{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:02:37Z","timestamp":1760241757184,"version":"build-2065373602"},"reference-count":43,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2018,8,11]],"date-time":"2018-08-11T00:00:00Z","timestamp":1533945600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1536115","U1405254"],"award-info":[{"award-number":["U1536115","U1405254"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Fujian Province of China","award":["2018J01093"],"award-info":[{"award-number":["2018J01093"]}]},{"name":"Program for New Century Excellent Talents in Fujian Province University","award":["MJK2016-23"],"award-info":[{"award-number":["MJK2016-23"]}]},{"name":"Program for Outstanding Youth Scientific and Technological Talents in Fujian Province University","award":["MJK2015-54"],"award-info":[{"award-number":["MJK2015-54"]}]},{"name":"Promotion Program for Young and Middle-aged Teacher in Science &amp; Technology Research of Huaqiao University","award":["ZQN-PY115"],"award-info":[{"award-number":["ZQN-PY115"]}]},{"name":"Program for Science &amp; Technology Innovation Teams and Leading Talents of Huaqiao University","award":["2014KJTD13"],"award-info":[{"award-number":["2014KJTD13"]}]},{"DOI":"10.13039\/501100019335","name":"Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security","doi-asserted-by":"publisher","award":["AGK201710"],"award-info":[{"award-number":["AGK201710"]}],"id":[{"id":"10.13039\/501100019335","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Subsidized Project for Postgraduates\u2019 Innovative Fund in Scientific Research of Huaqiao University","award":["17013083007"],"award-info":[{"award-number":["17013083007"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>This paper concentrates on the detection of steganography in inactive frames of low bit rate audio streams in Voice over Internet Protocol (VoIP) scenarios. Both theoretical and experimental analyses demonstrate that the distribution of 0 and 1 in encoding parameter bits becomes symmetric after a steganographic process. Moreover, this symmetry affects the frequency of each subsequence of parameter bits, and accordingly changes the poker test statistical features of encoding parameter bits. Employing the poker test statistics of each type of encoding parameter bits as detection features, we present a steganalysis method based on a support vector machine. We evaluate the proposed method with a large quantity of speech samples encoded by G.723.1 and compare it with the entropy test. The experimental results show that the proposed method is effective, and largely outperforms the entropy test in any cases.<\/jats:p>","DOI":"10.3390\/sym10080336","type":"journal-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T11:27:13Z","timestamp":1534159633000},"page":"336","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test"],"prefix":"10.3390","volume":"10","author":[{"given":"Jie","family":"Liu","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, National Huaqiao University, Xiamen 361021, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1591-656X","authenticated-orcid":false,"given":"Hui","family":"Tian","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National Huaqiao University, Xiamen 361021, China"}]},{"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Information and Computer Science, Feng Chia University, Taichung 40724, Taiwan"}]},{"given":"Tian","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National Huaqiao University, Xiamen 361021, China"}]},{"given":"Yonghong","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National Huaqiao University, Xiamen 361021, China"}]},{"given":"Yiqiao","family":"Cai","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National Huaqiao University, Xiamen 361021, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,8,11]]},"reference":[{"key":"ref_1","first-page":"62","article-title":"Overview of digital audio steganography techniques","volume":"3","author":"Naidu","year":"2016","journal-title":"Int. J. Emerg. Technol. Eng."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Joshi, R., and Venugopala, P.S. (2017, January 17\u201319). Improved security in audio steganography using packet forger at the third level. Proceedings of the 2017 International Conference on Smart Technologies for Smart Nation (SMARTTECHCON), Bangalore, India.","DOI":"10.1109\/SmartTechCon.2017.8358397"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Liu, H., Liu, J., Hu, R., Yan, X., and Wan, S. (2017, January 26\u201328). Adaptive Audio Steganography Scheme Based on Wavelet Packet Energy. Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BIGDATASECURITY), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), Beijing, China.","DOI":"10.1109\/BigDataSecurity.2017.20"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Hussain, M., Wahab, A.W.A., Javed, N., and Jung, K.H. (2016). Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images. Symmetry, 8.","DOI":"10.3390\/sym8060041"},{"key":"ref_5","first-page":"593","article-title":"Chaotic Map Based Random Image Steganography Using LSB Technique","volume":"19","author":"Rajendran","year":"2017","journal-title":"Int. J. Netw. Secur."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1515\/eletel-2017-0061","article-title":"Least Significant Bit Steganography using Hitzl-Zele Chaotic Map","volume":"63","author":"Kordov","year":"2017","journal-title":"Int. J. Electron. Telecommun."},{"key":"ref_7","first-page":"845","article-title":"Least significant bit image steganography bit image steganography algorithm based on chaotic rotation equations","volume":"69","author":"Stoyanov","year":"2016","journal-title":"Mathematiques"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1271","DOI":"10.1007\/s11071-015-1943-2","article-title":"A cycling chaos-based cryptic-free algorithm for image steganography","volume":"80","author":"Aziz","year":"2015","journal-title":"Nonlinear Dyn."},{"key":"ref_9","first-page":"170","article-title":"A Comparative Study on Steganography Digital Images: A Case Study of Scalable Vector Graphics (SVG) and Portable Network Graphics (PNG) Images Formats","volume":"9","author":"Almutairi","year":"2018","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Mondal, B., Sinha, N., and Mandal, T. (2016, January 23\u201325). A Secure Image Encryption Algorithm Using LFSR and RC4 Key Stream Generator. Proceedings of the 3rd International Conference on Advanced Computing, Networking and Informatics, Bhubaneswar, India.","DOI":"10.1007\/978-81-322-2538-6_24"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.icte.2018.01.003","article-title":"Improved chaos-based video steganography using DNA alphabets","volume":"4","author":"Kar","year":"2018","journal-title":"ICT Express"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.protcy.2013.12.345","article-title":"Optimized video steganography using genetic algorithm (GA)","volume":"10","author":"Dasgupta","year":"2013","journal-title":"Procedia Technol."},{"key":"ref_13","first-page":"183","article-title":"Using Circle Map for Audio Encryption Algorithm","volume":"2","author":"Kordov","year":"2017","journal-title":"Math. Softw. Eng."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Bashir, Z., W\u0105tr\u00f3bski, J., Rashid, T., Zafar, S., and Sa\u0142abun, W. (2017). Chaotic Dynamical State Variables Selection Procedure Based Image Encryption Scheme. Symmetry, 9.","DOI":"10.3390\/sym9120312"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/2543581.2543587","article-title":"VoIP steganography and its Detection\u2014A survey","volume":"46","author":"Mazurczyk","year":"2013","journal-title":"ACM Comput. Surv."},{"key":"ref_16","first-page":"65","article-title":"Covert Channels in SIP for VoIP Signalling","volume":"12","author":"Mazurczyk","year":"2008","journal-title":"Commun. Comput. Inf. Sci."},{"key":"ref_17","unstructured":"Forbes, C.R. (2009). A New Covert Channel over RTP. [Master\u2019s Thesis, Rochester Institute of Technology]."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Geiser, B., and Vary, P. (April, January 31). High rate data hiding in ACELP speech codecs. Proceedings of the 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, USA.","DOI":"10.1109\/ICASSP.2008.4518532"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1490","DOI":"10.1016\/j.compeleceng.2012.05.003","article-title":"A new scheme for covert communication via 3G encoded speech","volume":"38","author":"Miao","year":"2012","journal-title":"Comput. Electr. Eng."},{"key":"ref_20","unstructured":"Zhijun, W., and Yongpeng, S. (2016, January 14\u201317). An implementation of speech steganography for iLBC by using fixed codebook. Proceedings of the 2016 2nd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2837","DOI":"10.1007\/s11042-016-3257-x","article-title":"Steganography integrated into linear predictive coding for low bit-rate speech codec","volume":"76","author":"Liu","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1007\/s00530-015-0500-7","article-title":"Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec","volume":"23","author":"Liu","year":"2017","journal-title":"Multimed. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s00530-013-0302-8","article-title":"Improving security of quantization-index-modulation steganography in low bit-rate speech streams","volume":"20","author":"Tian","year":"2014","journal-title":"Multimed. Syst."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Nishimura, A. (2009, January 12\u201314). Data Hiding in Pitch Delay Data of the Adaptive Multi-Rate Narrow-band Speech Codec. Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kyoto, Japan.","DOI":"10.1109\/IIH-MSP.2009.83"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1865","DOI":"10.1109\/TIFS.2012.2218599","article-title":"Steganography integration into a low-bit rate speech codec","volume":"7","author":"Huang","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1049\/el:20030993","article-title":"ABS-based speech information hiding approach","volume":"39","author":"Wu","year":"2003","journal-title":"Electron. Lett."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2923","DOI":"10.1002\/sec.1428","article-title":"Pitch-based Steganography for speex voice codec","volume":"9","author":"Janicki","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1109\/TIFS.2011.2108649","article-title":"Steganography in inactive frames of VoIP streams encoded by source codec","volume":"6","author":"Huang","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Lin, R.S. (2016, January 27\u201329). High capacity information hiding scheme using VAD algorithm. Proceedings of the 2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), Nantou, Taiwan.","DOI":"10.1109\/ICCE-TW.2016.7521040"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1011","DOI":"10.1109\/TASLP.2017.2676356","article-title":"Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals","volume":"25","author":"Li","year":"2017","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1854","DOI":"10.1109\/TIFS.2018.2806741","article-title":"RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network","volume":"13","author":"Lin","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1109\/TIFS.2016.2636087","article-title":"AMR Steganalysis Based on Second-Order Difference of Pitch Delay","volume":"12","author":"Ren","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.sigpro.2016.11.013","article-title":"Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs","volume":"134","author":"Tian","year":"2017","journal-title":"Signal Process."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-662-43886-2_5","article-title":"Steganalysis of compressed speech based on Markov and entropy","volume":"8389","author":"Miao","year":"2013","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1801","DOI":"10.1109\/TIFS.2015.2421322","article-title":"AMR Steganalysis Based on the Probability of Same Pulse Position","volume":"10","author":"Ren","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1109\/TIFS.2011.2169058","article-title":"Nonparametric Steganalysis of QIM Steganography Using Approximate Entropy","volume":"7","author":"Malik","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1254","DOI":"10.1049\/cje.2017.09.026","article-title":"Steganalysis of Low Embedding Rates LSB Speech Based on Histogram Moments in Frequency Domain","volume":"26","author":"Yang","year":"2017","journal-title":"Chin. J. Electron."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A mathematical theory of communication","volume":"27","author":"Shannon","year":"1948","journal-title":"Bell Syst. Tech. J."},{"key":"ref_39","unstructured":"(2018, May 01). Dual Rate Speech Coder FOR Multimedia Communications Transmitting at 5.3 and 6.3 kbit\/s. Available online: https:\/\/www.itu.int\/net\/itu-t\/sigdb\/speaudio\/AudioForm-s.aspx?val=1117231."},{"key":"ref_40","unstructured":"Menezes, A.J., Vanstone, S.A., and Oorschot, P.C.V. (1996). Handbook of Applied Cryptography, CRC Press Inc.. [1st ed.]."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Ibrahim, A., and Dragomir, S.S. (2014). A Survey on Cauchy\u2013Bunyakovsky\u2013Schwarz Inequality for Power Series. Analytic Number Theory, Approximation Theory, and Special Function, Springer.","DOI":"10.1007\/978-1-4939-0258-3_10"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/1961189.1961199","article-title":"LIBSVM: A Library for Support Vector Machines","volume":"2","author":"Chang","year":"2011","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"707","DOI":"10.3390\/sym2020707","article-title":"Symmetry and Asymmetry Level Measures","volume":"2","author":"Garrido","year":"2010","journal-title":"Symmetry"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/10\/8\/336\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:18:08Z","timestamp":1760195888000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/10\/8\/336"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,11]]},"references-count":43,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2018,8]]}},"alternative-id":["sym10080336"],"URL":"https:\/\/doi.org\/10.3390\/sym10080336","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2018,8,11]]}}}