[1] |
MURDOCH S , LEWIS S . Embedding covert channels into TCP/IP[C]// Proceedings of 7th Information Hiding Workshop. Barcelona, Spain, 2005,3727:247-261.
|
[2] |
CABUK S , BRODLEY C E , SHIELDS C . IP covert timing channels:design and detection[C]// Proceedings of the 11th ACM Conference on Computer and Communications Security. CCS 2004, Washington, DC, USA, 2004:178-187.
|
[3] |
DITTMANN J , HESSE D , HILLERT R . Steganography and stegana-lysis in voice over IP scenarios: operational aspects and first experi-ences with a new steganalysis tool set[C]// Proceedings of SPIE Secu-rity, Steganography, and Watermarking of Multimedia Contents. San Jose, California, USA, 2005,5681:607-618.
|
[4] |
WEI Z , ZHAO B , LIU B , et al. A novel steganography approach for voice over IP[J]. Journal of Ambient Intelligence & Humanized Com-puting, 2014,5(4):601-610.
|
[5] |
GEISER B , VARY P . High rate data hiding in ACELP speech codecs[C]// Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing. Las Vegas, Nevada, USA, 2008:4005-4008.
|
[6] |
HUANG Y F , LIU C H , TANG S Y , et al. Steganography integration into a low-bit rate speech codec[J]. IEEE Transaction on Information Forensics and Security, 2012,7(6):1865-1875.
|
[7] |
ZHAO M , DANG Y . Color image copyright protection digital water-marking algorithm based on DWT&DCT[C]// Proceedings of 2008 International Conference on Wireless Communications, Networking and Mobile Computing. Dalian, China, 2008:659-662.
|
[8] |
COX I J , KILIAN J , LEIGHTON F T , et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Proc-essing, 1997,6(12):1673-1687.
|
[9] |
李晓博, 周诠 . 统计量移位的鲁棒无损图像信息隐藏[J]. 中国图象图形学报, 2012,17(11):1359-1366. LI X B , ZHOU Q . Robust lossless image data hiding with statistical quantity shifting[J]. Journal of Image and Graphics, 2012,17(11):1359-1366.
|
[10] |
SOLANKI K , SARKAR A , MANJUNATH B S . YASS: yet another steganographic scheme and resists blind steganalysis[C]// Proceedings of 9th international Workshop on Informtion Hiding. Saint Malo, France, 2007:16-31.
|
[11] |
SARKAR A , MADHOW U , MANJUNATH B S . Matrix embedding with pseudorandom coefficient selection and error correction for ro-bust and secure steganography[J]. IEEE Transactions on Information Forensics and Security, 2010,5(2):225-239.
|
[12] |
LIU W W , LIU G J , DAI Y W . Damage-resistance matrix embedding framework: the contradiction between robustness and embedding effi-ciency[J]. Security and Communication Networks, 2015,8(9):1636-1647.
|
[13] |
FILLER T , JUDAS J , FRIDRICH J . Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011,6(3):920-935.
|
[14] |
TIAN H , QIN J , HUANG Y , et al. Optimal matrix embedding for voice-over-IP steganography[J]. Signal Processing, 2015,117:33-43.
|
[15] |
YAN S , TANG G , SUN Y , et al. A triple-layer steganography scheme for low bit-rate speech streams[J]. Multimedia Tools & Applications, 2015,74(24):11763-11782.
|
[16] |
LIU J , ZHOU K , TIAN H . Frame-bitrate-change based steganography for voice-over-IP[J]. Journal of Central South University, 2014,21(12):4544-4552.
|
[17] |
罗象宏, 舒继武 . 存储系统中的纠删码研究综述[J]. 计算机研究与发展, 2012,49(1):1-11. LUO X H , SHU J W . Summary of research for erasure code in storage system[J]. Journal of Computer Research and Development, 2012,49(1):1-11.
|
[18] |
黄永峰, 李星 . IP语音包的自适应编码和封装算法的研究[J]. 电子与信息学报, 2002,24(12):1829-1834. HUANG Y F , LI X . An adaptive voice coding and packeting scheme for IP telephony[J]. Journal of Electronics & information Technology, 2002,24(12):1829-1834.
|