Advanced audio coding steganography algorithm with distortion minimization model based on audio beat
Currently, most advanced audio coding (AAC) steganography methods are content-non-adaptive without considering the characteristics of audio, and there are several limitations in imperceptibility and steganalysis. In this paper, we use an audio feature beat as the anchor point to identify the cover e...
Uloženo v:
| Vydáno v: | Computers & electrical engineering Ročník 106; s. 108580 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Elsevier Ltd
01.03.2023
|
| Témata: | |
| ISSN: | 0045-7906, 1879-0755 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Currently, most advanced audio coding (AAC) steganography methods are content-non-adaptive without considering the characteristics of audio, and there are several limitations in imperceptibility and steganalysis. In this paper, we use an audio feature beat as the anchor point to identify the cover elements, group the quantized modified discrete cosine transform (QMDCT) coefficients in the small value area, and finally use the syndrome-trellis codes (STCs) framework for content-adaptive embedding to obtain the minimum distortion. In the STCs framework, we comprehensively consider auditory and data distortions. Experimental results demonstrate that the proposed steganography algorithm has a 10% improvement over the compared algorithms in terms of imperceptibility and steganalysis, and it can accurately extract secret information in face of frame loss and misalignment.
•A neural network is adopted to track the beats.•New distortion function of STCs framework is proposed.•Quantized modified discrete cosine transform coefficients in the small area are designed to be cover elements by beats.•Content-adaptive embedding algorithm is proposed. |
|---|---|
| AbstractList | Currently, most advanced audio coding (AAC) steganography methods are content-non-adaptive without considering the characteristics of audio, and there are several limitations in imperceptibility and steganalysis. In this paper, we use an audio feature beat as the anchor point to identify the cover elements, group the quantized modified discrete cosine transform (QMDCT) coefficients in the small value area, and finally use the syndrome-trellis codes (STCs) framework for content-adaptive embedding to obtain the minimum distortion. In the STCs framework, we comprehensively consider auditory and data distortions. Experimental results demonstrate that the proposed steganography algorithm has a 10% improvement over the compared algorithms in terms of imperceptibility and steganalysis, and it can accurately extract secret information in face of frame loss and misalignment.
•A neural network is adopted to track the beats.•New distortion function of STCs framework is proposed.•Quantized modified discrete cosine transform coefficients in the small area are designed to be cover elements by beats.•Content-adaptive embedding algorithm is proposed. |
| ArticleNumber | 108580 |
| Author | Li, Chen Zhang, Xue Tian, Lihua |
| Author_xml | – sequence: 1 givenname: Xue surname: Zhang fullname: Zhang, Xue – sequence: 2 givenname: Chen surname: Li fullname: Li, Chen email: lynnlc@126.com – sequence: 3 givenname: Lihua surname: Tian fullname: Tian, Lihua |
| BookMark | eNqNkE1LAzEQhoNUsK3-h_UHbM1msx85SSl-QcGLnsNsMt2m7CYliZX66926HsRTLzO8A_Mw88zIxDqLhNxmdJHRrLzbLZTr99ihQtsuGGX5MK-Lml6QaVZXIqVVUUzIlFJepJWg5RWZhbCjQy6zekr0Uh_AKtQJfGjjEuW0sW0SIrZgXethvz0m0LXOm7jtk8-hJtqE6Hw0zia9saY3XzAGp7FLGggDbYgjsEGI1-RyA13Am98-J--PD2-r53T9-vSyWq5TlbMspgACNGdlrksFVSN4xtVGcYFQlTXjTIgNY3mRa1GpsqkbBRxZASVDVWtOMZ-T-5GrvAvB40YqE39uix5MJzMqT9LkTv6RJk_S5ChtIIh_hL03PfjjWburcReHFw8GvQzK4Mmt8aii1M6cQfkG8fyTyQ |
| CitedBy_id | crossref_primary_10_1002_spy2_70060 crossref_primary_10_1016_j_compeleceng_2024_109766 crossref_primary_10_1007_s11042_023_16873_x crossref_primary_10_1016_j_compeleceng_2024_109267 crossref_primary_10_1016_j_compeleceng_2024_109960 crossref_primary_10_1109_ACCESS_2025_3567601 crossref_primary_10_1016_j_apacoust_2025_110696 crossref_primary_10_1016_j_compeleceng_2025_110112 crossref_primary_10_1016_j_jnlssr_2024_09_004 crossref_primary_10_1109_TASLPRO_2025_3570942 |
| Cites_doi | 10.1007/s10773-019-04251-z 10.1007/s11042-020-09344-0 10.1109/ICMULT.2010.5629745 10.1109/TITS.2020.2991766 10.1109/ACCESS.2021.3050004 10.1145/3015166.3015189 10.1109/TFUZZ.2020.2984991 10.1109/TIFS.2015.2486744 10.1109/TASLP.2021.3058892 10.1109/I2CT.2018.8529329 10.1109/JAS.2021.1004204 10.1109/TASL.2010.2098869 10.1109/ACCESS.2022.3155146 10.1109/TIFS.2011.2134094 |
| ContentType | Journal Article |
| Copyright | 2023 Elsevier Ltd |
| Copyright_xml | – notice: 2023 Elsevier Ltd |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.compeleceng.2023.108580 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1879-0755 |
| ExternalDocumentID | 10_1016_j_compeleceng_2023_108580 S0045790623000058 |
| GroupedDBID | --K --M .DC .~1 0R~ 1B1 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABEFU ABFNM ABJNI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADTZH AEBSH AECPX AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W JJJVA KOM LG9 LY7 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG ROL RPZ RXW SBC SDF SDG SDP SES SET SEW SPC SPCBC SST SSV SSZ T5K TAE TN5 UHS VOH WH7 WUQ XPP ZMT ~G- ~S- 9DU AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c321t-aa9ad4263d6ca7b9414cfc49ea76824299f22353d97c6b8bca4e25a62ec8d40e3 |
| ISICitedReferencesCount | 10 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000920205300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0045-7906 |
| IngestDate | Sat Nov 29 07:25:36 EST 2025 Tue Nov 18 22:43:38 EST 2025 Fri Feb 23 02:38:12 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | AAC Minimal distortion Content-adaptive embedding The small value area |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c321t-aa9ad4263d6ca7b9414cfc49ea76824299f22353d97c6b8bca4e25a62ec8d40e3 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_compeleceng_2023_108580 crossref_primary_10_1016_j_compeleceng_2023_108580 elsevier_sciencedirect_doi_10_1016_j_compeleceng_2023_108580 |
| PublicationCentury | 2000 |
| PublicationDate | March 2023 2023-03-00 |
| PublicationDateYYYYMMDD | 2023-03-01 |
| PublicationDate_xml | – month: 03 year: 2023 text: March 2023 |
| PublicationDecade | 2020 |
| PublicationTitle | Computers & electrical engineering |
| PublicationYear | 2023 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Heydari, Duan (b21) 2021 Zhu J, Wang R, Yan D. The Sign Bits of Huffman Codeword-Based Steganography for AAC Audio. In: 2010 International conference on multimedia technology. 2010, p. 1–4. Luo, Zhang, Li (b6) 2017 Nejad, Mosleh, Heikalabad (b9) 2019; 58 Li, Zhang, Luo, Tian (b12) 2020 Wei, Guo, Wang (b15) 2010 Thiede, Treurniet, Bitto, Schmidmer, Sporer, Beerends, Colomes (b28) 2000; 48 Böck S, Schedl M. Enhanced beat tracking with context-aware neural networks. In: Proc. int. conf. digital audio effects. 2011, p. 135–9. Zhang, Dong, Yang, Ying, Liu (b4) 2022 Zhu, Wang, Yan (b16) 2010 Lu, Zhang, Li, Jiang, Abbas (b1) 2021; 22 Zong, Xiang, Natgunanathan, Gao, Hua, Zhou (b10) 2021; 29 Ren, Xiong, Wang (b11) 2017 Shin D, Hong Y, Kim J, Choi J. Audio Blind Watermarking Robust Against HE-AAC. In: Proceedings of the 8th international conference on signal processing systems. 2016, p. 114–8. Zhang, Yi, Zhao (b14) 2020; 79 Sedighi, Cogranne, Fridrich (b24) 2015; 11 Lu, Tang, Sun (b7) 2021; 8 Filler, Judas, Fridrich (b23) 2011; 6 Ying, Wang, Lin, Yan (b25) 2021; 9 Wang, Yang, Yang, Zhang, Zhao (b27) 2019 Lu, Zhang, Xu, Li, Shen (b17) 2021; 29 Wang (b8) 2012 Dixon (b18) 2006 Shelke R, Nemade M. Audio Encryption Algorithm Using Modified Elliptical Curve Cryptography and Arnold Transform for Audio Watermarking. In: 2018 3rd International conference for convergence in technology. 2018, p. 1–4. . Mahmoud, Elshoush (b5) 2022; 10 Peeters, Papadopoulos (b20) 2010; 19 Ren, Cai, Wang (b13) 2021; 59 Eck, Lamere, Bertin-Mahieux, Green (b19) 2007; 20 Nejad (10.1016/j.compeleceng.2023.108580_b9) 2019; 58 Zong (10.1016/j.compeleceng.2023.108580_b10) 2021; 29 Filler (10.1016/j.compeleceng.2023.108580_b23) 2011; 6 10.1016/j.compeleceng.2023.108580_b22 10.1016/j.compeleceng.2023.108580_b2 10.1016/j.compeleceng.2023.108580_b3 10.1016/j.compeleceng.2023.108580_b26 Ren (10.1016/j.compeleceng.2023.108580_b13) 2021; 59 Lu (10.1016/j.compeleceng.2023.108580_b7) 2021; 8 Ying (10.1016/j.compeleceng.2023.108580_b25) 2021; 9 Lu (10.1016/j.compeleceng.2023.108580_b1) 2021; 22 Thiede (10.1016/j.compeleceng.2023.108580_b28) 2000; 48 Luo (10.1016/j.compeleceng.2023.108580_b6) 2017 Ren (10.1016/j.compeleceng.2023.108580_b11) 2017 Lu (10.1016/j.compeleceng.2023.108580_b17) 2021; 29 Heydari (10.1016/j.compeleceng.2023.108580_b21) 2021 Zhu (10.1016/j.compeleceng.2023.108580_b16) 2010 Sedighi (10.1016/j.compeleceng.2023.108580_b24) 2015; 11 Peeters (10.1016/j.compeleceng.2023.108580_b20) 2010; 19 Wang (10.1016/j.compeleceng.2023.108580_b27) 2019 Eck (10.1016/j.compeleceng.2023.108580_b19) 2007; 20 Dixon (10.1016/j.compeleceng.2023.108580_b18) 2006 Li (10.1016/j.compeleceng.2023.108580_b12) 2020 Wei (10.1016/j.compeleceng.2023.108580_b15) 2010 Mahmoud (10.1016/j.compeleceng.2023.108580_b5) 2022; 10 Zhang (10.1016/j.compeleceng.2023.108580_b4) 2022 Wang (10.1016/j.compeleceng.2023.108580_b8) 2012 Zhang (10.1016/j.compeleceng.2023.108580_b14) 2020; 79 |
| References_xml | – start-page: 217 year: 2017 end-page: 231 ident: b11 article-title: A steganalysis scheme for AAC audio based on MDCT difference between intra and inter frame publication-title: International workshop on digital watermarking – volume: 59 year: 2021 ident: b13 article-title: Secure AAC steganography scheme based on multi-view statistical distortion (SofMvD) publication-title: J Inform Secur Appl – volume: 29 start-page: 166 year: 2021 end-page: 176 ident: b17 article-title: Deep fuzzy hashing network for efficient image retrieval publication-title: Trans Fuz Sys – reference: Böck S, Schedl M. Enhanced beat tracking with context-aware neural networks. In: Proc. int. conf. digital audio effects. 2011, p. 135–9. – volume: 22 start-page: 3521 year: 2021 end-page: 3532 ident: b1 article-title: User-oriented virtual mobile network resource management for vehicle communications publication-title: IEEE Trans Intell Transp Syst – start-page: 4373 year: 2010 end-page: 4375 ident: b15 article-title: Controlling bitrate steganography on AAC audio publication-title: 2010 3rd International congress on image and signal processing, vol. 9 – start-page: 236 year: 2021 end-page: 240 ident: b21 article-title: Don’t look back: An online beat tracking method using RNN and enhanced particle filtering publication-title: ICASSP 2021-2021 IEEE International conference on acoustics, speech and signal processing – volume: 19 start-page: 1754 year: 2010 end-page: 1769 ident: b20 article-title: Simultaneous beat and downbeat-tracking using a probabilistic framework: Theory and large-scale evaluation publication-title: IEEE Trans Audio Speech Lang Process – volume: 9 start-page: 11705 year: 2021 end-page: 11715 ident: b25 article-title: Adaptive audio steganography based on improved syndrome-trellis codes publication-title: IEEE Access – volume: 6 start-page: 920 year: 2011 end-page: 935 ident: b23 article-title: Minimizing additive distortion in steganography using syndrome-trellis codes publication-title: IEEE Trans Inf Forensics Secur – volume: 20 start-page: 385 year: 2007 end-page: 392 ident: b19 article-title: Automatic generation of social tags for music recommendation publication-title: Adv Neural Inf Process Syst – volume: 10 start-page: 29954 year: 2022 end-page: 29971 ident: b5 article-title: Enhancing LSB using binary message size encoding for high capacity, transparent and secure audio steganography–An innovative approach publication-title: IEEE Access – reference: Zhu J, Wang R, Yan D. The Sign Bits of Huffman Codeword-Based Steganography for AAC Audio. In: 2010 International conference on multimedia technology. 2010, p. 1–4. – start-page: 177 year: 2017 end-page: 186 ident: b6 article-title: Adaptive audio steganography based on advanced audio coding and syndrome-trellis coding publication-title: International workshop on digital watermarking – volume: 58 start-page: 3828 year: 2019 end-page: 3851 ident: b9 article-title: An LSB-based quantum audio watermarking using MSB as arbiter publication-title: Internat J Theoret Phys – start-page: 111 year: 2020 end-page: 112 ident: b12 article-title: Audio steganography algorithm based on genetic algorithm for mdct coefficient adjustment for AAC publication-title: 2020 IEEE international symposium on multimedia – start-page: 1 year: 2010 end-page: 4 ident: b16 article-title: The sign bits of huffman codeword-based steganography for aac audio publication-title: 2010 International conference on multimedia technology – year: 2012 ident: b8 article-title: Implementation of voice encryption technology based on AAC audio coding and chaotic encryption publication-title: Modern Electron Tech – start-page: 431 year: 2022 end-page: 442 ident: b4 article-title: A CNN based visual audio steganography model publication-title: Artificial intelligence and security – volume: 29 start-page: 969 year: 2021 end-page: 984 ident: b10 article-title: Non-linear-echo based anti-collusion mechanism for audio signals publication-title: IEEE/ACM Trans Audio Speech Lang Process – volume: 8 start-page: 1868 year: 2021 end-page: 1876 ident: b7 article-title: DRRS-BC: Decentralized routing registration system based on blockchain publication-title: IEEE/CAA J Autom Sin – volume: 79 start-page: 27777 year: 2020 end-page: 27790 ident: b14 article-title: An AAC steganography scheme for adaptive embedding with distortion minimization model publication-title: Multimedia Tools Appl – reference: . – reference: Shelke R, Nemade M. Audio Encryption Algorithm Using Modified Elliptical Curve Cryptography and Arnold Transform for Audio Watermarking. In: 2018 3rd International conference for convergence in technology. 2018, p. 1–4. – reference: Shin D, Hong Y, Kim J, Choi J. Audio Blind Watermarking Robust Against HE-AAC. In: Proceedings of the 8th international conference on signal processing systems. 2016, p. 114–8. – year: 2019 ident: b27 article-title: Audio steganalysis dataset – start-page: 27 year: 2006 ident: b18 article-title: Mirex 2006 audio beat tracking evaluation: Beatroot publication-title: MIREX 2006 – volume: 11 start-page: 221 year: 2015 end-page: 234 ident: b24 article-title: Content-adaptive steganography by minimizing statistical detectability publication-title: IEEE Trans Inf Forensics Secur – volume: 48 start-page: 3 year: 2000 end-page: 29 ident: b28 article-title: PEAQ-The ITU standard for objective measurement of perceived audio quality publication-title: J Audio Eng Soc – start-page: 217 year: 2017 ident: 10.1016/j.compeleceng.2023.108580_b11 article-title: A steganalysis scheme for AAC audio based on MDCT difference between intra and inter frame – volume: 48 start-page: 3 issue: 1/2 year: 2000 ident: 10.1016/j.compeleceng.2023.108580_b28 article-title: PEAQ-The ITU standard for objective measurement of perceived audio quality publication-title: J Audio Eng Soc – start-page: 27 year: 2006 ident: 10.1016/j.compeleceng.2023.108580_b18 article-title: Mirex 2006 audio beat tracking evaluation: Beatroot – year: 2012 ident: 10.1016/j.compeleceng.2023.108580_b8 article-title: Implementation of voice encryption technology based on AAC audio coding and chaotic encryption publication-title: Modern Electron Tech – start-page: 111 year: 2020 ident: 10.1016/j.compeleceng.2023.108580_b12 article-title: Audio steganography algorithm based on genetic algorithm for mdct coefficient adjustment for AAC – volume: 58 start-page: 3828 issue: 11 year: 2019 ident: 10.1016/j.compeleceng.2023.108580_b9 article-title: An LSB-based quantum audio watermarking using MSB as arbiter publication-title: Internat J Theoret Phys doi: 10.1007/s10773-019-04251-z – start-page: 4373 year: 2010 ident: 10.1016/j.compeleceng.2023.108580_b15 article-title: Controlling bitrate steganography on AAC audio – volume: 79 start-page: 27777 issue: 37 year: 2020 ident: 10.1016/j.compeleceng.2023.108580_b14 article-title: An AAC steganography scheme for adaptive embedding with distortion minimization model publication-title: Multimedia Tools Appl doi: 10.1007/s11042-020-09344-0 – ident: 10.1016/j.compeleceng.2023.108580_b2 doi: 10.1109/ICMULT.2010.5629745 – start-page: 1 year: 2010 ident: 10.1016/j.compeleceng.2023.108580_b16 article-title: The sign bits of huffman codeword-based steganography for aac audio – volume: 22 start-page: 3521 issue: 6 year: 2021 ident: 10.1016/j.compeleceng.2023.108580_b1 article-title: User-oriented virtual mobile network resource management for vehicle communications publication-title: IEEE Trans Intell Transp Syst doi: 10.1109/TITS.2020.2991766 – volume: 9 start-page: 11705 year: 2021 ident: 10.1016/j.compeleceng.2023.108580_b25 article-title: Adaptive audio steganography based on improved syndrome-trellis codes publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3050004 – volume: 59 year: 2021 ident: 10.1016/j.compeleceng.2023.108580_b13 article-title: Secure AAC steganography scheme based on multi-view statistical distortion (SofMvD) publication-title: J Inform Secur Appl – start-page: 431 year: 2022 ident: 10.1016/j.compeleceng.2023.108580_b4 article-title: A CNN based visual audio steganography model – ident: 10.1016/j.compeleceng.2023.108580_b26 doi: 10.1145/3015166.3015189 – volume: 29 start-page: 166 issue: 1 year: 2021 ident: 10.1016/j.compeleceng.2023.108580_b17 article-title: Deep fuzzy hashing network for efficient image retrieval publication-title: Trans Fuz Sys doi: 10.1109/TFUZZ.2020.2984991 – volume: 20 start-page: 385 year: 2007 ident: 10.1016/j.compeleceng.2023.108580_b19 article-title: Automatic generation of social tags for music recommendation publication-title: Adv Neural Inf Process Syst – start-page: 177 year: 2017 ident: 10.1016/j.compeleceng.2023.108580_b6 article-title: Adaptive audio steganography based on advanced audio coding and syndrome-trellis coding – start-page: 236 year: 2021 ident: 10.1016/j.compeleceng.2023.108580_b21 article-title: Don’t look back: An online beat tracking method using RNN and enhanced particle filtering – ident: 10.1016/j.compeleceng.2023.108580_b22 – volume: 11 start-page: 221 issue: 2 year: 2015 ident: 10.1016/j.compeleceng.2023.108580_b24 article-title: Content-adaptive steganography by minimizing statistical detectability publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2015.2486744 – volume: 29 start-page: 969 year: 2021 ident: 10.1016/j.compeleceng.2023.108580_b10 article-title: Non-linear-echo based anti-collusion mechanism for audio signals publication-title: IEEE/ACM Trans Audio Speech Lang Process doi: 10.1109/TASLP.2021.3058892 – year: 2019 ident: 10.1016/j.compeleceng.2023.108580_b27 – ident: 10.1016/j.compeleceng.2023.108580_b3 doi: 10.1109/I2CT.2018.8529329 – volume: 8 start-page: 1868 issue: 12 year: 2021 ident: 10.1016/j.compeleceng.2023.108580_b7 article-title: DRRS-BC: Decentralized routing registration system based on blockchain publication-title: IEEE/CAA J Autom Sin doi: 10.1109/JAS.2021.1004204 – volume: 19 start-page: 1754 issue: 6 year: 2010 ident: 10.1016/j.compeleceng.2023.108580_b20 article-title: Simultaneous beat and downbeat-tracking using a probabilistic framework: Theory and large-scale evaluation publication-title: IEEE Trans Audio Speech Lang Process doi: 10.1109/TASL.2010.2098869 – volume: 10 start-page: 29954 year: 2022 ident: 10.1016/j.compeleceng.2023.108580_b5 article-title: Enhancing LSB using binary message size encoding for high capacity, transparent and secure audio steganography–An innovative approach publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3155146 – volume: 6 start-page: 920 issue: 3 year: 2011 ident: 10.1016/j.compeleceng.2023.108580_b23 article-title: Minimizing additive distortion in steganography using syndrome-trellis codes publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2011.2134094 |
| SSID | ssj0004618 |
| Score | 2.3625422 |
| Snippet | Currently, most advanced audio coding (AAC) steganography methods are content-non-adaptive without considering the characteristics of audio, and there are... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 108580 |
| SubjectTerms | AAC Content-adaptive embedding Minimal distortion The small value area |
| Title | Advanced audio coding steganography algorithm with distortion minimization model based on audio beat |
| URI | https://dx.doi.org/10.1016/j.compeleceng.2023.108580 |
| Volume | 106 |
| WOSCitedRecordID | wos000920205300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1879-0755 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0004618 issn: 0045-7906 databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1ba9swFBZZO8b2MLob6y5Fg70FF1uWL4K9hNGxlVL20EHezLGktC6pE9KkdP9-R5ZsK21HL9AXEzvoWMn3-ehY0vkOIV91moaZ1nEQqzQNuJYsEHnCAgn4TaR4GctGxPUgOzzMx2PxezD42-bCXEyzus4vL8X8UaHGawi2SZ29B9ydUbyAnxF0PCLseLwT8KN2VR9WqpoN5UzZKQN9DLXTpx7C9Hi2qJYnZ3YeVjVaIQ0TjNTImcvNtGVyhmagU2ZRwRos0Xv7IW1bF-K8YZEtq9Mgr3upw2vT0-NVR6iDyi77a29LsEuIqE5W4E9LsLjfl9W6Wm60MMN0zdWGvrM0iQ-2jNM1P26nFE4NDHPTcezxrrnLbt9mXTv7ypjW7TRsN7GdFp6pwpgqrKknZJNliUCfvjn6tTfe95JqIzuMu9_xjHzpNwf-p183BzdewHK0RV66Nw06sgx5RQa6fk1eePqTb4hquUIbaKnlCl3jCu24Qg1XaM8V6nOFNlyhDVconlqDhitvyZ8fe0fffwau7EYgYxYtAwAByuj4q1RCVgoecTmRXGjAV1Nm4pcJxpRJrEQm0zIvJXDNEkiZlrnioY7fkY16Vuv3hHKM_xOAEDTHuHuS51KZ2vaxBBGpDNg2ydv_q5BOk96URpkWt-K2TVjXdG6FWe7S6FsLSuEiTBs5Fki825t_eMg9P5Ln_fPxiWwsFyv9mTyVF8vqfLHjWPcP88enrA |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Advanced+audio+coding+steganography+algorithm+with+distortion+minimization+model+based+on+audio+beat&rft.jtitle=Computers+%26+electrical+engineering&rft.au=Zhang%2C+Xue&rft.au=Li%2C+Chen&rft.au=Tian%2C+Lihua&rft.date=2023-03-01&rft.issn=0045-7906&rft.volume=106&rft.spage=108580&rft_id=info:doi/10.1016%2Fj.compeleceng.2023.108580&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_compeleceng_2023_108580 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0045-7906&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0045-7906&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0045-7906&client=summon |