{"id":"https://openalex.org/W2560351977","doi":"https://doi.org/10.1109/tifs.2016.2636087","title":"AMR Steganalysis Based on Second-Order Difference of Pitch Delay","display_name":"AMR Steganalysis Based on Second-Order Difference of Pitch Delay","publication_year":2016,"publication_date":"2016-12-06","ids":{"openalex":"https://openalex.org/W2560351977","doi":"https://doi.org/10.1109/tifs.2016.2636087","mag":"2560351977"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2016.2636087","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2636087","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101499462","display_name":"Yanzhen Ren","orcid":"https://orcid.org/0000-0003-0799-5082"},"institutions":[{"id":"https://openalex.org/I4391768271","display_name":"State Key Laboratory of Software Engineering","ror":"https://ror.org/01z3jn402","country_code":null,"type":"facility","lineage":["https://openalex.org/I37461747","https://openalex.org/I4391768271"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanzhen Ren","raw_affiliation_strings":["State Key Laboratory of Software Engineering and the Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Computer School, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Engineering and the Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Computer School, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747","https://openalex.org/I4391768271"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043059006","display_name":"Jing Yang","orcid":"https://orcid.org/0000-0002-1806-6003"},"institutions":[{"id":"https://openalex.org/I4391768271","display_name":"State Key Laboratory of Software Engineering","ror":"https://ror.org/01z3jn402","country_code":null,"type":"facility","lineage":["https://openalex.org/I37461747","https://openalex.org/I4391768271"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Yang","raw_affiliation_strings":["State Key Laboratory of Software Engineering and the Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Computer School, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Engineering and the Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Computer School, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747","https://openalex.org/I4391768271"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100630403","display_name":"Jinwei Wang","orcid":"https://orcid.org/0000-0002-9366-5671"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinwei Wang","raw_affiliation_strings":["Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107906291","display_name":"Lina Wang","orcid":"https://orcid.org/0009-0003-2811-5731"},"institutions":[{"id":"https://openalex.org/I4391768271","display_name":"State Key Laboratory of Software Engineering","ror":"https://ror.org/01z3jn402","country_code":null,"type":"facility","lineage":["https://openalex.org/I37461747","https://openalex.org/I4391768271"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lina Wang","raw_affiliation_strings":["State Key Laboratory of Software Engineering and the Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Computer School, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Engineering and the Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Computer School, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747","https://openalex.org/I4391768271"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101499462"],"corresponding_institution_ids":["https://openalex.org/I37461747","https://openalex.org/I4391768271"],"apc_list":null,"apc_paid":null,"fwci":3.0061,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.94540756,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"12","issue":"6","first_page":"1345","last_page":"1357"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.8914596438407898},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8657337427139282},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7680850028991699},{"id":"https://openalex.org/keywords/codec","display_name":"Codec","score":0.5814216732978821},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5684930086135864},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.4831806719303131},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4700435698032379},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.390722393989563},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.29453393816947937},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2177201211452484}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.8914596438407898},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8657337427139282},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7680850028991699},{"id":"https://openalex.org/C161765866","wikidata":"https://www.wikidata.org/wiki/Q184748","display_name":"Codec","level":2,"score":0.5814216732978821},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5684930086135864},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.4831806719303131},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4700435698032379},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.390722393989563},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.29453393816947937},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2177201211452484},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2016.2636087","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2636087","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6295448653","display_name":null,"funder_award_id":"61373169","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8556675870","display_name":null,"funder_award_id":"U1536114","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8895439857","display_name":null,"funder_award_id":"U1536204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8931665932","display_name":null,"funder_award_id":"61272421","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321883","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53"},{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"},{"id":"https://openalex.org/F4320324116","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17"},{"id":"https://openalex.org/F4320325599","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09"},{"id":"https://openalex.org/F4320325744","display_name":"Inner Mongolia University of Technology","ror":"https://ror.org/05564e019"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W164331984","https://openalex.org/W1171949029","https://openalex.org/W1559569201","https://openalex.org/W1564410763","https://openalex.org/W1875845630","https://openalex.org/W1919811447","https://openalex.org/W1995716398","https://openalex.org/W2001088533","https://openalex.org/W2009130368","https://openalex.org/W2026170051","https://openalex.org/W2045330563","https://openalex.org/W2049562124","https://openalex.org/W2051064508","https://openalex.org/W2062274245","https://openalex.org/W2081326826","https://openalex.org/W2082241271","https://openalex.org/W2091459879","https://openalex.org/W2091538393","https://openalex.org/W2104191455","https://openalex.org/W2139101243","https://openalex.org/W2145370087","https://openalex.org/W2153635508","https://openalex.org/W2170311913","https://openalex.org/W2252896564","https://openalex.org/W2261537048","https://openalex.org/W2291390035","https://openalex.org/W2296679486","https://openalex.org/W2315985703","https://openalex.org/W2329402732","https://openalex.org/W2377695695","https://openalex.org/W2751083580","https://openalex.org/W2913337807","https://openalex.org/W2978144139","https://openalex.org/W2978847058","https://openalex.org/W4239092273","https://openalex.org/W4244212039","https://openalex.org/W4285719527","https://openalex.org/W6639263069","https://openalex.org/W6696876242","https://openalex.org/W6987383436"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W2792878404","https://openalex.org/W2068740952","https://openalex.org/W1583147569","https://openalex.org/W2182496537","https://openalex.org/W3154843532"],"abstract_inverted_index":{"This":[0],"paper":[1,73],"presents":[2],"a":[3],"novel":[4],"steganalysis":[5,85],"scheme":[6],"for":[7,164],"the":[8,31,57,66,75,78,89,96,101,106,112,115,123,127,138,151,174,183],"detection":[9,140],"of":[10,33,68,77,81,114,129,142,169,176],"adaptive":[11],"multi-rate":[12],"(AMR)":[13],"audio":[14,17],"steganography.":[15],"AMR":[16,37,63],"codec":[18],"is":[19,120,146,155,180],"used":[20,121],"widely":[21],"in":[22],"mobile":[23,26],"communication":[24],"and":[25,48,52,61,94,159,203],"Internet":[27],"system.":[28],"Due":[29],"to":[30,99,104,110,125,196],"modifiability":[32],"pitch":[34,42,70,82],"delay,":[35,71],"several":[36],"steganography":[38],"schemes":[39],"based":[40],"on":[41,56,65,187],"delay":[43,83],"modulation":[44],"have":[45,49],"emerged":[46],"gradually":[47],"high":[50],"capacity":[51],"good":[53],"imperceptibility.":[54],"Based":[55],"difference":[58,80],"between":[59],"cover":[60,165],"stego":[62],"audios":[64],"continuity":[67],"adjacent":[69],"this":[72],"proposes":[74],"matrix":[76],"second-order":[79],"(MSDPD)":[84],"features":[86,103,109],"by":[87],"calculating":[88],"Markov":[90],"transition":[91],"probability":[92],"MSDPD,":[93],"uses":[95],"calibration":[97],"method":[98,145,179,192],"estimate":[100],"cover's":[102],"get":[105],"calibrated":[107],"MSDPD":[108],"improve":[111],"accuracy":[113],"scheme.":[116,132],"Support":[117],"vector":[118],"machine":[119],"as":[122,201],"steganalyzer":[124],"test":[126],"performance":[128,175],"our":[130,143,177],"proposed":[131,144,178],"The":[133,167,191],"experimental":[134],"results":[135,168],"show":[136,172],"that":[137,173],"correct":[139],"rate":[141,154],"more":[147],"than":[148,182],"85%":[149,163],"when":[150],"embedding":[152,189],"bit":[153],"30%":[156],"or":[157],"above,":[158],"can":[160,193],"reach":[161],"above":[162],"audios.":[166],"contrast":[170],"experiment":[171],"better":[181],"existing":[184],"method,":[185],"especially":[186],"low":[188],"rate.":[190],"be":[194],"extended":[195],"other":[197],"CELP":[198],"codec,":[199],"such":[200],"G.723.1":[202],"G.729.":[204]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
