相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。High capacity speech steganography for the G723.1 coder based on quantised line spectral pairs interpolation and CNN auto-encoding
Hamza Kheddar et al.
APPLIED INTELLIGENCE (2022)
Real-time steganalysis for streaming media based on multi-channel convolutional sliding windows
Zhongliang Yang et al.
KNOWLEDGE-BASED SYSTEMS (2022)
A SILK Adaptive Steganographic Scheme Based on Minimizing Distortion in Pitch Domain
Ren Yanzhen et al.
IETE TECHNICAL REVIEW (2021)
Steganography and Steganalysis in Voice over IP: A Review
Zhijun Wu et al.
SENSORS (2021)
A Review on Text Steganography Techniques
Mohammed Abdul Majeed et al.
MATHEMATICS (2021)
Audio steganography with less modification to the optimal matching CNV-QIM path with the minimal hamming distance expected value to a secret
Xinhao Sun et al.
MULTIMEDIA SYSTEMS (2021)
Squeeze-and-Excitation Networks
Jie Hu et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2020)
Digital audio steganography: Systematic review, classification, and analysis of the current state of the art
Ahmed A. AlSabhany et al.
COMPUTER SCIENCE REVIEW (2020)
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis
Ru Zhang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Multi-Layer Architecture for Efficient Steganalysis of UnderMp3Cover in Multi-Encoder Scenario
Hamzeh Ghasemzadeh
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
An AMR adaptive steganographic scheme based on the pitch delay of unvoiced speech
Yanzhen Ren et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2019)
Calibrated steganalysis of mp3stego in multi-encoder scenario
Hamzeh Ghasemzadeh
INFORMATION SCIENCES (2019)
A Secure AMR Fixed Codebook Steganographic Scheme Based on Pulse Distribution Model
Yanzhen Ren et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
A novel steganographic method for algebraic-code-excited-linear-prediction speech streams based on fractional pitch delay search
Xiaokang Liu et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2019)
Video steganography: A review
Yunxia Liu et al.
NEUROCOMPUTING (2019)
Steganalysis of VoIP Streams with CNN-LSTM Network
Hao Yang et al.
IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (2019)
Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position
Chen Gong et al.
IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (2019)
Detection of Classifier Inconsistencies in Image Steganalysis
Daniel Lerch-Hostalot et al.
IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (2019)
Steganalysis of AMR Speech Based on Multiple Classifiers Combination
Hui Tian et al.
IEEE ACCESS (2019)
An AMR adaptive steganography algorithm based on minimizing distortion
Yanzhen Ren et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2018)
RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network
Zinan Lin et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition
Junhui He et al.
SECURITY AND COMMUNICATION NETWORKS (2018)
Image steganography in spatial domain: A survey
Mehdi Hussain et al.
SIGNAL PROCESSING-IMAGE COMMUNICATION (2018)
Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec
Peng Liu et al.
MULTIMEDIA SYSTEMS (2017)
AMR Steganalysis Based on Second-Order Difference of Pitch Delay
Yanzhen Ren et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Universal audio steganalysis based on calibration and reversed frequency resolution of human auditory system
Hamzeh Ghasemzadeh et al.
IET SIGNAL PROCESSING (2017)
Steganalysis Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs
Hui Tian et al.
SIGNAL PROCESSING (2017)
Xception: Deep Learning with Depthwise Separable Convolutions
Francois Chollet
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) (2017)
AMR Steganalysis Based on the Probability of Same Pulse Position
Yanzhen Ren et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images
Qingzhong Liu et al.
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2015)
Improving security of quantization-index-modulation steganography in low bit-rate speech streams
Hui Tian et al.
MULTIMEDIA SYSTEMS (2014)
Detection of MP3Stego exploiting recompression calibration-based feature
Diqun Yan et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2014)
A new scheme for covert communication via 3G encoded speech
Haibo Miao et al.
COMPUTERS & ELECTRICAL ENGINEERING (2012)
Video Steganalysis Exploiting Motion Vector Reversion-Based Features
Yun Cao et al.
IEEE SIGNAL PROCESSING LETTERS (2012)
Steganography Integration Into a Low-Bit Rate Speech Codec
Yongfeng Huang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)
Voice over Internet protocol (VoIP)
B Goode
PROCEEDINGS OF THE IEEE (2002)