{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T05:28:34Z","timestamp":1745472514900,"version":"3.37.3"},"reference-count":101,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T00:00:00Z","timestamp":1612310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the channel to prevent privacy leakage and ensure data security; second, for illegal users, the use of VoIP Voice communication hides and transmits illegal information, leading to security incidents. Therefore, in recent years, steganography and steganography analysis based on VoIP have gradually become research hotspots in the field of information security. Steganography and steganalysis based on VoIP can be divided into two categories, depending on where the secret information is embedded: steganography and steganalysis based on voice payload or protocol. The former mainly regards voice payload as the carrier, and steganography or steganalysis is performed with respect to the payload. It can be subdivided into steganography and steganalysis based on FBC (fixed codebook), LPC (linear prediction coefficient), and ACB (adaptive codebook). The latter uses various protocols as the carrier and performs steganography or steganalysis with respect to some fields of the protocol header and the timing of the voice packet. It can be divided into steganography and steganalysis based on the network layer, the transport layer, and the application layer. Recent research results of steganography and steganalysis based on protocol and voice payload are classified in this paper, and the paper also summarizes their characteristics, advantages, and disadvantages. The development direction of future research is analyzed. Therefore, this research can provide good help and guidance for researchers in related fields.<\/jats:p>","DOI":"10.3390\/s21041032","type":"journal-article","created":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T01:31:51Z","timestamp":1612402311000},"page":"1032","source":"Crossref","is-referenced-by-count":20,"title":["Steganography and Steganalysis in Voice over IP: A Review"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0691-1767","authenticated-orcid":false,"given":"Zhijun","family":"Wu","sequence":"first","affiliation":[{"name":"School of Electronics & Information & Automation, Civil Aviation University of China, Tianjin 300300, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2728-1151","authenticated-orcid":false,"given":"Junjun","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Electronics & Information & Automation, Civil Aviation University of China, Tianjin 300300, China"}]},{"given":"Chenlei","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronics & Information & Automation, Civil Aviation University of China, Tianjin 300300, China"}]},{"given":"Changliang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electronics & Information & Automation, Civil Aviation University of China, Tianjin 300300, China"}]}],"member":"1968","published-online":{"date-parts":[[2021,2,3]]},"reference":[{"key":"ref_1","unstructured":"Shi, Y.Q., Kim, H.-J., and Perez-Gonzalez, F. (2020). Digital Forensics and Watermarking, Springer Science and Business Media LLC."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2018\/1781384","article-title":"Blind key based attack resistant audio steganography using cocktail party effect","volume":"2018","author":"Banik","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2018\/7096271","article-title":"An Adaptive Audio Steganography for Covert Wireless Communication","volume":"2018","author":"Xin","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"C198","DOI":"10.1152\/ajpcell.00336.2014","article-title":"The primary cilium as sensor of fluid flow\u2014New building blocks to the model","volume":"308","author":"Praetorius","year":"2015","journal-title":"AJP Cell Physiol."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/TSMC.2019.2903785","article-title":"Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques","volume":"50","author":"Khari","year":"2019","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Abikoye, O.C., Ojo, U.A., Awotunde, J.B., and Ogundokun, R.O. (2020). A safe and secured iris template using steganography and cryptography. Multimed. Tools Appl., Prepublish.","DOI":"10.1007\/s11042-020-08971-x"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s11042-011-0956-1","article-title":"VoIP encryption module for securing privacy","volume":"63","author":"Son","year":"2013","journal-title":"Multimed. Tools Appl."},{"key":"ref_8","first-page":"109646","article-title":"Randomness improvement of chaotic maps for image encryption in a wireless communication scheme using PIC-microcontroller via Zigbee channels","volume":"133","year":"2020","journal-title":"Chaos Solitons Fractals Interdiscip. J. Nonlinear Sci. Nonequilibrium Complex Phenom."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"25777","DOI":"10.1109\/ACCESS.2020.2971528","article-title":"A New High Capacity Image Steganography Method Combined with Image Elliptic Curve Cryptography and Deep Neural Network","volume":"8","author":"Duan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"32721","DOI":"10.1007\/s11042-019-7559-7","article-title":"Implementation of cryptography in steganography for enhanced security","volume":"78","author":"Antonio","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_11","unstructured":"(2021, January 10). FONDOPERLATERRA. Available online: https:\/\/zh.fondoperlaterra.org\/comdifference-between-steganography-and-cryptography-15."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Tian, H., Yanpeng, W., Yongfeng, H., Jin, L., Yonghong, C., Tian, W., and Yiqiao, C. (2015, January 24\u201327). Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions. Proceedings of the 2015 10th International Conference on Availability Reliability and Security, Toulouse, France.","DOI":"10.1109\/ARES.2015.21"},{"key":"ref_13","unstructured":"(2021, January 10). Baidu. Available online: https:\/\/baike.baidu.com\/item\/%E9%9A%90%E5%86%99%E5%88%86%E6%9E%90."},{"key":"ref_14","unstructured":"Qu, D., Wang, B., Li, B., Zhang, L., Chen, Q., and Zhang, W. (2010). VoIP Speech Processing and Recognition, National Defense Industry Press."},{"key":"ref_15","first-page":"73","article-title":"VoIP Steganography Methods, a Survey","volume":"19","author":"Deepikaa","year":"2019","journal-title":"Cybern. Inf. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2543581.2543587","article-title":"VoIP steganography and its Detection\u2014A survey","volume":"46","author":"Wojciech","year":"2013","journal-title":"ACM Comput. Surv."},{"key":"ref_17","unstructured":"Ren, Y., and Wang, L. (2016, January 14\u201316). An Overview of Steganography and steganalysis On CELP. Chinese Institute of Electronics Beijing Institute of Electronic Technology Application. Proceedings of the 13th National Conference on Information Hiding and Multimedia Information Security, Hefei, China."},{"key":"ref_18","first-page":"407","article-title":"IP voice steganography and steganalysis analysis","volume":"31","author":"Liu","year":"2019","journal-title":"J. Chongqing Univ. Posts Telecommun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"8447","DOI":"10.1007\/s11042-018-6867-7","article-title":"A novel steganographic method for algebraic-code-excited-linear-prediction speech streams based on fractional pitch delay search","volume":"78","author":"Liu","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Huang, D.-S., Jo, K.-H., Zhou, Y.-Q., and Han, K. (2013). Intelligent Computing Theories and Technology, Springer Science and Business Media LLC.","DOI":"10.1007\/978-3-642-39482-9"},{"key":"ref_21","unstructured":"Deng, S., Liu, J., and Zhang, W. (2007). Scenario of quantitative evaluation for steganalytic algorithms. J. Southeast Univ., 76\u201380."},{"key":"ref_22","unstructured":"Ge, X., Tian, H., and Guo, L. (2008). Principle and Application of Information Hiding, Tsinghua University Press."},{"key":"ref_23","unstructured":"Huang, Y., and Li, S. (2016). Network Covert Communication and Its Detection Technology, Tsinghua University Press."},{"key":"ref_24","unstructured":"Wang, H., and Tang, K. (2006). Low-Rate Speech Coding., National Defense Industry Press."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"12095","DOI":"10.1007\/s11042-017-4860-1","article-title":"An AMR adaptive steganography algorithm based on minimizing distortion","volume":"77","author":"Ren","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Sun, X., Pan, Z., and Bertino, E. (2018). Cloud Computing and Security, Springer Science and Business Media LLC.","DOI":"10.1007\/978-3-030-00012-7"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Tahilramani, N.V., and Bhatt, N. (2015, January 24\u201325). Steganography in speech signal with enhanced multi-pulse excitation codevector with reduced number of bits. Proceedings of the International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO 2015), Visakhapatnam, India.","DOI":"10.1109\/EESCO.2015.7254029"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s12652-015-0315-6","article-title":"Neighbor-index-division steganography based on QIM method for G.723.1 speech streams","volume":"7","author":"Tian","year":"2016","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"11493","DOI":"10.1007\/s11042-015-2865-1","article-title":"Incorporating data hiding into G.729 speech codec","volume":"75","author":"Yan","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"23308","DOI":"10.1109\/ACCESS.2020.2970194","article-title":"Adaptive Speech Information Hiding Method Based on K-Means","volume":"8","author":"Wu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_31","unstructured":"Sun, X., Pan, Z., and Bertino, E. (2020). Artificial Intelligence and Security, Springer Science and Business Media LLC."},{"key":"ref_32","unstructured":"Ren, Y., Yang, H., Wu, H., and Wang, L. (2019). A Secure Steganography Method for AMR Fixed Codebook Based on Pulse Distribution Model. (Patent CN201910347984.3)."},{"key":"ref_33","first-page":"1172","article-title":"Efficient linear predictive speech coding information hiding method","volume":"35","author":"Liu","year":"2014","journal-title":"Comput. Eng. Des."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Li, J., Liu, Z., and Peng, H. (2019). Security and Privacy in New Computing Environments, Springer Science and Business Media LLC.","DOI":"10.1007\/978-3-030-21373-2"},{"key":"ref_35","first-page":"539","article-title":"Application of HOOK Technology in Network Covert Communication","volume":"48","author":"Yuan","year":"2011","journal-title":"J. Sichuan Univ."},{"key":"ref_36","first-page":"1901","article-title":"Realization of stegnography based on speech of Bol SipPhone","volume":"28","author":"Yang","year":"2011","journal-title":"Appl. Res. Comput."},{"key":"ref_37","first-page":"290","article-title":"Steganographic model and method with instant communication speech stream as carrier","volume":"2","author":"Zhou","year":"2015","journal-title":"Comput. Eng. Des."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2837","DOI":"10.1007\/s11042-016-3257-x","article-title":"Steganography integrated into linear predictive coding for low bit-rate speech codec","volume":"76","author":"Li","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_39","unstructured":"Li, G., Zeng, R., and Lin, L. (September, January 30). Research on Vehicle License Plate Location Based on Neural Networks. Proceedings of the First International Conference on Innovative Computing, Information and Control\u2014Volume I (ICICIC\u201906), Beijing, China."},{"key":"ref_40","first-page":"100","article-title":"Research on self-adaption VoIP steganographic method based on LPC cepstrum distortion cost","volume":"4","author":"Yue","year":"2017","journal-title":"Wirel. Internet Technol."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1007\/s00530-015-0500-7","article-title":"Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec","volume":"23","author":"Liu","year":"2017","journal-title":"Multimed. Syst."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1585","DOI":"10.1007\/s11431-016-0707-3","article-title":"Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys","volume":"60","author":"Huang","year":"2017","journal-title":"Sci. China Technol. Sci."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1111\/coin.12253","article-title":"A steganographic method based on optimized audio embedding technique for secure data communication in the internet of things","volume":"36","author":"Anguraj","year":"2020","journal-title":"Comput. Intell."},{"key":"ref_44","unstructured":"Li, R. (2020). Bit-Grading-Based Adaptive G.729 Speech Information Hiding Method, Civil Aviation University of China."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1109\/TIFS.2016.2636087","article-title":"AMR Steganalysis Based on Second-Order Difference of Pitch Delay","volume":"12","author":"Ren","year":"2017","journal-title":"IEEE Trans Inf. Forensics Secur."},{"key":"ref_46","first-page":"137","article-title":"An Information Hiding Algorithm Based on Pitch Prediction","volume":"39","author":"Liu","year":"2013","journal-title":"Comput. Eng."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1011","DOI":"10.1109\/TASLP.2017.2676356","article-title":"Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals","volume":"25","author":"Li","year":"2017","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"ref_48","first-page":"1774","article-title":"Steganography for low bit-rate speech based on pitch period prediction","volume":"32","author":"Yan","year":"2015","journal-title":"Appl. Res. Comput."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Janicki, A. (2015, January 24\u201328). Novel method of hiding information in IP telephony using pitch approximation. Proceedings of the International Workshop on Cyber Crime (IWCC2015), Toulouse, France.","DOI":"10.1109\/ARES.2015.12"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"2923","DOI":"10.1002\/sec.1428","article-title":"Pitch-based steganography for Speex voice codec","volume":"9","author":"Janicki","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_51","unstructured":"Yang, J. (2017). Research on Technologies of AMR Steganography and Steganalysis Based on Pitch Delay, Wuhan University."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"2236","DOI":"10.1016\/j.comcom.2011.07.003","article-title":"Adaptive partial-matching steganography for voice over IP using triple M sequences","volume":"34","author":"Tian","year":"2011","journal-title":"Comput. Commun."},{"key":"ref_53","unstructured":"Liu, X. (2020). Speech Steganography Based on Adaptive Codebook Partition and Its Detection, Huaqiao University."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Han, W., Zhu, L., and Yan, F. (2020). Trusted Computing and Information Security, Springer Science and Business Media LLC.","DOI":"10.1007\/978-981-15-3418-8"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"101952","DOI":"10.1016\/j.cose.2020.101952","article-title":"Covert timing channel detection method based on time interval and payload length analysis","volume":"97","author":"Han","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/s11431-015-5955-4","article-title":"Covert voice over internet protocol communications based on spatial model","volume":"59","author":"Huang","year":"2016","journal-title":"Sci. China"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Peng, B., and Yang, J. (2017, January 27\u201330). An optimized algorithm based on generalized difference expansion method used for HEVC reversible video information hiding. Proceedings of the 2017 IEEE 17th International Conference on Communication Technology (ICCT), Chengdu, China.","DOI":"10.1109\/ICCT.2017.8359914"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Li, F., Li, B., Huang, Y., Feng, Y., Peng, L., and Zhou, N. (2020). Research on covert communication channel based on modulation of common compressed speech codec. Neural Comput. Appl., 1\u201314.","DOI":"10.1007\/s00521-020-04882-y"},{"key":"ref_59","unstructured":"Gong, M. (2015). Research and Realization of Information Hiding Based on Network Protocol. [Ph.D. Thesis, Nanjing University of Posts and Telecommunications]."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2961053","article-title":"Covert Voice over Internet Protocol Communications with Packet Loss Based on Fractal Interpolation","volume":"12","author":"Jiang","year":"2016","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Lu, X., Huang, L., Yang, W., and Shen, Y. (2016, January 18\u201321). Concealed in the Internet: A Novel Covert Channel with Normal Traffic Imitating. Proceedings of the 13th IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld), Toulouse, France.","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0060"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"1509","DOI":"10.1002\/sec.1440","article-title":"Detecting JitterBug covert timing channel with sparse embedding: Covert timing channel detection","volume":"11","author":"Zhai","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_63","unstructured":"Schmidt, S.S., Mazurczyk, W., Keller, J., and Caviglione, L. (September, January 29). A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression. Proceedings of the 12th International Conference on Availability, Reliability and Security, ACM, Reggio Calabria, Italy."},{"key":"ref_64","first-page":"102","article-title":"Coverless VoIP Steganography Using Hash and Hash","volume":"20","author":"Deepikaa","year":"2020","journal-title":"Cybern. Inf. Technol."},{"key":"ref_65","first-page":"111","article-title":"Research and improvement of FTP protocol information hiding method","volume":"127","author":"Li","year":"2013","journal-title":"Comput. Eng. Appl."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"147513","DOI":"10.1109\/ACCESS.2019.2945050","article-title":"Speech Information Hiding Algorithm Based on Complete Binary Tree Dynamic Codebook Grouping","volume":"7","author":"Wu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_67","first-page":"2944","article-title":"Covert channels of FTP protocol based on encoding directory","volume":"37","author":"Yao","year":"2016","journal-title":"Comput. Eng. Des."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.sigpro.2016.11.013","article-title":"Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs","volume":"134","author":"Tian","year":"2017","journal-title":"Signal Process."},{"key":"ref_69","unstructured":"Miao, H., Huang, L., Shen, Y., Lu, X., and Chen, Z. (2013, January 1\u20134). Steganalysis of Compressed Speech Based on Markov and Entropy. Proceedings of the Digital-Forensics and Watermarking: 12th International Workshop, IWDW 2013, Auckland, New Zealand."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"6143","DOI":"10.1007\/s11042-016-3264-y","article-title":"Steganalysis of MP3Stego with low embedding-rate using Markov feature","volume":"76","author":"Jin","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"8513","DOI":"10.1007\/s11042-018-6941-1","article-title":"An improved entropy-based approach to steganalysis of compressed speech","volume":"78","author":"Guo","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"1801","DOI":"10.1109\/TIFS.2015.2421322","article-title":"AMR Steganalysis Based on the Probability of Same Pulse Position","volume":"10","author":"Ren","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Yang, J., Liu, P., and Li, S. (2019). A Common Method for Detecting Multiple Steganographies in Low-Bit-Rate Compressed Speech Based on Bayesian Inference. IEEE Access, 9.","DOI":"10.1109\/ACCESS.2019.2939629"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"2934","DOI":"10.1002\/sec.1443","article-title":"Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics","volume":"9","author":"Tian","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_75","first-page":"1","article-title":"Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate","volume":"2017","author":"Tian","year":"2017","journal-title":"Mob. Inf. Syst."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Gong, C., Yi, X., Zhao, X., and Ma, Y. (2019). Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position. Inf. Hiding Multimed. Secur., 2\u201313.","DOI":"10.1145\/3335203.3335708"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"140957","DOI":"10.1109\/ACCESS.2019.2943504","article-title":"Steganalysis of AMR Speech Based on Multiple Classifiers Combination","volume":"7","author":"Tian","year":"2019","journal-title":"IEEE Access"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Sun, C., Tian, H., Chang, C.-C., Chen, Y., Cai, Y., Du, Y., Chen, Y.-H., and Chen, C.C. (2020). Steganalysis of Adaptive Multi-Rate Speech Based on Extreme Gradient Boosting. Electronics, 9.","DOI":"10.3390\/electronics9030522"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"1168","DOI":"10.3724\/SP.J.1016.2013.01168","article-title":"Detection of QIM Steganography in Low Bit-Rate Speech Codec Based on Statistical Models and SVM","volume":"36","author":"Li","year":"2013","journal-title":"Chin. J. Comput."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"1854","DOI":"10.1109\/TIFS.2018.2806741","article-title":"RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network","volume":"13","author":"Lin","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"15431","DOI":"10.1007\/s11042-017-5123-x","article-title":"A new audio steganalysis method based on linear prediction","volume":"77","author":"Han","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_82","first-page":"44","article-title":"A Common Steganalysis Method for Steganography in Low-bit-rate Speech","volume":"8","author":"Li","year":"2019","journal-title":"New Netw. Media Technol."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Wu, Z., Li, R., Yin, P., and Li, C. (2020). Steganalysis of Quantization Index Modulation Steganography in G.723.1 Codec. Future Internet, 12.","DOI":"10.3390\/fi12010017"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1109\/LSP.2019.2961610","article-title":"Fast Steganalysis Method for Voip Streams","volume":"27","author":"Yang","year":"2020","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_85","first-page":"2418","article-title":"AMR-WB Steganalysis based on Hybrid Classifier","volume":"53","author":"Wu","year":"2020","journal-title":"Commun. Technol."},{"key":"ref_86","first-page":"2107","article-title":"Detection of Pitch Modulation Information Hiding Based on Codebook Correla-tion Network","volume":"37","author":"Li","year":"2014","journal-title":"Chin. J. Comput."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Ren, Y., Zhong, S., Tu, W., Yang, H., and Wang, L. (2020). A SILK Adaptive Steganographic Scheme Based on Minimizing Distortion in Pitch Domain. IETE Tech. Rev.","DOI":"10.1080\/02564602.2020.1757520"},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1109\/TIFS.2009.2024718","article-title":"Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis","volume":"4","author":"Liu","year":"2009","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_89","first-page":"22","article-title":"AMR steganalysis algorithm based on intra-group correlation of pitch delay","volume":"46","author":"Ren","year":"2018","journal-title":"J. South China Univ. Technol."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"8091","DOI":"10.1007\/s11042-018-6600-6","article-title":"An AMR adaptive steganographic scheme based on the pitch delay of unvoiced speech","volume":"78","author":"Ren","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"66","DOI":"10.4018\/IJDCF.2019100105","article-title":"Steganalysis of AMR Based on Statistical Features of Pitch Delay","volume":"11","author":"Wu","year":"2019","journal-title":"Int. J. Digit. Crime Forensics"},{"key":"ref_92","unstructured":"Huang, M. (2019). Steganalysis Techniques for Adaptive Multi-Rate Speech, Huaqiao University."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.neucom.2020.08.002","article-title":"Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams","volume":"419","author":"Hu","year":"2021","journal-title":"Neurocomputing"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"6117","DOI":"10.1109\/ACCESS.2019.2962009","article-title":"Detecting Steganography In Inactive Voice-over-ip Frames Based On Statistic Characteristics of Fundamental Frequency","volume":"8","author":"Tian","year":"2020","journal-title":"IEEE Access"},{"key":"ref_95","unstructured":"Wang, C. (2009). The Study on Covert Channel Detection in the ICMP Payload Based on Information Entropy SVM, Jiangsu University."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1109\/TIFS.2012.2231861","article-title":"Detecting Covert Channels in Computer Networks Based on Chaos Theory","volume":"8","author":"Zhao","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1007\/s12243-013-0385-4","article-title":"Steganalysis of transcoding steganography","volume":"69","author":"Janicki","year":"2014","journal-title":"Ann. Tele-Commun."},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Zhao, H., and Zhang, X. (2012, January 7). SIP Steganalysis Using Chaos Theory. Proceedings of the 2012 International Conference on Computing, Measurement, Control and Sensor Network 2012, Washington, DC, USA.","DOI":"10.1109\/CMCSN.2012.25"},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"1680","DOI":"10.1109\/ACCESS.2019.2961609","article-title":"Efficient NonLinear Covert Channel De-tection in TCP Data Streams","volume":"8","author":"Nafea","year":"2020","journal-title":"IEEE Access"},{"key":"ref_100","first-page":"918","article-title":"Steganalysis method for have message in BitTorrent protocol","volume":"36","author":"Xu","year":"2019","journal-title":"Appl. Res. Comput."},{"key":"ref_101","first-page":"315","article-title":"Steganographic ANALYSIS of Piece message in bittorrent protocol","volume":"37","author":"Xing","year":"2020","journal-title":"Comput. Appl. Softw."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/4\/1032\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T22:04:45Z","timestamp":1720389885000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/4\/1032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,3]]},"references-count":101,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2021,2]]}},"alternative-id":["s21041032"],"URL":"https:\/\/doi.org\/10.3390\/s21041032","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2021,2,3]]}}}