{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:33Z","timestamp":1750220193173,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61972168"],"award-info":[{"award-number":["No. 61972168"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1145\/3573942.3574196","type":"proceedings-article","created":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T23:45:42Z","timestamp":1684280742000},"page":"945-949","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Global-Local Representations Network for Speech Steganalysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9984-1883","authenticated-orcid":false,"given":"Shulong","family":"Xu","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, National Huaqiao University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1591-656X","authenticated-orcid":false,"given":"Hui","family":"Tian","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National Huaqiao University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0479-5384","authenticated-orcid":false,"given":"Hanyu","family":"Quan","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National Huaqiao University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2803-6203","authenticated-orcid":false,"given":"Jing","family":"Lu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National Huaqiao University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Geeta Sikka and Harsh K. Verma","author":"Malik Aruna","year":"2017","unstructured":"Aruna Malik, Geeta Sikka and Harsh K. Verma. 2017. A High Capacity Text Steganography Scheme Based on LZW Compression and Color Coding. Engineering Science and Technology, an International Journal 20, 1 (2017), 72-79."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.06.075"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-021-00763-z"},{"key":"e_1_3_2_1_4_1","volume-title":"Terrorist Use of the Internet: Information Operations in Cyberspace","author":"Catherine Theohary","year":"2011","unstructured":"Theohary and Catherine. 2011. Terrorist Use of the Internet: Information Operations in Cyberspace. Diane Publishing, 2011."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2543581.2543587"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2002.802005"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11431-015-5955-4"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21041032"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.375"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7080673"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2218599"},{"key":"e_1_3_2_1_12_1","first-page":"180","article-title":"A low-rate speech steganography based on pitch period prediction","volume":"06","author":"Yan Shufan","year":"2015","unstructured":"Shufan Yan, Guangming Tang and Yifeng Sun. 2015. A low-rate speech steganography based on pitch period prediction. Application Research of Computers, 06 (2015), 180-183.","journal-title":"Application Research of Computers"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"4005","DOI":"10.1109\/ICASSP.2008.4518532","volume-title":"2008 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE","author":"Bernd Geiser","year":"2008","unstructured":"Geiser Bernd, and Peter Vary. 2008. High rate data hiding in ACELP speech codecs. In 2008 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, Las Vegas, NV, USA, 4005-4008."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2012.05.003"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2806741"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2019.2961610"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3335203.3335708"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2021.3074752"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.08.002"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437880.3460404"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00406"}],"event":{"name":"AIPR 2022: 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","acronym":"AIPR 2022","location":"Xiamen China"},"container-title":["Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3574196","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573942.3574196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:33Z","timestamp":1750186953000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3574196"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":22,"alternative-id":["10.1145\/3573942.3574196","10.1145\/3573942"],"URL":"https:\/\/doi.org\/10.1145\/3573942.3574196","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"2023-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}