acronym":"CODASPY'14"},"container-title":["Proceedings of the 4th ACM conference on Data and application security and privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557567","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557547.2557567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:50Z","timestamp":1750234190000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557567"}},"subtitle":["what they hear is not what you speak, and what you speak they do not hear"],"short-title":[],"issued":{"date-parts":[[2014,3,3]]},"references-count":32,"alternative-id":["10.1145\/2557547.2557567","10.1145\/2557547"],"URL":"https:\/\/doi.org\/10.1145\/2557547.2557567","relation":{},"subject":[],"published":{"date-parts":[[2014,3,3]]},"assertion":[{"value":"2014-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}