1. Han J Q, Zhang L, Zheng T R. Speech signal processing. Beijing, China: Tsinghua University Press, 2004 (in Chinese)
2. Quatieri T F. Discrete-time speech signal processing: principles and practice. Upper Saddle River, NJ, USA: Prentice Hall, 2001
3. Shannon C E. Communication theory of secrecy systems. Bell System Technical Journal, 1948, 28(4): 656-715
4. Boccaletti S, Farini A, Arecchi F T. Adaptive synchronization of chaos for secure communication. Physical Review: E, 1997, 55(5): 4979-4981
5. Chen Z X, Tang Z L, Liao C J, et al. Quantum cryptography and secure communications. Chinese Journal of Quantum Electronics, 2003, 20(4): 385-390 (in Chinese)
6. Gibson J D, Kokes M G. Data embedding for secure communications. Proceedings of Military Communicationa Conference (MILCOM’02): Vol 1, Oct 7-10, Anaheim, CA, USA. Piscataway, NJ, USA: IEEE, 2002: 406-410
7. Wong P W, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing, 2001, 10(10): 1593-1601
8. Cooperman M, Moskowitz S. Steganographic method and device. USA Patent 5687236, 1997
9. Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding. IBM System Journal, 1996, 35(3/4): 313-336
10. Chuang C H, Lin G S. Adaptive steganography-based optical color image cryptosystems. Proceedings of International Symposium on Circuits and Systems (ISCAS’09), May 24-27, 2009, Taipei, China. New York, NY, USA: IEEE, 2009: 1669-1672
11. Petitcolas F A P, Anderson R J. Weaknesses of copyright marking systems. Proceedings of the 6th ACM International Multimedia and Security Workshop (Multimedia’98), Sep 12-16, 1998, Bristol, UK. New York, NY, USA: ACM, 1998: 55-62
12. Dong X X, Bocko M F, Ignjatovic Z. Data hiding via phase manipulation of audio signals. Proceedings of International Conference on Acoustics, Speech and Signal Proceesing (ICASSP’04): Vol 5, Mar 17-21, 2004, Montreal, Canada. Piscataway, NJ, USA: IEEE, 2004: 377-380
13. Gruhl D, Bender W, Lu A. Echo hiding. Proceedings of the 1st International Workshop on Information Hiding Information Hiding: first International Workshop (IHW’96), May 30-Jun 1, 1996, Cambridge, UK. LNCS 1174. Berlin, Germany: Springer-Verlag, 1996: 295-315
14. Chen O T C, Wu W C. Highly robust, secure, and perceptual-quality echo hiding scheme. IEEE Transactions on Audio, Speech, and Language Processing, 2008, 16(3): 629-638
15. Wu W C, Chen O T C, Wang Y H. An echo watermarking method using an analysis-by-synthesis approach. Proceeding of the 5th IASTED International Conference on Signal and Image Processing (SIP’03), Aug 13-15, 2003, Honolulu, HI, USA. Piscataway, NJ, USA: IEEE, 2003: 365-369
16. Ansari R, Malik H, Khokhar A. Data-hiding in audio using frequency- selective phase alteration. Proceedings of International Conference on Acoustics, Speech and Signal Proceesing (ICASSP’04): Vol 5, Mar 17-21, 2004, Montreal, Canada. Piscataway, NJ, USA: IEEE, 2004: 389-392
17. Munirajan V K, Cole E, Ring S. Transform domain steganography detection using fuzzy inference systems. Proceedings of the 6th International Symposium on Multimedia Software Engineering (MSE’04), Dec 13-15, 2004, Miami, FL, USA. Piscataway, NJ, USA: IEEE, 2004: 286-291
18. Charkari N M, Chahooki M A Z. A robust high capacity watermarking based on DCT and spread spectrum. Proceedings of the 7th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT’07), Dec15-18, 2007, Cairo, Egypt. Piscataway, NJ, USA: IEEE, 2007: 194-197
19. Wu Z J, Yang W. G.711-based adaptive speech information hiding approach. Proceedings of the 5th International Conference on Intelligent Computing (ICIC’06), Aug 16-19, 2006, Kunming, China. LNCS 4113. Berlin, Germany: Springer-Verlag, 2006: 1139-1144
20. Chen L, Zhang X W. Speech hiding algorithm based on speech parameter model. Chinese Journal of Computers, 2003, 26(8): 954-981(in Chinese)
21. Anas N M, Rahman Z, Shafii A,et al. Secure speech communication over public switched telephone network . Proceedings of the IEEE Asia Pacific Conference on Applied Electromagnetics (APACE’05), Dec 20-21, 2005, Johor, Malaysia. Piscataway, NJ, USA: IEEE, 2005: 4p
22. Wu Z J, Yang W, Yang Y X. ABS-based speech information hiding approach. Electronics Letters, 2003, 39(22): 1617-1619
23. Etemoglu C O,Cuperman V, Gersho A. Speech coding with an analysis- by-synthesis sinusoidal model. Proceedings of the 25th International Conference on Acoustics, Speech and Signal Processing (ICASSP’00): Vol 3, Jun 5-9, 2000, Istanbul, Turkey. Piscataway, NJ, USA: IEEE, 2000: 1371-1374
24. Voloshynovskiy S, Deguillaume F, Kovall O, et al. Information-theoretic data-hiding for public network security, services control and secure communications. Proceedings of the 6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service (TELSIKS’03): Vol 1, Oct 1-3, 2003, Nis, Serbia and Montenegro. Piscataway, NJ, USA: IEEE, 2003: 3-17
25. Moulin P, O’Sullivan J A. Information-theoretic analysis of information hiding. IEEE Transactions on Information Theory, 2003, 49(3): 563-593
26. Moulin P, O'Sullivan J A. Information-theoretic analysis of watermarking. Proceedings of the 25th International Conference on Acoustics,Speech and Signal Processing (ICASSP’00): Vol 6, Jun 5-9, 2000, Istanbul, Turkey. Piscataway, NJ, USA: IEEE, 2000: 3630-3633
27. Wu Z J, Hu Y, Niu X X, et al. Information hiding technique based speech secure communication over PSTN. The Chinese Journal of Electronics, 2006, 15(1): 108-112
28. Wu Z J, Yang W. Speech information hiding in G.729. The Chinese Journal of Electronics, 2006, 15(3): 545-549 |