{"id":"https://openalex.org/W2026918955","doi":"https://doi.org/10.1145/2393347.2396395","title":"State-based steganography in low bit rate speech","display_name":"State-based steganography in low bit rate speech","publication_year":2012,"publication_date":"2012-10-29","ids":{"openalex":"https://openalex.org/W2026918955","doi":"https://doi.org/10.1145/2393347.2396395","mag":"2026918955"},"language":"en","primary_location":{"id":"doi:10.1145/2393347.2396395","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2393347.2396395","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th ACM international conference on Multimedia","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015061573","display_name":"Ke Zhou","orcid":"https://orcid.org/0000-0002-2161-8796"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ke Zhou","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China","Huazhong University of Science and Technology, Wuhan, CHINA"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, CHINA","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100642607","display_name":"Jin Liu","orcid":"https://orcid.org/0000-0001-7249-698X"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Liu","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China","Huazhong University of Science and Technology, Wuhan, CHINA"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, CHINA","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100681240","display_name":"Hui Tian","orcid":"https://orcid.org/0000-0002-1591-656X"},"institutions":[{"id":"https://openalex.org/I119045251","display_name":"Huaqiao University","ror":"https://ror.org/03frdh605","country_code":"CN","type":"education","lineage":["https://openalex.org/I119045251"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Tian","raw_affiliation_strings":["National Huaqiao University, Xiamen, China","National Huaqiao University, Xiamen, China#TAB#"],"affiliations":[{"raw_affiliation_string":"National Huaqiao University, Xiamen, China","institution_ids":["https://openalex.org/I119045251"]},{"raw_affiliation_string":"National Huaqiao University, Xiamen, China#TAB#","institution_ids":["https://openalex.org/I119045251"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100781353","display_name":"Chunhua Li","orcid":"https://orcid.org/0000-0002-2103-8396"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunhua Li","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China","Huazhong University of Science and Technology, Wuhan, CHINA"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, CHINA","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5015061573"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":0.5491,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.67569266,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1109","last_page":"1112"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8635197877883911},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7616976499557495},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.7142016887664795},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.7026777267456055},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.5136367678642273},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.4746478199958801},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.45266494154930115},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.425525039434433},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.4187101423740387},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.37149596214294434},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.354294091463089},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3424454927444458},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24238282442092896},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.187687486410141},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1637703776359558},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1537950038909912},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.0817219614982605}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8635197877883911},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7616976499557495},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.7142016887664795},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.7026777267456055},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.5136367678642273},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.4746478199958801},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.45266494154930115},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.425525039434433},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4187101423740387},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.37149596214294434},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.354294091463089},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3424454927444458},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24238282442092896},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.187687486410141},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1637703776359558},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1537950038909912},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0817219614982605},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2393347.2396395","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2393347.2396395","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th ACM international conference on Multimedia","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7699999809265137,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W160330431","https://openalex.org/W1971037086","https://openalex.org/W1976757120","https://openalex.org/W1991337662","https://openalex.org/W1993419762","https://openalex.org/W2013795859","https://openalex.org/W2026170051","https://openalex.org/W2033984339","https://openalex.org/W2056324770","https://openalex.org/W2124042115","https://openalex.org/W2158671594","https://openalex.org/W2227622044","https://openalex.org/W2333730470"],"related_works":["https://openalex.org/W3127945325","https://openalex.org/W2205085860","https://openalex.org/W2885826910","https://openalex.org/W2134958869","https://openalex.org/W2181427603","https://openalex.org/W2409080236","https://openalex.org/W2977151837","https://openalex.org/W3042389042","https://openalex.org/W2796470635","https://openalex.org/W2771684231"],"abstract_inverted_index":{"Common":[0],"least":[1],"significant":[2],"bit":[3],"(LSB)":[4],"relevant":[5],"steganography":[6,49,65,107],"methods":[7],"in":[8,57,130,142],"speech":[9,18,54],"frames":[10],"often":[11],"base":[12],"on":[13,116],"bits":[14],"evaluation":[15,20],"by":[16,75,96],"certain":[17],"quality":[19],"criterion":[21],"and":[22,27,33,39,63,133],"together":[23],"with":[24],"some":[25,36],"coding":[26],"embedding":[28,37,61,71,92],"strategies":[29],"to":[30,59,81],"enhance":[31,64],"imperceptibility":[32],"efficiency.":[34],"However,":[35],"capabilities":[38,62,72],"security":[40],"strategy":[41],"are":[42,73],"neglected.":[43],"This":[44,102],"paper":[45],"proposes":[46],"a":[47,104],"state-based":[48],"method":[50,125],"which":[51,109,137],"fully":[52],"investigates":[53],"frame":[55,83],"features":[56],"order":[58],"expand":[60],"security.":[66],"In":[67],"the":[68,97,139],"proposed":[69],"method,":[70],"measured":[74],"available":[76],"numbers":[77],"of":[78],"states":[79,99],"relative":[80],"current":[82],"parameters":[84],"rather":[85],"than":[86],"information":[87,91],"bits.":[88],"And":[89],"secret":[90],"procedure":[93],"is":[94,103,110],"performed":[95],"chosen":[98],"mapped":[100],"operations.":[101],"basic":[105],"fine-grained":[106],"solution":[108],"useful":[111],"for":[112],"other":[113],"algorithms":[114],"based":[115],"it.":[117],"The":[118],"experimental":[119],"results":[120],"have":[121],"demonstrated":[122],"that":[123],"statebased":[124],"outperforms":[126],"traditional":[127],"LSB":[128],"substitution":[129],"overall":[131],"performance":[132],"introduces":[134],"limited":[135],"latency,":[136],"meets":[138],"realtime":[140],"requirement":[141],"covert":[143],"communications.":[144]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
