iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1016/J.COMCOM.2011.07.003
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T23:07:57Z","timestamp":1720393677730},"reference-count":31,"publisher":"Elsevier BV","issue":"18","license":[{"start":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T00:00:00Z","timestamp":1322697600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1016\/j.comcom.2011.07.003","type":"journal-article","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T11:23:01Z","timestamp":1311592981000},"page":"2236-2247","source":"Crossref","is-referenced-by-count":24,"title":["Adaptive partial-matching steganography for voice over IP using triple M sequences"],"prefix":"10.1016","volume":"34","author":[{"given":"Hui","family":"Tian","sequence":"first","affiliation":[]},{"given":"Hong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Feng","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.comcom.2011.07.003_b0005","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","article-title":"Hide and seek: an introduction to steganography","volume":"1","author":"Provos","year":"2003","journal-title":"IEEE Security & Privacy Magazine"},{"issue":"1","key":"10.1016\/j.comcom.2011.07.003_b0010","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/s11042-006-0008-4","article-title":"An evaluation of image based steganography methods","volume":"30","author":"Bailey","year":"2006","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.comcom.2011.07.003_b0015","doi-asserted-by":"crossref","unstructured":"E. T. Lin, A.M. Eskicioglu, Advances in digital video content protection, in: Proceedings of the IEEE: Special Issue on Advances in Video Coding and Delivery, 93(1) 2005, pp. 171\u2013183.","DOI":"10.1109\/JPROC.2004.839623"},{"key":"10.1016\/j.comcom.2011.07.003_b0020","doi-asserted-by":"crossref","unstructured":"M. Shirali-Shahreza, A new method for real-time steganography, in: Proceedings of 8th International Conference on Signal Processing, vol. 4, 2006, pp. 16\u201320.","DOI":"10.1109\/ICOSP.2006.345954"},{"key":"10.1016\/j.comcom.2011.07.003_b0025","doi-asserted-by":"crossref","unstructured":"B. Goode, Voice over internet protocol (VoIP), in: Proceedings of the IEEE, 90(9), September 2002, pp. 1495\u20131517.","DOI":"10.1109\/JPROC.2002.802005"},{"key":"10.1016\/j.comcom.2011.07.003_b0030","doi-asserted-by":"crossref","unstructured":"S.J. Murdoch, S. Lewis, Embedding covert channels into TCP\/IP, in: Proceedings of the 7th Information Hiding workshop, June, 2005, pp. 247\u2013262.","DOI":"10.1007\/11558859_19"},{"key":"10.1016\/j.comcom.2011.07.003_b0035","unstructured":"D. Llamas, C. Allison, A. Miller, Covert channels in internet protocols: a survey, in: Proceedings of the 6th Annual Postgraduate Symposium about the Convergence of Telecommunications, Networking and Broadcasting, PGNET 2005, June 2005."},{"issue":"3","key":"10.1016\/j.comcom.2011.07.003_b0040","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/COMST.2007.4317620","article-title":"A Survey of covert channels and countermeasures in computer network protocols","volume":"9","author":"Zander","year":"2007","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"12","key":"10.1016\/j.comcom.2011.07.003_b0045","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/MCOM.2007.4395378","article-title":"Covert channels and countermeasures in computer network protocols","volume":"45","author":"Zander","year":"2007","journal-title":"IEEE Communications Magazine"},{"key":"10.1016\/j.comcom.2011.07.003_b0050","unstructured":"X. Luo, E.W.W. Chan, R.K.C. Chang, TCP covert timing channels: design and detection, in: Proceedings of IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), June 2008, pp. 420\u2013429."},{"key":"10.1016\/j.comcom.2011.07.003_b0055","doi-asserted-by":"crossref","unstructured":"C. Wang, Q. Wu, Information hiding in real-time VoIP streams, in: Proceedings 9th IEEE International Symposium on Multimedia, December 2007, pp. 255\u2013262.","DOI":"10.1109\/ISM.2007.4412381"},{"issue":"6","key":"10.1016\/j.comcom.2011.07.003_b0060","doi-asserted-by":"crossref","first-page":"1896","DOI":"10.1093\/ietcom\/e89-b.6.1896","article-title":"A band extension technique for G.711 speech using steganography","volume":"E89-B","author":"Aoki","year":"2006","journal-title":"IEICE Transactions on Communications"},{"key":"10.1016\/j.comcom.2011.07.003_b0065","doi-asserted-by":"crossref","unstructured":"J. Dittmann, D. Hesse, R. Hillert, Steganography and steganalysis in voice over IP scenarios: operational aspects and first experiences with a new steganalysis tool set, in: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, March 2005, pp. 607\u2013618.","DOI":"10.1117\/12.586579"},{"key":"10.1016\/j.comcom.2011.07.003_b0070","unstructured":"C. Kratzer, J. Dittmann, T. Vogel, R. Hillert, Design and evaluation of steganography for voice-over-IP, in: Proceedings of 2006 IEEE International Symposium on Circuits and Systems, May 21\u201324, 2006, pp. 2397\u20132340."},{"key":"10.1016\/j.comcom.2011.07.003_b0075","doi-asserted-by":"crossref","unstructured":"H. Tian, K. Zhou, Y. Huang, J. Liu, D. Feng. A covert communication model based on least significant bits steganography in voice over IP, in: Proceedings of the 9th International Conference for Young Computer Scientists, November 2008, pp. 647\u2013652.","DOI":"10.1109\/ICYCS.2008.394"},{"issue":"1","key":"10.1016\/j.comcom.2011.07.003_b0080","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/272991.272995","article-title":"Mersenne twister: a 623-dimensionally equidistributed uniform pseudorandom number generator","volume":"8","author":"Matsumoto","year":"1998","journal-title":"ACM Transactions on Modeling and Computer Simulations: Special Issue on Uniform Random Number Generation"},{"key":"10.1016\/j.comcom.2011.07.003_b0085","unstructured":"ITU-T Recommendation G.114. One-way transmission time, SERIES G: transmission systems and media, digital system and networks. May 2003."},{"key":"10.1016\/j.comcom.2011.07.003_b0090","doi-asserted-by":"crossref","unstructured":"Y. Huang, B. Xiao, H. Xiao, Implementation of Covert Communication Based on Steganography, in: Proceedings of 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, August 2008, pp. 1512\u20131515.","DOI":"10.1109\/IIH-MSP.2008.174"},{"key":"10.1016\/j.comcom.2011.07.003_b0095","doi-asserted-by":"crossref","unstructured":"N. Aoki, A technique of lossless steganography for G.711 telephony speech, in: Proceedings of 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, August 2008, pp. 608\u2013611.","DOI":"10.1109\/IIH-MSP.2008.122"},{"key":"10.1016\/j.comcom.2011.07.003_b0100","doi-asserted-by":"crossref","unstructured":"W. Mazurczyk, K. Szczypiorski, Steganography of VoIP Streams, in: Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Part II, LNCS 5332, pp. 1001\u20131018.","DOI":"10.1007\/978-3-540-88873-4_6"},{"issue":"2-3","key":"10.1016\/j.comcom.2011.07.003_b0105","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/s11235-009-9245-y","article-title":"LACK-a VoIP steganographic method","volume":"45","author":"Mazurczyk","year":"2010","journal-title":"Springer\u2019s Telecommunication Systems Journal"},{"issue":"2","key":"10.1016\/j.comcom.2011.07.003_b0110","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MSPEC.2010.5397787","article-title":"Vice over IP","volume":"47","author":"Lubacz","year":"2010","journal-title":"IEEE Spectrum"},{"key":"10.1016\/j.comcom.2011.07.003_b0115","doi-asserted-by":"crossref","unstructured":"H. Tian, K. Zhou, H. Jiang, Y. Huang, J. Liu, D. Feng. An M-Sequence Based Steganography Model for Voice over IP, in: Proceedings of the 44th IEEE International Conference on Communications, Dresden, Germany, June 14\u201318, 2009, pp. 1\u20135.","DOI":"10.1109\/ICC.2009.5198737"},{"key":"10.1016\/j.comcom.2011.07.003_b0120","doi-asserted-by":"crossref","unstructured":"H. Tian, K. Zhou, H. Jiang, Y. Huang, J. Liu, D. Feng, An Adaptive Steganography Scheme for Voice over IP, in: Proceedings of the 2009 IEEE International Symposium on Circuits and Systems, Taipei, Taiwan, May 24\u201327, 2009, pp. 2922\u20132925.","DOI":"10.1109\/ISCAS.2009.5118414"},{"key":"10.1016\/j.comcom.2011.07.003_b0125","series-title":"Information Hiding Techniques for Steganography and Digital Watermarking","author":"Katzenbeisser","year":"1999"},{"issue":"1","key":"10.1016\/j.comcom.2011.07.003_b0130","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MIM.2005.8456673","article-title":"Pseudorandom sequences and the measurement of the frequency response","volume":"8","author":"Engelberg","year":"2005","journal-title":"IEEE Instrumentation & Measurement Magazine"},{"key":"10.1016\/j.comcom.2011.07.003_b0135","unstructured":"ITU-T Recommendation G.729, Coding of speech at 8 kbit\/s using conjugate-structure algebraic-code-excited linear prediction (CS-ACELP), January 2007."},{"key":"10.1016\/j.comcom.2011.07.003_b0140","unstructured":"Available at:."},{"key":"10.1016\/j.comcom.2011.07.003_b0145","unstructured":"ITU-T Recommendation P. 862, Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs, Feb. 2001."},{"key":"10.1016\/j.comcom.2011.07.003_b0150","unstructured":"ITU-T Recommendation P. 862.3, Application guide for objective quality measurement based on Recommendations P.862, P.862.1 and P.862.2, November 2007."},{"key":"10.1016\/j.comcom.2011.07.003_b0155","unstructured":"ITU-T Recommendation P. 800, Methods for subjective determination of transmission quality, August 1996."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366411002179?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366411002179?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,11,28]],"date-time":"2021-11-28T17:51:42Z","timestamp":1638121902000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366411002179"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":31,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["S0140366411002179"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.comcom.2011.07.003","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2011,12]]}}}