{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:57:52Z","timestamp":1729627072553,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/icc.2012.6363997","type":"proceedings-article","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T00:17:44Z","timestamp":1354580264000},"page":"1133-1137","source":"Crossref","is-referenced-by-count":26,"title":["Least-significant-digit steganography in low bitrate speech"],"prefix":"10.1109","author":[{"given":"Jin","family":"Liu","sequence":"first","affiliation":[]},{"given":"Ke","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Tian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"P 862 Perceptual Evaluation of Speech Quality (PESQ)","year":"2001","key":"15"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2006.060863"},{"journal-title":"G 723 1 Dual Rate Speech Coder for Multimedia Communications Transmitting at 5 3 and 6 3 Kbit\/s","year":"2006","key":"14"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1117\/12.643254","article-title":"New blind steganalysis and its implications","volume":"6072","author":"goljan","year":"2006","journal-title":"Proc SPIE Security Steganography and Watermarking of Multimedia Contents VII"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0032"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.375"},{"key":"2","first-page":"1","article-title":"An msequence based steganography model for voice over ip","author":"tian","year":"2009","journal-title":"Proceedings of IEEE International Conference on Communications"},{"key":"1","doi-asserted-by":"crossref","first-page":"1001","DOI":"10.1007\/978-3-540-88873-4_6","article-title":"Steganography of voip streams","volume":"5332","author":"mazurczyk","year":"2008","journal-title":"Proceedings of Lecture Notes in Computer Science"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.870357"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2008.297"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E93.A.1279"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108649"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.60"},{"key":"9","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1007\/978-3-540-88961-8_5","article-title":"Maximizing steganographic embedding efficiency by combining hamming codes and wet paper codes","volume":"5284","author":"zhang","year":"2008","journal-title":"Proceedings of 10th International Workshop on Information Hiding"},{"key":"8","first-page":"48","volume":"5806","author":"zhang","year":"2009","journal-title":"Fast Bch Syndrome Coding for Steganography"}],"event":{"name":"ICC 2012 - 2012 IEEE International Conference on Communications","start":{"date-parts":[[2012,6,10]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2012,6,15]]}},"container-title":["2012 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6350935\/6363631\/06363997.pdf?arnumber=6363997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T23:35:27Z","timestamp":1498001727000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6363997\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":15,"URL":"http:\/\/dx.doi.org\/10.1109\/icc.2012.6363997","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}