Citation: | WU Zhijun, CAO Haijuan, LI Douzhe, “An Approach of Steganography in G.729 Bitstream Based on Matrix Coding and Interleaving,” Chinese Journal of Electronics, vol. 24, no. 1, pp. 157-165, 2015, |
Rui MIAO and Yongfeng HUANG, "An approach of covert communication based on the adaptive steganography scheme on voice over IP", Proceedings in IEEE International Conference on Communications, pp.1-5, 2011.
|
Hui TIAN, "Study on cover communication based on streaming media", PhD thesis, Huazhong University of Science and Technology, 2010. (in Chinese)
|
S. Zander, G. Armitage and P. Branch, "Covert channels and countermeasures in computer network protocol", IEEE Communication Magazine, 45(12): 136-142, 2007.
|
S.H. Sellke, C. Wang, S. Bagchi and N. Shroff, "TCP/IP timing channels: Theory to implementation", Proceedings of the 28th IEEE International Conference on Computer Communications, Rio de Janeiro, Brazil, pp.2204-2212, 2009.
|
W. Mazurczyk and J. Lubacz, "LACK-A VoIP Steganographic Method", Springer’s Telecommunication Systems Journal, Vol.45, No.2-3, pp.153-163, 2010.
|
W. Mazurczyk and J. Lubacz, "Steganography of VoIP streams", Proceedings of the 3rd International Symposium on Information Security, Monterrey, Mexico, Vol.abs/0805.2, pp.1001-1018, 2008.
|
Hatada Mitsuhiro, Sakai Toshiyuki, Komatsu Naohisa and Yamazaki Yasushil, "A study on digital watermarking based on process of speech production", Information Processing Society of Japan, Special Interest Group notes, No.43, 37-42, 2002.
|
Zhijun WU and Wei YANG, "Speech Information Hiding in G.729", Chinese Journal of Electronics, Vol.15, No.3, pp.545- 549, 2006.
|
Yamin SU, Yongfeng HUANG and Xing LI, "Steganographyoriented noisy resistance model of G.729a", IMACS Multiconference on Computational Engineering in Systems Applications, Beijing, China, pp.11-15, 2006.
|
N. Aoki, "A technique of lossless steganography for G.711 telephony speech", Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, WashingtonDC, USA: IEEE Computer Society, pp.608-611, 2008.
|
B. Xiao, Y. Huang, S. Tang, "An approach to information hiding in low bit-rate speech stream", Proceedings of the 2008 IEEE Global Telecommunications Conference, New Orleans, LA, USA, pp.1-5, 2008.
|
Yimin CHENG, Zhichuan GUO, Chunhui XIE, Yuming XIE, "Covert communication method based on GSM for low-bit-rate speech", Journal of Circuits and Systems, Vol.13, No.2, pp.83- 88, 2008.
|
Hui TIAN, Ke ZHOU, Hong JIANG and Dan FENG, "Adaptive partial-matching steganography for voice over IP using triple M sequence", Computer Communications, Vol.34, No.18, pp.2236-2247, 2011.
|
Hui Tian, Ke Zhou and Dan Feng, "Dynamic matrix encoding strategy for voice-over-IP steganography", Journal of Central South University of Technology, Vol.17, No.6, pp.1285-1292, 2010.
|
Pao-Chi Chang, Hsin-Min Yu, "Dither-like data hiding in multistage vector quantization of MELP and G.729 speech coding", Signals, Systems and Computers, 2002. Conference Record of the Thirty-Sixth Asilomar Conference on Vol.2, pp.1199-1203, 2002.
|
Yongfeng HUANG, Shanyu TANG and Jian YUAN, "Steganography in inactive frame of VoIP streams encoded by source codec", IEEE Transaction on Information Forensics and Security, Vol.6, No.2, pp.296-306, 2011.
|
Y. Huang, S. Tang, C. Bao and Y.J. Yip, "Steganalysis of compressed speech to detect covert voice over internet protocol channels", IET Information Security, Vol1.5, Iss.1, pp.26-32, 2011.
|
ITU-T Recommendation G.729 (01/07): 1997, G.729: Coding of speech at 8 kbit/s using conjugate-structure algebraic-codeexcited linear prediction (CS-ACELP).
|
Hae Y Yang, Kyunng H Lee and Sang H Lee, "Method and apparatus for partially encrypting speech packets", United States Patent Publication, Pub. No. US 2009/0041231 A1, 2009.
|
FadiAlmasalha, AshfaqKhokhar, Afshan Amin and Shahab- Baqai, "Scalable security of streaming multimedia contents", The 2nd IEEE workshop on Wireless and Internet Services, Zurich, Switzerland, pp.977-981, 2009.
|
A. Westfeld, "F5-A steganographic algorithm", Proceedings of the 4th International Workshop on Information Hding, Vol.3137 of Lecture Notes in Computer Science, pp.289-302, 2001.
|
J. Fridrich and D. Soukal, "Matrix embedding for large payloads", IEEE Transactions on Information Security and Forensics, Vol.1, No.3, pp.390-395, 2006.
|
M. Khatirinejad and P. Lisonek, "Linear codes for high payload steganography", Discrete Applied Mathematics, Vol.157, No.5, pp.971-981, 2009.
|
Qi Ding and Xijian Ping, "Steganalysis of compressed speech based on statistics of pulse position parameters", Computer Science, Vol.38, No.1, pp.217-220, 2011.
|
ITU P.862: 2005, ITU recommendation for calculating telephone call quality using the Perceptual evaluation of speech quality (PESQ) method.
|
Lihua Liu, Mingyu Li, Qiong Li and Yan liang, "Perceptually transparent information hiding in G.729 bitstream", Proc. 2008 4th Int. Conf. Intelligent Inf. Hiding Multimedia Signal Process. (IIH-MSP), Harbin, pp.406-409, 2008.
|