{"id":"https://openalex.org/W2104452136","doi":"https://doi.org/10.1109/icc.2009.5198737","title":"An M-Sequence Based Steganography Model for Voice over IP","display_name":"An M-Sequence Based Steganography Model for Voice over IP","publication_year":2009,"publication_date":"2009-06-01","ids":{"openalex":"https://openalex.org/W2104452136","doi":"https://doi.org/10.1109/icc.2009.5198737","mag":"2104452136"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2009.5198737","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2009.5198737","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100681240","display_name":"Hui Tian","orcid":"https://orcid.org/0000-0002-1591-656X"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]},{"id":"https://openalex.org/I4210138186","display_name":"Wuhan National Laboratory for Optoelectronics","ror":"https://ror.org/03c9ncn37","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210138186"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"H. Tian","raw_affiliation_strings":["Wuhan National Laboratory for Optoelectronics, School of Computer, Huazhong University of Science and Technology, Wuhan, China","Wuhan National Laboratory for Optoelectronics, School of Computer, Zhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Wuhan National Laboratory for Optoelectronics, School of Computer, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I4210138186","https://openalex.org/I47720641"]},{"raw_affiliation_string":"Wuhan National Laboratory for Optoelectronics, School of Computer, Zhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015061573","display_name":"Ke Zhou","orcid":"https://orcid.org/0000-0002-2161-8796"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]},{"id":"https://openalex.org/I4210138186","display_name":"Wuhan National Laboratory for Optoelectronics","ror":"https://ror.org/03c9ncn37","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210138186"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"K. Zhou","raw_affiliation_strings":["Wuhan National Laboratory for Optoelectronics, School of Computer, Huazhong University of Science and Technology, Wuhan, China","Wuhan National Laboratory for Optoelectronics, School of Computer, Zhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Wuhan National Laboratory for Optoelectronics, School of Computer, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I4210138186","https://openalex.org/I47720641"]},{"raw_affiliation_string":"Wuhan National Laboratory for Optoelectronics, School of Computer, Zhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054285749","display_name":"Hong Jiang","orcid":"https://orcid.org/0000-0002-1477-9751"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"H. Jiang","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Nebraska, Lincoln, Lincolnshire, NE, USA","Department of Computer Science and Engineering University of Nebraska - Lincoln, Lincoln, NE"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Nebraska, Lincoln, Lincolnshire, NE, USA","institution_ids":["https://openalex.org/I114395901"]},{"raw_affiliation_string":"Department of Computer Science and Engineering University of Nebraska - Lincoln, Lincoln, NE","institution_ids":["https://openalex.org/I114395901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088107940","display_name":"J. Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210138186","display_name":"Wuhan National Laboratory for Optoelectronics","ror":"https://ror.org/03c9ncn37","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210138186"]},{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"J. Liu","raw_affiliation_strings":["Wuhan National Laboratory for Optoelectronics, School of Computer, Huazhong University of Science and Technology, Wuhan, China","Wuhan National Laboratory for Optoelectronics, School of Computer, Zhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Wuhan National Laboratory for Optoelectronics, School of Computer, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I4210138186","https://openalex.org/I47720641"]},{"raw_affiliation_string":"Wuhan National Laboratory for Optoelectronics, School of Computer, Zhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100768896","display_name":"Yongfeng Huang","orcid":"https://orcid.org/0000-0003-3825-2230"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Y. Huang","raw_affiliation_strings":["Network and Communication Research Institute Department of Electronic Engineering, Tsinghua University, Beijing, China","Network and Communication Research Institute, Department of Electronic Engineering, Tsinghua University, Beijing, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Network and Communication Research Institute Department of Electronic Engineering, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Network and Communication Research Institute, Department of Electronic Engineering, Tsinghua University, Beijing, China#TAB#","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057421680","display_name":"Dan Feng","orcid":"https://orcid.org/0000-0002-4674-6006"},"institutions":[{"id":"https://openalex.org/I4210138186","display_name":"Wuhan National Laboratory for Optoelectronics","ror":"https://ror.org/03c9ncn37","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210138186"]},{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"D. Feng","raw_affiliation_strings":["Wuhan National Laboratory for Optoelectronics, School of Computer, Huazhong University of Science and Technology, Wuhan, China","Wuhan National Laboratory for Optoelectronics, School of Computer, Zhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Wuhan National Laboratory for Optoelectronics, School of Computer, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I4210138186","https://openalex.org/I47720641"]},{"raw_affiliation_string":"Wuhan National Laboratory for Optoelectronics, School of Computer, Zhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100681240"],"corresponding_institution_ids":["https://openalex.org/I4210138186","https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":7.8591,"has_fulltext":false,"cited_by_count":47,"citation_normalized_percentile":{"value":0.97770815,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.9208805561065674},{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.8503471612930298},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8194103240966797},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5498851537704468},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.5085252523422241},{"id":"https://openalex.org/keywords/codec","display_name":"Codec","score":0.5072793364524841},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.47579559683799744},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.4676131010055542},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4474044144153595},{"id":"https://openalex.org/keywords/low-latency","display_name":"Low latency (capital markets)","score":0.4195079207420349},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.22000253200531006},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.20055246353149414},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1109742820262909},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10343122482299805},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.08026033639907837}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.9208805561065674},{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.8503471612930298},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8194103240966797},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5498851537704468},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.5085252523422241},{"id":"https://openalex.org/C161765866","wikidata":"https://www.wikidata.org/wiki/Q184748","display_name":"Codec","level":2,"score":0.5072793364524841},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.47579559683799744},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.4676131010055542},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4474044144153595},{"id":"https://openalex.org/C46637626","wikidata":"https://www.wikidata.org/wiki/Q6693015","display_name":"Low latency (capital markets)","level":2,"score":0.4195079207420349},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.22000253200531006},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.20055246353149414},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1109742820262909},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10343122482299805},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.08026033639907837},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icc.2009.5198737","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2009.5198737","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Communications","raw_type":"proceedings-article"},{"id":"pmh:oai:digitalcommons.unl.edu:csetechreports-1064","is_oa":false,"landing_page_url":"https://digitalcommons.unl.edu/csetechreports/68","pdf_url":null,"source":{"id":"https://openalex.org/S4306513441","display_name":"Insecta mundi","issn_l":"0749-6737","issn":["0749-6737","1942-1354","1942-1362"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310316217","host_organization_name":"Center for Systematic Entomology","host_organization_lineage":["https://openalex.org/P4310316217"],"host_organization_lineage_names":["Center for Systematic Entomology"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"CSE Technical Reports","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.359.5919","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.359.5919","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1602245059","https://openalex.org/W1971037086","https://openalex.org/W2042049652","https://openalex.org/W2044370093","https://openalex.org/W2065552077","https://openalex.org/W2095595785","https://openalex.org/W2098827397","https://openalex.org/W2098910900","https://openalex.org/W2103228545","https://openalex.org/W2110507872","https://openalex.org/W2139208951","https://openalex.org/W2157428729","https://openalex.org/W2162864355","https://openalex.org/W2532328686"],"related_works":["https://openalex.org/W2084179496","https://openalex.org/W2103238357","https://openalex.org/W2922244040","https://openalex.org/W1998855589","https://openalex.org/W1973628965","https://openalex.org/W2253372807","https://openalex.org/W2136891629","https://openalex.org/W2054011204","https://openalex.org/W2497446005","https://openalex.org/W2899009605"],"abstract_inverted_index":{"Differing":[0],"from":[1],"applying":[2],"steganography":[3,8,35,178],"on":[4,9,106,146,181,208],"storage":[5],"cover":[6,199],"media,":[7],"voice":[10],"over":[11],"IP":[12],"(VoIP)":[13],"must":[14],"often":[15],"delicately":[16],"balance":[17],"between":[18,69],"providing":[19,42],"adequate":[20,71],"security":[21,44,76,126,219],"and":[22,77,80,121,151,173,220],"maintaining":[23],"low":[24,82],"latency":[25,83],"for":[26,37,45,85,222],"real-time":[27,34,50,182,230],"services.":[28],"This":[29],"paper":[30],"presents":[31],"a":[32,66,124,142,203],"novel":[33],"model":[36,190],"VoIP":[38],"that":[39,109,214],"aims":[40],"at":[41,136],"good":[43,218],"secret":[46,98,129,134,224],"messages":[47,99,135,225],"without":[48],"sacrificing":[49],"performance.":[51],"We":[52,184],"achieve":[53],"this":[54],"goal":[55],"by":[56],"employing":[57],"the":[58,70,81,90,95,102,107,110,113,116,137,147,152,159,166,169,186,195,198,229],"well-known":[59],"least-significant-bits":[60],"(LSB)":[61],"substitution":[62],"approach":[63],"to":[64,93,100,122,176],"provide":[65,123],"reasonable":[67],"tradeoff":[68],"information":[72],"hiding":[73],"requirement":[74,84,231],"(good":[75],"sufficient":[78],"capacity)":[79],"VoIP.":[86,209,233],"Further,":[87],"we":[88,140],"incorporate":[89],"M-sequence":[91],"technique":[92,216],"eliminate":[94],"correlation":[96],"among":[97],"resist":[101],"statistical":[103],"detection":[104],"based":[105,145,180,207],"fact":[108],"distribution":[111],"of":[112,128,158,168,188,197,232],"LSBs":[114],"in":[115,201],"stego-speech":[117],"is":[118],"not":[119],"uniform":[120],"short-term":[125],"protection":[127],"messages.":[130],"To":[131],"accurately":[132],"recover":[133],"receiver":[138],"side,":[139],"design":[141],"synchronization":[143],"mechanism":[144],"RSA":[148],"key":[149],"agreement":[150],"synchronized":[153],"sequence":[154],"transmission":[155],"using":[156],"techniques":[157],"protocol":[160],"steganography,":[161],"which":[162],"can":[163],"effectively":[164],"enhance":[165],"flexibility":[167],"covert":[170,204],"communication":[171,205],"system":[172,206],"be":[174],"extended":[175],"other":[177],"schemes":[179],"systems.":[183],"evaluate":[185],"effectiveness":[187],"our":[189,215],"with":[191],"ITU-T":[192],"G.729a":[193],"as":[194],"codec":[196],"speech":[200],"StegTalk,":[202],"The":[210],"experimental":[211],"results":[212],"demonstrate":[213],"provides":[217],"transparency":[221],"transmitting":[223],"while":[226],"adequately":[227],"meeting":[228]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":11}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
