{"id":"https://openalex.org/W2049902977","doi":"https://doi.org/10.1109/icc.2012.6363997","title":"Least-significant-digit steganography in low bitrate speech","display_name":"Least-significant-digit steganography in low bitrate speech","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W2049902977","doi":"https://doi.org/10.1109/icc.2012.6363997","mag":"2049902977"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2012.6363997","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2012.6363997","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101939265","display_name":"Jin Liu","orcid":"https://orcid.org/0009-0003-6023-9961"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]},{"id":"https://openalex.org/I4210138186","display_name":"Wuhan National Laboratory for Optoelectronics","ror":"https://ror.org/03c9ncn37","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210138186"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jin Liu","raw_affiliation_strings":["Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan, China","[School of Computer, Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan, China]"],"affiliations":[{"raw_affiliation_string":"Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I4210138186","https://openalex.org/I47720641"]},{"raw_affiliation_string":"[School of Computer, Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan, China]","institution_ids":["https://openalex.org/I4210138186","https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015061573","display_name":"Ke Zhou","orcid":"https://orcid.org/0000-0002-2161-8796"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]},{"id":"https://openalex.org/I4210138186","display_name":"Wuhan National Laboratory for Optoelectronics","ror":"https://ror.org/03c9ncn37","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210138186"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Zhou","raw_affiliation_strings":["Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan, China","[School of Computer, Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan, China]"],"affiliations":[{"raw_affiliation_string":"Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I4210138186","https://openalex.org/I47720641"]},{"raw_affiliation_string":"[School of Computer, Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan, China]","institution_ids":["https://openalex.org/I4210138186","https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100681240","display_name":"Hui Tian","orcid":"https://orcid.org/0000-0002-1591-656X"},"institutions":[{"id":"https://openalex.org/I119045251","display_name":"Huaqiao University","ror":"https://ror.org/03frdh605","country_code":"CN","type":"education","lineage":["https://openalex.org/I119045251"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Tian","raw_affiliation_strings":["College of Computer Science and Technology, National Huaqiao University, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, National Huaqiao University, Xiamen, China","institution_ids":["https://openalex.org/I119045251"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101939265"],"corresponding_institution_ids":["https://openalex.org/I4210138186","https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":4.3928,"has_fulltext":false,"cited_by_count":47,"citation_normalized_percentile":{"value":0.95155962,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1133","last_page":"1137"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.8447325229644775},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8178160190582275},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.6853640675544739},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6840975284576416},{"id":"https://openalex.org/keywords/codec","display_name":"Codec","score":0.5970484018325806},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5804892778396606},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.4913257658481598},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.4472110867500305},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.4196988344192505},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3079928755760193},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21775004267692566},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.20062926411628723},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13651740550994873}],"concepts":[{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.8447325229644775},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8178160190582275},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.6853640675544739},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6840975284576416},{"id":"https://openalex.org/C161765866","wikidata":"https://www.wikidata.org/wiki/Q184748","display_name":"Codec","level":2,"score":0.5970484018325806},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5804892778396606},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.4913257658481598},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.4472110867500305},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.4196988344192505},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3079928755760193},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21775004267692566},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.20062926411628723},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13651740550994873},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2012.6363997","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2012.6363997","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7200000286102295,"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1490898761","https://openalex.org/W1599992983","https://openalex.org/W1838763164","https://openalex.org/W1993715452","https://openalex.org/W2004686575","https://openalex.org/W2026170051","https://openalex.org/W2086725848","https://openalex.org/W2104452136","https://openalex.org/W2115544090","https://openalex.org/W2118296934","https://openalex.org/W2124042115","https://openalex.org/W2131769770","https://openalex.org/W2158320630","https://openalex.org/W6675412271"],"related_works":["https://openalex.org/W3127945325","https://openalex.org/W2205085860","https://openalex.org/W2885826910","https://openalex.org/W2134958869","https://openalex.org/W2181427603","https://openalex.org/W2409080236","https://openalex.org/W2977151837","https://openalex.org/W3042389042","https://openalex.org/W2796470635","https://openalex.org/W2771684231"],"abstract_inverted_index":{"For":[0],"steganography":[1],"over":[2],"speech":[3],"frames,":[4],"least-significant-bit":[5],"(LSB)":[6],"approach":[7],"has":[8],"been":[9],"one":[10],"of":[11,29,50,76,121,155],"the":[12,25,51,65,72,105,110,119,134,145,149,163],"most":[13],"important":[14],"alternatives.":[15],"However,":[16],"its":[17],"embedded":[18],"capacity":[19,63],"is":[20,127],"quite":[21],"limited,":[22],"due":[23],"to":[24,54],"low":[26,30],"redundancy":[27],"characteristic":[28],"bitrate":[31],"speech.":[32],"Thus,":[33],"we":[34],"suggest":[35],"a":[36,60,95,101],"novel":[37],"least":[38],"significant":[39],"digit":[40],"(LSD)":[41],"method":[42,70,107,126,151],"in":[43],"this":[44],"paper,":[45],"which":[46,79,116],"makes":[47],"full":[48],"use":[49],"frame":[52,77],"bits":[53],"hide":[55],"secret":[56],"messages":[57],"and":[58,90,129,158],"provides":[59],"larger":[61],"embedding":[62,103,156,165],"than":[64],"LSB":[66,147],"method.":[67],"The":[68,124,138],"LSD":[69,106,125,150],"exploits":[71],"multiple":[73,83],"adjacent":[74],"states":[75],"parameters,":[78],"are":[80],"produced":[81],"by":[82],"modifications":[84],"(e.g.":[85],"+1,":[86],"-1,":[87],"+2,":[88],"-2)":[89],"encoded":[91],"as":[92,133],"LSDs":[93],"using":[94],"multi-ary":[96],"numeration":[97],"system.":[98],"Beyond":[99],"providing":[100],"considerable":[102],"capacity,":[104,157],"further":[108],"extends":[109],"key":[111],"space":[112],"for":[113,136],"key-based":[114],"steganography,":[115],"can":[117],"enhance":[118],"security":[120],"covert":[122],"communication.":[123],"implemented":[128],"evaluated":[130],"with":[131,144],"G.723.1":[132],"codec":[135],"speeches.":[137],"experiment":[139],"results":[140],"show":[141],"that,":[142],"compared":[143],"previous":[146],"method,":[148],"increases":[152],"around":[153],"30%":[154],"induces":[159],"less":[160],"distortion":[161],"given":[162],"same":[164],"capacity.":[166]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":5},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":8},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
