{"id":"https://openalex.org/W2975491677","doi":"https://doi.org/10.4018/ijdcf.2019100105","title":"Steganalysis of AMR Based on Statistical Features of Pitch Delay","display_name":"Steganalysis of AMR Based on Statistical Features of Pitch Delay","publication_year":2019,"publication_date":"2019-09-27","ids":{"openalex":"https://openalex.org/W2975491677","doi":"https://doi.org/10.4018/ijdcf.2019100105","mag":"2975491677"},"language":"en","primary_location":{"id":"doi:10.4018/ijdcf.2019100105","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2019100105","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=238885&isxn=9781522565178","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=238885&isxn=9781522565178","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103279808","display_name":"Yanpeng Wu","orcid":"https://orcid.org/0000-0002-8715-9377"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yanpeng Wu","raw_affiliation_strings":["Xiamen Meiya Pico Information Co., Ltd., Xiamen, China"],"affiliations":[{"raw_affiliation_string":"Xiamen Meiya Pico Information Co., Ltd., Xiamen, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000544613","display_name":"Huiji Zhang","orcid":"https://orcid.org/0009-0008-6074-7989"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Huiji Zhang","raw_affiliation_strings":["Xiamen Meiya Pico Information Co., Ltd., Xiamen, China"],"affiliations":[{"raw_affiliation_string":"Xiamen Meiya Pico Information Co., Ltd., Xiamen, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101577180","display_name":"Yi Sun","orcid":"https://orcid.org/0000-0002-6124-4127"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yi Sun","raw_affiliation_strings":["Xiamen Meiya Pico Information Co., Ltd., Xiamen, China"],"affiliations":[{"raw_affiliation_string":"Xiamen Meiya Pico Information Co., Ltd., Xiamen, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100678189","display_name":"Ming\u2010Hui Chen","orcid":"https://orcid.org/0000-0003-1935-2447"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Minghui Chen","raw_affiliation_strings":["Xiamen Meiya Pico Information Co., Ltd., Xiamen, China"],"affiliations":[{"raw_affiliation_string":"Xiamen Meiya Pico Information Co., Ltd., Xiamen, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103279808"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4049,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.65569293,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"11","issue":"4","first_page":"66","last_page":"81"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.8441516160964966},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8085408210754395},{"id":"https://openalex.org/keywords/pitch-detection-algorithm","display_name":"Pitch detection algorithm","score":0.5432868599891663},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.5277396440505981},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.5082411170005798},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5065733194351196},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4871515929698944},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.485248327255249},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.47891151905059814},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.47103244066238403},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.4553970396518707},{"id":"https://openalex.org/keywords/codec","display_name":"Codec","score":0.4201931655406952},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37517136335372925},{"id":"https://openalex.org/keywords/speech-processing","display_name":"Speech processing","score":0.17938536405563354},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13501068949699402}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.8441516160964966},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8085408210754395},{"id":"https://openalex.org/C135622632","wikidata":"https://www.wikidata.org/wiki/Q7198851","display_name":"Pitch detection algorithm","level":3,"score":0.5432868599891663},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.5277396440505981},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.5082411170005798},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5065733194351196},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4871515929698944},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.485248327255249},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.47891151905059814},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.47103244066238403},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.4553970396518707},{"id":"https://openalex.org/C161765866","wikidata":"https://www.wikidata.org/wiki/Q184748","display_name":"Codec","level":2,"score":0.4201931655406952},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37517136335372925},{"id":"https://openalex.org/C61328038","wikidata":"https://www.wikidata.org/wiki/Q3358061","display_name":"Speech processing","level":2,"score":0.17938536405563354},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13501068949699402},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijdcf.2019100105","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2019100105","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=238885&isxn=9781522565178","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.4018/ijdcf.2019100105","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2019100105","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=238885&isxn=9781522565178","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2975491677.pdf","grobid_xml":"https://content.openalex.org/works/W2975491677.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W164331984","https://openalex.org/W848445526","https://openalex.org/W1197197214","https://openalex.org/W1646481312","https://openalex.org/W1955882805","https://openalex.org/W1966459070","https://openalex.org/W1995716398","https://openalex.org/W2009130368","https://openalex.org/W2015247917","https://openalex.org/W2026170051","https://openalex.org/W2051064508","https://openalex.org/W2062274245","https://openalex.org/W2066384692","https://openalex.org/W2081326826","https://openalex.org/W2082241271","https://openalex.org/W2103228545","https://openalex.org/W2123170991","https://openalex.org/W2134527668","https://openalex.org/W2145370087","https://openalex.org/W2152988830","https://openalex.org/W2158671594","https://openalex.org/W2192227561","https://openalex.org/W2243399711","https://openalex.org/W2339370745","https://openalex.org/W2513409064","https://openalex.org/W2548753991","https://openalex.org/W2557199391","https://openalex.org/W2560351977","https://openalex.org/W2594649210","https://openalex.org/W2733608110","https://openalex.org/W6681114804"],"related_works":["https://openalex.org/W4243922849","https://openalex.org/W2939392096","https://openalex.org/W2148973528","https://openalex.org/W2930153478","https://openalex.org/W4309385482","https://openalex.org/W2040931326","https://openalex.org/W2792878404","https://openalex.org/W1583147569","https://openalex.org/W2068740952","https://openalex.org/W2182496537"],"abstract_inverted_index":{"The":[0,98,117],"calibrated":[1],"matrix":[2],"of":[3,7,38,46,66,83,90],"the":[4,8,44,47,52,57,76,81,84,122,126],"second-order":[5],"difference":[6],"pitch":[9,24,39,53,69,85],"delay":[10,40,54,70],"(C-MSDPD)":[11],"feature":[12,103],"has":[13,71],"been":[14],"proven":[15],"to":[16,107],"be":[17],"effective":[18],"in":[19,56,64,95],"detecting":[20],"steganography":[21],"based":[22,33,111],"on":[23,34,112],"delay.":[25],"In":[26],"this":[27,96],"article,":[28],"a":[29,68,72,109],"new":[30,88,99],"steganalysis":[31],"scheme":[32,124],"multiple":[35],"statistical":[36,91],"features":[37,92,100],"is":[41,60],"present.":[42],"Analyzing":[43],"principle":[45],"adaptive":[48],"multi-rate":[49],"(AMR)":[50],"codec,":[51],"values":[55],"same":[58],"frame":[59],"divided":[61],"into":[62],"groups,":[63],"each":[65],"which,":[67],"closer":[73],"correlation":[74],"with":[75,135],"other":[77],"ones.":[78],"To":[79],"depict":[80],"characteristic":[82],"delay,":[86],"two":[87],"types":[89],"are":[93,104],"adopted":[94],"article.":[97],"and":[101,134],"C-MSDPD":[102],"together":[105],"employed":[106],"train":[108],"classifier":[110],"support":[113],"vector":[114],"machine":[115],"(SVM).":[116],"experimental":[118],"result":[119],"shows":[120],"that,":[121],"proposed":[123],"outperforms":[125],"existing":[127],"one":[128],"at":[129],"different":[130,136],"embedding":[131],"bit":[132],"rates":[133],"speech":[137],"lengths.":[138]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
