Citation: | YANG Wanxia, TANG Shanyu, LI Miaoqi, et al., “Steganalysis of Low Embedding Rates LSB Speech Based on Histogram Moments in Frequency Domain,” Chinese Journal of Electronics, vol. 26, no. 6, pp. 1254-1260, 2017, doi: 10.1049/cje.2017.09.026 |
H. Tian, S.T. Guo, J. Qin, Y.F. Huang, et al., "Adaptive Voice-over-IP steganography based on quantitative performance ranking", Acta Electronica Sinica, Vol.44, No.11, pp.2736-2740, 2016. (In Chinese)
|
Y.F. Huang, S.Y. Tang, J. Yuan, "Steganography in inactive frames of VoIP streams encoded by source codec", IEEE Transactions on Information Forensics and Security, Vol.6, No.2, pp.296-306, 2011.
|
Y.F. Huang, S.Y. Tang, W.X. Yang, "An information theoretical model for streaming media based stegosystems", Computing and Informatics, Vol.32, No.1, pp.57-62, 2013.
|
Z.H. Xia, X.H. Wang, X.M. Sun, et al., "Steganalysis of LSB matching using differences between nonadjacent pixels", Multimed Tools Appl, Vol.75, No.4, pp.1947-1962, 2016.
|
Z.H. Xia, X.H. Wang, X.M. Sun and B.W. Wang, "Steganalysis of LSB matching using differences between nonadjacent pixels", Security and Communication Networks, Vol.7, No.8, pp.1283-1291, 2014.
|
G.X. Wang, X.J. Ping, M.K. Xu, et al., "A steganalysis method based on spacing statistics of short duplicate code", Science in China Series F:Information Sciences, Vol.39, No.4, pp.416-421, 2009.
|
S.P. Zhong, Q.F. Xu, Y.Z. Chen, et al., "A universal steganalysis method based on local features extracted from LSB sequences", Acta Electronica Sinica, Vol.41, No.2, pp.239-247, 2013. (In Chinese)
|
S. Lyu and H. Farid, "Detecting hidden message using higherorder statistics and support vector machines", The 5th International Workshop on Information Hiding, Noodwijkerhout, Netherlands, Vol.2578, pp.340-354, 2002.
|
J.J. Gao, G.R. Xuan and Y.Q. Shi, "Image steganalysis based on statistical moments in the frequency domain of the histogram", Journal of Computer Applications, Vol.25, No.10, pp.2370-2373, 2005. (In Chinese)
|
Y.F. Huang, S. Tang and Y. Zhang, "Detection of covert voiceover Internet protocol communications using sliding windowbased steganalysis", IET Communications, Vol.5, No.7, pp.929-936, 2011.
|
H. Tao, D. Sun and Y. Huang, "A detection method of subliminal channel based on VoIP communication", In Proceedings of the 1st International Workshop on Information Hiding and Its Criteria for Evaluation, New York, USA, pp.37-41, 2014.
|
D.Q. Yan and R.D. Wang, "Detection of MP3stego exploiting recompression calibration-based feature", Multimedia Tools & Applications, Vol.72, No.1, pp.865-878, 2014.
|
H.G. Guo, D.Q. Yan, R.D. Wang, Z.Y. Wang, L. Wang and L.Q. TU, "Mp3 Steganalysis based On difference statistics", Computer Engineering and Applications, Vol.51, No.7, pp.88-92, 2015. (In Chinese)
|
Y.C. Qi, J.W. Fu and J.S. Yuan, "Wavelet domain audio steganalysis based on statistical moments of histogram", Journal of System Simulation, Vol.20, No.7, pp.1912-1914, 2008. (In Chinese)
|
C.M. WU, "Studies on mathematical model of histogram equalization", Acta Electronica Sinica, Vol.41, No.3, pp.598-601, 2013. (In Chinese)
|
M.Q. Zhang, G. Yang and Z. Zhang, "Noise endurance steganalysis algorithm based on WPD", Journal of Chinese Computer Systems, Vol.35, No.4, pp.941-944, 2014. (In Chinese)
|
J. Li, X.L. Li, B. Yang and X.M. Sun, "Segmentation-based image copy-move forgery detection scheme", IEEE Transactions on Information Forensics and Security, Vol.10, No.3, pp.507-518, 2015.
|
Z.J. Wu, H.J. Cao and D.Z. Li. "An approach of steganography in G.729 bitstream based on matrix coding and inter leaving", Chinese Journal of Electronics, Vol.24, No.1, pp.157-165, 2015.
|