GU Chun-ying,GAO Xiao-li.Research on information hiding technology[C]// Proceedings of the 2nd International Conference on Consumer Electronics, Communications and Networks(CECNet).Yichang:IEEE Press,2012:2035-2037.
[2]
MAZURCZYK W.VoIP steganography and its detection: A survey[J].ACM Computing Surveys,2013,2(46):20.
[3]
FRACZEK W,MAZURCZYK W,SZCZYPIORSKI K.Hiding information in a stream control transmission protocol[J].Computer Communications,2012,2(35):159-169.
[4]
XU Er-chi,LIU Bo,XU Li-yang.Adaptive VoIP steganography for information hiding within network audio streams[C]//Proceedings of the 14th International Conference on Network-Based Information Systems(NBiS).Tirana:IEEE Press,2011:612-617.
[5]
MIAO Rui,HUANG Yong-feng.An approach of covert communication based on the adaptive steganography scheme on voice over IP[C]//Proceedings of the 46th IEEE International Conference on Communications(ICC).Kyoto:IEEE Press,2011:1-5.
[6]
LIU Jin,ZHOU Ke,TIAN Hui.Least-significant-digit steganography in low bitrate speech[C]//Proceedings of the 47th IEEE International Conference on Communications(ICC).Ottawa:IEEE Press,2012:1109-1112.
[7]
TIAN Hui,JIANG Hong,ZHOU Ke,et al.Adaptive partial-matching steganography for voice over IP using triple m sequences[J].Computer Communications,2011,34(18):2236-2247.
[8]
XU Ting-ting,YANG Zhen.Simple and effective speech steganography in G.723.1 low-rate codes[C]//Proceedings of the 1st International Conference on Wireless Communications & Signal Processing.Nanjing:IEEE Press,2009:1-4.
LIU Li-hua,LI Ming-yu,LI Qiong,et al.Perceptually transparent information hiding in G.729 bitstream[C]//Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing.Harbin:IEEE Press,2008:406-409.
[11]
HUANG Yong-feng,TANG Shan-yu.Steganography in inactive frames of VoIP streams encoded by source codec[J].IEEE Transactions on Information Forensics and Security,2011,6(2):296-306.
[12]
HUANG Yong-feng,LIU Cheng-hao,TANG Shan-yu.Steganography integration into a low-bit rate speech codec[J].IEEE Transactions on Information Forensics and Security,2012,7(6):1865-1875.
TIAN Hui,ZHOU Ke,FENG Dan.Dynamic matrix encoding strategy for voice-over-IP steganography[J].Journal of Central South University of Technology,2010,17(6):1285-1292.