参考文献/References:
[1] GU Chun-ying,GAO Xiao-li.Research on information hiding technology[C]// Proceedings of the 2nd International Conference on Consumer Electronics, Communications and Networks(CECNet).Yichang:IEEE Press,2012:2035-2037.
[2] MAZURCZYK W.VoIP steganography and its detection: A survey[J].ACM Computing Surveys,2013,2(46):20.
[3] FRACZEK W,MAZURCZYK W,SZCZYPIORSKI K.Hiding information in a stream control transmission protocol[J].Computer Communications,2012,2(35):159-169.
[4] XU Er-chi,LIU Bo,XU Li-yang.Adaptive VoIP steganography for information hiding within network audio streams[C]//Proceedings of the 14th International Conference on Network-Based Information Systems(NBiS).Tirana:IEEE Press,2011:612-617.
[5] MIAO Rui,HUANG Yong-feng.An approach of covert communication based on the adaptive steganography scheme on voice over IP[C]//Proceedings of the 46th IEEE International Conference on Communications(ICC).Kyoto:IEEE Press,2011:1-5.
[6] LIU Jin,ZHOU Ke,TIAN Hui.Least-significant-digit steganography in low bitrate speech[C]//Proceedings of the 47th IEEE International Conference on Communications(ICC).Ottawa:IEEE Press,2012:1109-1112.
[7] TIAN Hui,JIANG Hong,ZHOU Ke,et al.Adaptive partial-matching steganography for voice over IP using triple m sequences[J].Computer Communications,2011,34(18):2236-2247.
[8] XU Ting-ting,YANG Zhen.Simple and effective speech steganography in G.723.1 low-rate codes[C]//Proceedings of the 1st International Conference on Wireless Communications & Signal Processing.Nanjing:IEEE Press,2009:1-4.
[9] 杨俊,柏森,朱桂斌,等.G.723.1高速率语音流的信息隐藏算法[J].计算机工程,2011,37(22):114-115,118.
[10] LIU Li-hua,LI Ming-yu,LI Qiong,et al.Perceptually transparent information hiding in G.729 bitstream[C]//Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing.Harbin:IEEE Press,2008:406-409.
[11] HUANG Yong-feng,TANG Shan-yu.Steganography in inactive frames of VoIP streams encoded by source codec[J].IEEE Transactions on Information Forensics and Security,2011,6(2):296-306.
[12] HUANG Yong-feng,LIU Cheng-hao,TANG Shan-yu.Steganography integration into a low-bit rate speech codec[J].IEEE Transactions on Information Forensics and Security,2012,7(6):1865-1875.
[13] 刘程浩,柏森,黄永峰,等.一种基于基音预测的信息隐藏算法[J].计算机工程,2013,39(2):137-140.
[14] TIAN Hui,ZHOU Ke,FENG Dan.Dynamic matrix encoding strategy for voice-over-IP steganography[J].Journal of Central South University of Technology,2010,17(6):1285-1292.
[15] 贾俊,王朔中.基于LabVIEW平台的ABX测试系统[J].声学技术,2005,24(1):46-49.