H. I. Shahadi and R. Jidin, High capacity and inaudibility audio steganography scheme, Proc.
2011 7th Int. Conf. Inf. Assur. Secur. IAS 2011, pp. 104–109, 2011.
Zhijun W, Haijuan C, and Douzhe L, “An approach of steganography in G.729 bitstream based
on matrix coding and interleaving,” Chinese J. Electron., vol. 24 no.1, pp. 157–165, 2015.
R. Setiawan and T. Ahmad, “Improving the Capacity of Data Hiding by Modifying the
Interpolation of Audio Samples,” 2020 8th Int. Conf. Inf. Commun. Technol. ICoICT 2020,
pp. 7–12, 2020.
C. Wang and Q. Wu, “Information hiding in real-time VoIP streams,” Proc. - 9th IEEE Int.
Symp. Multimedia, ISM 2007, pp. 255–262, 2007.
A. H. Ali, M. R. Mokhtar, and L. E. George, “Recent approaches for VoIP steganography,”
Indian J. Sci. Technol., vol. 9, no. 38, 2016.
N. Shetty, “Steganography for Secure Data Transmission,” Int. J. Comput. Intell. Res., vol.
13, no. 10, pp. 2289–2295, 2017.
Shahadi H I, Jidin R, and Way W H, “Lossless audio steganography based on lifting wavelet
transform and dynamic stego key,” Indian J. Sci. Technol., vol. 7 (3), pp. 323–334, 2014.
Jayaram, Ranganatha, and Anupama, “Information Hiding Using Audio Steganography - A
Survey,” Int. J. Multimed. Its Appl., vol. 3, no. 3, pp. 86–96, 2011.
A. Khan, A. Siddiqa, S. Munib, and S. A. Malik, “A recent survey of reversible watermarking
techniques,” Inf. Sci. (Ny)., vol. 279, no. June 2019, pp. 251–272, 2014.
[10] Shahad H I, Jidin R, and Way W H, “Concurrent hardware architecture for dual-mode audio
steganography processor-based FPGA,” Comput. Electr. Eng., vol. 49, pp. 95–116, 2016.
H. I. Shahadi and R. Jidin, High capacity and inaudibility audio steganography scheme, Proc.
2011 7th Int. Conf. Inf. Assur. Secur. IAS 2011, pp. 104–109, 2011.
Zhijun W, Haijuan C, and Douzhe L, “An approach of steganography in G.729 bitstream based
on matrix coding and interleaving,” Chinese J. Electron., vol. 24 no.1, pp. 157–165, 2015.
R. Setiawan and T. Ahmad, “Improving the Capacity of Data Hiding by Modifying the
Interpolation of Audio Samples,” 2020 8th Int. Conf. Inf. Commun. Technol. ICoICT 2020,
pp. 7–12, 2020.
C. Wang and Q. Wu, “Information hiding in real-time VoIP streams,” Proc. - 9th IEEE Int.
Symp. Multimedia, ISM 2007, pp. 255–262, 2007.
A. H. Ali, M. R. Mokhtar, and L. E. George, “Recent approaches for VoIP steganography,”
Indian J. Sci. Technol., vol. 9, no. 38, 2016.
N. Shetty, “Steganography for Secure Data Transmission,” Int. J. Comput. Intell. Res., vol.
13, no. 10, pp. 2289–2295, 2017.
Shahadi H I, Jidin R, and Way W H, “Lossless audio steganography based on lifting wavelet
transform and dynamic stego key,” Indian J. Sci. Technol., vol. 7 (3), pp. 323–334, 2014.
Jayaram, Ranganatha, and Anupama, “Information Hiding Using Audio Steganography - A
Survey,” Int. J. Multimed. Its Appl., vol. 3, no. 3, pp. 86–96, 2011.
A. Khan, A. Siddiqa, S. Munib, and S. A. Malik, “A recent survey of reversible watermarking
techniques,” Inf. Sci. (Ny)., vol. 279, no. June 2019, pp. 251–272, 2014.
[10] Shahad H I, Jidin R, and Way W H, “Concurrent hardware architecture for dual-mode audio
steganography processor-based FPGA,” Comput. Electr. Eng., vol. 49, pp. 95–116, 2016.
[11] D. E. Skopin, I. M. M. El-Emary, R. J. Rasras, and R. S. Diab, “Advanced algorithms in audio
steganography for hiding human speech signal,” Proc. - 2nd IEEE Int. Conf. Adv. Comput.
Control. ICACC 2010, vol. 3, pp. 29–32, 2010.
[12] S. Rekik, D. Guerchi, S. A. Selouani, and H. Hamam, “Speech steganography using wavelet
and Fourier transforms,” Eurasip J. Audio, Speech, Music Process., vol. 2012, no. 1, pp. 1
14, 2012.
[13] M. A. Ahmed, L. M. Kiah, B. B. Zaidan, and A. A. Zaidan, “A novel embedding method to
increase capacity and robustness of low-bit encoding audio steganography technique using
noise gate software logic algorithm,” Journal of Applied Sciences, vol. 10, no. 1. pp. 59–64,
2010.
[14] Tang S Y, Jiang Y J, Zhang L P, and Z. B. Zhou, “Audio steganography with AES for real
time covert voice over internet protocol communications,” Sci. China Inf. Sci., vol. 57, no. 3,
pp. 1–14, 2014.
[15] S. Deepikaa and R. Saravanan, “VoIP steganography methods, a survey,” Cybern. Inf.
Technol., vol. 19, no. 1, pp. 73–87, 2019.
[16] El-Khamy S E, Korany N O, and El-Sherif M H, “A security enhanced robust audio
steganography algorithm for image hiding using sample comparison in discrete wavelet
transform domain and RSA encryption,” Multimed. Tools Appl., vol. 76, no. 22, pp. 24091
24106, 2016.
[17] Tan D, Lu Y, Yan X, and Wang X, “A simple review of audio steganography,” Proc. 2019
IEEE 3rd Inf. Technol. Networking, Electron. Autom. Control Conf. ITNEC 2019, no. Itnec,
pp. 1409–1413, 2019.
[18] R. Roselinkiruba and R. Balakirshnan, “Secure steganography in audio using inactive frames
of VoIP streams,” 2013 IEEE Conf. Inf. Commun. Technol. ICT 2013, no. Ict, pp. 491–495,
2013.
[19] Z. Wei, B. Zhao, B. Liu, J. Su, L. Xu, and E. Xu, “A novel steganography approach for voice
over IP,” J. Ambient Intell. Humaniz. Comput., vol. 5, no. 4, pp. 601–610, 2014.
[20] N. Tiwari, D. Madhu, and D. Meenu, “Spatial Domain Image Steganography based on
Security and Randomization,” Int. J. Adv. Comput. Sci. Appl., vol. 5, no. 1, pp. 156–159,
2014.
[21] H. Shahadi and R. Jidin, “High Capacity and Resistance to Additive Noise Audio
Steganography Algorithm,” IJCSI Int. J. Comput. Sci. Issues, vol. 8, no. 5, pp. 176–184, 2011.
[22] S. Shirali-Shahreza and M. Shirali-Shahreza, “Steganography in silence intervals of speech,”
Proc. - 2008 4th Int. Conf. Intell. Inf. Hiding Multimed. Signal Process. IIH-MSP 2008, pp.
605–607, 2008.
[23] M. H. N. Azam, F. Ridzuan, M. N. S. M. Sayuti, and A. A. Alsabhany, “Balancing the Trade
Off between Capacity and Imperceptibility for Least Significant Bit Audio Steganography
Method: A New Parameter,” 2019 IEEE Conf. Appl. Inf. Netw. Secur. AINS 2019, pp. 48
53, 2019.
[24] M. H. A. Al-Hooti, T. Ahmad, and S. Djanali, “Audio Data Hiding Using Octal Modulus
Function Based Unsigned Integer Sample Values,” 2018 Int. Conf. Comput. Eng. Netw. Intell.
Multimedia, CENIM 2018 - Proceeding, pp. 48–53, 2018.
[25] A. H. Ali, L. E. George, A. A. Zaidan, and M. R. Mokhtar, “High capacity, transparent and
secure audio steganography model based on fractal coding and chaotic map in temporal
domain,” Multimed. Tools Appl., vol. 77, no. 23, pp. 31487–31516, 2018.
[26] Z. Wu and W. Yang, “G . 711-Based Adaptive Speech Information Hiding,” pp. 1139–1144,
2006.
[27] N. Aoki, “A semi-lossless steganography technique for G.711 telephony speech,” Proc. Sixth
Int. Conf. Intell. Inf. Hiding Multimed. Signal Process. Darmstadt, Ger., pp. 534–537, 2010.
[28] A. H. Ali, M. R. Mokhtar, and L. E. George, “Enhancing the hiding capacity of audio
steganography based on block mapping,” J. Theor. Appl. Inf. Technol., vol. 95, no. 7, pp.
1441–1448, 2017.
[29] Anjana K A, Satheesh C C, Kamal S, and Supriya M H, “Spread spectrum based encrypted
audio steganographic system with improved security,” Proceeding Second Int. Conf. Circuits,
Control. Commun. IEEE, pp. 109–114, 2017.
[30] S. S. Bharti, M. Gupta, and S. Agarwal, “A novel approach for audio steganography by
processing of amplitudes and signs of secret audio separately,” Multimed. Tools Appl., vol.
78, no. 16, pp. 23179–23201, 2019.
[31] S. Gupta and N. Dhanda, “Audio Steganography Using Discrete Wavelet Transformation
(DWT) & Discrete Cosine Transformation (DCT),” IOSR J. Comput. Eng., vol. 17, no. 2, pp.
2278–661, 2015.
[32] S. Hemalatha, U. D. Acharya, and A. Renuka, “Wavelet transform based steganography
technique to hide audio signals in image,” Procedia Comput. Sci., vol. 47, no. C, pp. 272–281,
2015.
[33] S. S. Verma, “A Novel Technique for Data Hiding in Audio Carrier by Using Sample
Comparison in DWT Domain,” pp. 0–4, 2014.
[34] H. I. Shahadi, M. S. Kod, B. Qasem, and R. Hameed, “Real-Time Scheme for Covert
Communication Based VoIP Real-Time Scheme for Covert Communication Based VoIP,”
2021.
[35] Z. Wu, J. Guo, C. Zhang, and C. Li, “Steganography and steganalysis in voice over ip: A
review,” Sensors (Switzerland), vol. 21, no. 4, pp. 1–31, 2021.
[36] W. Mazurczyk, “VoIP steganography and its detection-a survey,” ACM Comput. Surv., vol.
46, no. 2, 2013.
[37] F. M. Guo, A. Talevski, and E. Chang, “Voice over Internet protocol on mobile devices,” Proc. - 6th IEEE/ACIS Int. Conf. Comput. Inf. Sci. ICIS 2007; 1st IEEE/ACIS Int. Work. e-Activity,
IWEA 2007, no. Icis, pp. 163–168, 2007.
[38] G. S. Miliefsky, “Securing Voice Over Internet Protocol (VoIP),” Hakin9 Pract. Prot., vol. 90,
no. 9, p. 51, 2010.
[39] M. DeSantis, “Understanding Voice over Internet Protocol ( VoIP ),” US Cert, pp. 1–5, 2008.
[40] Shirali-Shahreza M H and Shirali-Shahreza S, “Real-time and MPEG-1 layer III compression
resistant steganography in speech,” IET Inf. Secur., vol. 4, no. 1, pp. 1–7, 2010.
[41] P. M. Kumar and K. Srinivas, “Real Time Implementation of Speech Steganography,” Proc.
2nd Int. Conf. Smart Syst. Inven. Technol. ICSSIT 2019, vol. 23, no. 1, pp. 365–369, 2019.
[42] H. I. Shahadi, R. Jidin, and W. H. Way, “A novel and high capacity audio steganography
algorithm based on adaptive data embedding positions,” Res. J. Appl. Sci. Eng. Technol., vol.
7, no. 11, pp. 2311–2323, 2014.
[43] B. Datta and S. Tat, “Robust High Capacity Audio Steganography using Modulo Operator,”
2015 IEEE, 2015.
[44] S. E. El-Khamy, N. O. Korany, and M. H. El-Sherif, “Robust image hiding in audio based on
integer wavelet transform and Chaotic maps hopping,” Natl. Radio Sci. Conf. NRSC, Proc.,
no. Nrsc, pp. 205–212, 2017.
[45] H. Tian, K. Zhou, H. Jiang, J. Liu, Y. Huang, and D. Feng, “An M-sequence based
steganography model for voice over IP,” IEEE Int. Conf. Commun., 2009.
[46] H. Tian, K. Zhou, H. Jiang, Y. Huang, J. Liu, and D. Feng, “An adaptive steganography
scheme for voice over IP,” Proc. - IEEE Int. Symp. Circuits Syst., pp. 2922–2925, 2009.
[47] H. Tian, H. Jiang, K. Zhou, and D. Feng, “Adaptive partial-matching steganography for voice
over IP using triple M sequences,” Comput. Commun., vol. 34, no. 18, pp. 2236–2247, 2011.
[48] Y. Jiang and S. Tang, “An efficient and secure VoIP communication system with chaotic
mapping and message digest,” Multimed. Syst., vol. 24, no. 3, pp. 355–363, 2018.
[49] R. S. Lin, “A synchronization scheme for hiding information in encoded bitstream of inactive
speech signal,” J. Inf. Hiding Multimed. Signal Process., vol. 7, no. 5, pp. 916–929, 2016.
[50] F. Li, B. Li, L. Peng, W. Chen, L. Zheng, and K. Xu, A Steganographic Method Based on High Bit Rates Speech Codec of G.723.1, vol. 11068 LNCS. 2018.