{"id":"https://openalex.org/W2033984339","doi":"https://doi.org/10.1145/1631272.1631412","title":"Digital logic based encoding strategies for steganography on voice-over-IP","display_name":"Digital logic based encoding strategies for steganography on voice-over-IP","publication_year":2009,"publication_date":"2009-10-19","ids":{"openalex":"https://openalex.org/W2033984339","doi":"https://doi.org/10.1145/1631272.1631412","mag":"2033984339"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1631272.1631412","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1041&context=cseconfwork","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100681240","display_name":"Hui Tian","orcid":"https://orcid.org/0000-0002-1591-656X"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Tian","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, CHINA"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, CHINA","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015061573","display_name":"Ke Zhou","orcid":"https://orcid.org/0000-0002-2161-8796"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Zhou","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, CHINA"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, CHINA","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054285749","display_name":"Hong Jiang","orcid":"https://orcid.org/0000-0002-1477-9751"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hong Jiang","raw_affiliation_strings":["University of Nebraska Lincoln, Lincoln, NE, USA."],"affiliations":[{"raw_affiliation_string":"University of Nebraska Lincoln, Lincoln, NE, USA.","institution_ids":["https://openalex.org/I114395901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057421680","display_name":"Dan Feng","orcid":"https://orcid.org/0000-0002-4674-6006"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dan Feng","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, CHINA"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, CHINA","institution_ids":["https://openalex.org/I47720641"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.873,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":7,"citation_normalized_percentile":{"value":0.730101,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":81,"max":82},"biblio":{"volume":"5681","issue":null,"first_page":"777","last_page":"780"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image Encryption Techniques","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-embedding","display_name":"Information Embedding","score":0.542021},{"id":"https://openalex.org/keywords/color-image-encryption","display_name":"Color Image Encryption","score":0.514513},{"id":"https://openalex.org/keywords/image-encryption","display_name":"Image Encryption","score":0.508224},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.50589603},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.41922158}],"concepts":[{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.7797295},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7649988},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.72909725},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.7139184},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.62387156},{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.6063316},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.50589603},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4299545},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.41922158},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33537808},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2123416},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20848453},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18106163},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09520632},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1631272.1631412","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1041&context=cseconfwork","pdf_url":"https://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1041&context=cseconfwork","source":{"id":"https://openalex.org/S4377196105","display_name":"Digital Commons - University of Nebraska Lincoln (University of Nebraska\u2013Lincoln)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114395901","host_organization_name":"University of Nebraska\u2013Lincoln","host_organization_lineage":["https://openalex.org/I114395901"],"host_organization_lineage_names":["University of Nebraska\u2013Lincoln"],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1041&context=cseconfwork","pdf_url":"https://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1041&context=cseconfwork","source":{"id":"https://openalex.org/S4377196105","display_name":"Digital Commons - University of Nebraska Lincoln (University of Nebraska\u2013Lincoln)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114395901","host_organization_name":"University of Nebraska\u2013Lincoln","host_organization_lineage":["https://openalex.org/I114395901"],"host_organization_lineage_names":["University of Nebraska\u2013Lincoln"],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1602245059","https://openalex.org/W1971037086","https://openalex.org/W2044370093","https://openalex.org/W2065552077","https://openalex.org/W2094710184","https://openalex.org/W2098827397","https://openalex.org/W2098910900","https://openalex.org/W2103228545","https://openalex.org/W2104452136","https://openalex.org/W2106968327","https://openalex.org/W2110507872","https://openalex.org/W2139208951","https://openalex.org/W2152431326","https://openalex.org/W2157428729","https://openalex.org/W2162864355","https://openalex.org/W2163545508","https://openalex.org/W2200061844","https://openalex.org/W2891878395","https://openalex.org/W49546894"],"related_works":["https://openalex.org/W4386040921","https://openalex.org/W2993764333","https://openalex.org/W2969135852","https://openalex.org/W2749819919","https://openalex.org/W2741704743","https://openalex.org/W2523525694","https://openalex.org/W2521839693","https://openalex.org/W2262810789","https://openalex.org/W2103238357","https://openalex.org/W2084179496"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"three":[3,75],"encoding":[4],"strategies":[5,29,62,133],"based":[6,121],"on":[7,12,122],"digital":[8,46],"logic":[9],"for":[10],"steganography":[11],"Voice":[13],"over":[14],"IP":[15],"(VoIP),":[16],"which":[17],"aim":[18],"to":[19],"enhance":[20,136],"the":[21,31,36,39,42,52,55,65,70,77,83,91,95,98,131,137,142],"embedding":[22,32,66,71,138,144],"transparency.":[23],"Differing":[24],"from":[25],"previous":[26],"approaches,":[27],"our":[28,61],"reduce":[30],"distortion":[33],"by":[34,59],"improving":[35],"similarity":[37],"between":[38],"cover":[40],"and":[41,90],"covert":[43,118],"message":[44],"using":[45],"logical":[47,81],"transformations,":[48],"instead":[49],"of":[50,54,97,102],"reducing":[51],"amount":[53],"substitution":[56],"bits.":[57],"Therefore,":[58],"contrast,":[60],"will":[63],"improve":[64],"transparency":[67,139],"without":[68],"sacrificing":[69],"capacity.":[72,145],"Of":[73],"these":[74],"strategies,":[76],"first":[78,99],"one":[79,85,93],"adopts":[80],"operations,":[82,89],"second":[84],"employs":[86],"circular":[87],"shifting":[88],"third":[92],"combines":[94],"operations":[96],"two.":[100],"All":[101],"them":[103],"are":[104],"evaluated":[105],"through":[106],"comparing":[107],"their":[108],"prototype":[109],"implementations":[110],"with":[111],"some":[112],"existing":[113],"methods":[114],"in":[115],"a":[116],"prototypical":[117],"communication":[119],"system":[120],"VoIP":[123],"(called":[124],"StegVoIP).":[125],"The":[126],"experimental":[127],"results":[128],"show":[129],"that":[130],"proposed":[132],"can":[134],"effectively":[135],"while":[140],"maintaining":[141],"maximum":[143]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2033984339","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2024-10-23T20:50:22.937301","created_date":"2016-06-24"}