iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/ACCESS.2019.2962009
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T23:08:31Z","timestamp":1720393711789},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972168","U1536115","U1405254"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2018J01093"],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Opening Program of State Key Laboratory of Information Security of China","award":["2019-ZD-09"]},{"name":"Program for New Century Excellent Talents in Fujian Province University","award":["MJK2016-23"]},{"name":"Program for Outstanding Youth Scientific and Technological Talents in Fujian Province University","award":["MJK2015-54"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2019.2962009","type":"journal-article","created":{"date-parts":[[2019,12,25]],"date-time":"2019-12-25T00:34:38Z","timestamp":1577234078000},"page":"6117-6129","source":"Crossref","is-referenced-by-count":4,"title":["Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1591-656X","authenticated-orcid":false,"given":"Hui","family":"Tian","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5763-714X","authenticated-orcid":false,"given":"Jie","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7319-5780","authenticated-orcid":false,"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3825-2230","authenticated-orcid":false,"given":"Yongfeng","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4295-5633","authenticated-orcid":false,"given":"Yiqiao","family":"Cai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1117\/12.476813","article-title":"Steganalysis of additive noise modelable information hiding","volume":"5020","author":"harmsen","year":"2003","journal-title":"Proc SPIE"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2169058"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2822804"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1801","DOI":"10.1109\/TIFS.2015.2421322","article-title":"AMR steganalysis based on the probability of same pulse position","volume":"10","author":"ren","year":"2015","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-662-43886-2_5","article-title":"Steganalysis of compressed speech based on Markov and entropy","author":"miao","year":"2014","journal-title":"Digital-Forensics and Watermarking"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.06.005"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2024718"},{"key":"ref36","first-page":"650505-1","article-title":"Mel-cepstrum based steganalysis for VoIP steganography","author":"kraetzer","year":"2007","journal-title":"Security Steganography and Watermarking of Multimedia Contents"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/sym10080336"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2636087"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-TW.2016.7521040"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2009.83"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2017.2676356"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2898838"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891247"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2218599"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2008.4518532"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.375"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2865-1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2012.05.003"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2265-y"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1428"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2301912"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911314"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2101597"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2961053"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108649"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2016.0651"},{"key":"ref12","first-page":"18","article-title":"Implementing covert communication over voice conversations with windows live messenger","volume":"4","author":"tian","year":"2012","journal-title":"Adv Inform Sci Service"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1443"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.sigpro.2016.11.013","article-title":"Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs","volume":"134","author":"tian","year":"2016","journal-title":"Signal Process"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2806741"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-009-9245-y"},{"key":"ref17","first-page":"357","article-title":"Key distribution over the covert communication based on VoIP","volume":"20","author":"huang","year":"2011","journal-title":"Chin J Electron"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2010.0348"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3257-x"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866063"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2847678"},{"key":"ref6","first-page":"20:1","article-title":"VoIP steganography and its detection: A survey","volume":"46","author":"mazurczyk","year":"2018","journal-title":"ACM Comput Surv"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2871072"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.08.011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.05.001"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2172422"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2659718"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISPACS.2010.5704658"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA.2015.7306066"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2728801"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1109\/PROC.1986.13663","article-title":"spectral analysis and discrimination by zero-crossings","volume":"74","author":"kedem","year":"1986","journal-title":"Proceedings of the IEEE"},{"key":"ref42","first-page":"37","article-title":"Sumset and inverse sumset theory for Shannon entropy","volume":"19","author":"terence","year":"2010","journal-title":"Combinatorics Probab Comput"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/18.930936"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2164529"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2502761"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08941143.pdf?arnumber=8941143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T10:35:26Z","timestamp":1695551726000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8941143\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":53,"URL":"http:\/\/dx.doi.org\/10.1109\/access.2019.2962009","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}