A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

Comparative study of digital audio steganography techniques

F Djebbar, B Ayad, KA Meraim, H Hamam - EURASIP Journal on Audio …, 2012 - Springer
The rapid spread in digital data usage in many real life applications have urged new and
effective ways to ensure their security. Efficient secrecy can be achieved, at least in part, by …

A view on latest audio steganography techniques

F Djebbar, B Ayad, H Hamam… - … on Innovations in …, 2011 - ieeexplore.ieee.org
Steganography has been proposed as a new alternative technique to enforce data security.
Lately, novel and versatile audio steganographic methods have been proposed. A perfect …

Separable convolution network with dual-stream pyramid enhanced strategy for speech steganalysis

Y Qiu, H Tian, H Li, CC Chang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Steganography based on fixed codebook has become one of the most important branches
of speech steganography due to its high imperceptibility and having the largest available …

High capacity speech steganography for the G723. 1 coder based on quantised line spectral pairs interpolation and CNN auto-encoding

H Kheddar, D Megías - Applied Intelligence, 2022 - Springer
In this paper, a novel steganographic method for Voice over IP applications—called
Steganography-based Interpolation and Auto-Encoding (SIAE)—is proposed. The aim of the …

[HTML][HTML] Monitoring the security of audio biomedical signals communications in wearable IoT healthcare

S Yazdanpanah, SS Chaeikar, A Jolfaei - Digital Communications and …, 2023 - Elsevier
The COVID-19 pandemic has imposed new challenges on the healthcare industry as
hospital staff are exposed to a massive coronavirus load when registering new patients …

AMR steganalysis based on the probability of same pulse position

Y Ren, T Cai, M Tang, L Wang - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper presents a method for detection of adaptive multirate (AMR) audio
steganography. AMR audio codec is an audio data compression scheme optimized for …

The design and implementation of a steganographic communication system over in-band acoustical channels

T Chen, L Shangguan, Z Li, K Jamieson - ACM Transactions on Sensor …, 2023 - dl.acm.org
This article presents SoundSticker, a system for steganographic, in-band data
communication over an acoustic channel. In contrast with recent works that hide bits in …

AMR steganalysis based on second-order difference of pitch delay

Y Ren, J Yang, J Wang, L Wang - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
This paper presents a novel steganalysis scheme for the detection of adaptive multi-rate
(AMR) audio steganography. AMR audio codec is used widely in mobile communication and …

Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords

Y Qiu, H Tian, L Tang, W Mazurczyk… - Journal of Information …, 2022 - Elsevier
With the wide application of adaptive multi-rate (AMR) speech coder, steganography and
steganalysis based on AMR coded speech streams have become a hot spot in the field of …