[1] P. Amirzade Dana, Z. Esmaeilbeig, and M.-R. Sadeghi, Reliability enhancement and packet loss recovery of any steganographic method in voice over ip, Wireless Networks, 26 (2020), pp. 5817–5823.
[2] S. Anguraj, S. Shantharajah, and J. J. Emilyn, A steganographic method based on optimized audio embedding technique for secure data communication in the internet of things, Computational Intelligence, 36 (2020), pp. 557–573.
[3] C. Arackaparambil, G. Yan, S. Bratus, and A. Caglayan, On tuning the knobs of distribution-based methods for detecting voip covert channels, in 2012 45th Hawaii International Conference on System Sciences, IEEE, 2012, pp. 2431–2440.
[4] J. C. T. Arroyo and A. J. P. Delima, Lsb image steganography with data compression technique using goldbach g0 code algorithm, International Journal, 8 (2020).
[5] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data hiding, IBM systems journal, 35 (1996), pp. 313–336.
[6] J. Bierbrauer, Introduction to coding theory, Chapman and Hall/CRC, 2016.
[7] R. C. Bose and D. K. Ray-Chaudhuri, On a class of error correcting binary group codes, Information and control, 3 (1960), pp. 68–79.
[8] S. Deepikaa and R. Saravanan, Voip steganography methods, a survey, Cybern. Inf. Technol, 19 (2019), pp. 73–87.
[9] , Coverless voip steganography using hash and hash, Cybern. Inf. Technol, 20 (2020), pp. 102–115.
[10] X. Duan, D. Guo, N. Liu, B. Li, M. Gou, and C. Qin, A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network, IEEE Access, 8 (2020), pp. 25777– 25788.
[11] A. Durafe, R. Desai, A. Kashyap, S. Gupta, and P. Bagul, Steganography for public security, 8 (2020), p. 2742.
[12] J. Fridrich, Steganography in digital media: principles, algorithms, and applications, Cambridge University Press, 2009.
[13] E. E. Gad, Y. Li, J. Kliewer, M. Langberg, A. Jiang, and J. Bruck, Asymmetric error correction and flash-memory rewriting using polar codes, Aug. 13 2019. US Patent 10,379,945.
[14] O. Gazi, Information theory perspective of polar codes and polar encoding, in Polar Codes, Springer, 2019, pp. 1–25.
[15] M. Hamdaqa and L. Tahvildari, Relack: a reliable voip steganography approach, in 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement, IEEE, 2011, pp. 189–197.
[16] R. W. Hamming, Error detecting and error correcting codes, The Bell system technical journal, 29 (1950), pp. 147–160.
[17] J. Han, C. Huang, F. Shi, and J. Liu, Covert timing channel detection method based on time interval and payload length analysis, Computers & Security, 97 (2020), p. 101952.
[18] W. Han, L. Zhu, and F. Yan, Trusted Computing and Information Security, Springer, 2020.
[19] A. Hocquenghem, Codes correcteurs d’erreurs, Chiffers, 2 (1959), pp. 147–156.
[20] Y. Huang, C. Liu, S. Tang, and S. Bai, Steganography integration into a low-bit rate speech codec, IEEE transactions on information forensics and security, 7 (2012), pp. 1865–1875.
[21] Y. F. Huang, S. Tang, and J. Yuan, Steganography in inactive frames of voip streams encoded by source codec, IEEE Transactions on information forensics and security, 6 (2011), pp. 296–306.
[22] A. Ito, Y. Suzuki, et al., Information hiding for g. 711 speech based on substitution of least significant bits and estimation of tolerable distortion, IEICE transactions on fundamentals of electronics, communications and computer sciences, 93 (2010), pp. 1279–1286.
[23] Y. Jiang, S. Tang, L. Zhang, M. Xiong, and Y. J. Yip, Covert voice over internet protocol com[1]munications with packet loss based on fractal interpolation, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 12 (2016), pp. 1–20.
[24] , Covert voice over internet protocol communications with packet loss based on fractal interpolation, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 12 (2016), pp. 1–20.
[25] M. Khari, A. K. Garg, A. H. Gandomi, R. Gupta, R. Patan, and B. Balusamy, Securing data in internet of things (iot) using cryptography and steganography techniques, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50 (2019), pp. 73–80.
[26] N. Komaki, N. Aoki, and T. Yamamoto, A packet loss concealment technique for voip using steganography, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, 86 (2003), pp. 2069–2072.
[27] F. Li, B. Li, Y. Huang, Y. Feng, L. Peng, and N. Zhou, Research on covert communication channel based on modulation of common compressed speech codec, Neural Computing and Applications, (2020), pp. 1–14.
[28] J. Li, Z. Liu, and H. Peng, eds., Security and privacy in new computing environments, Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer Nature, Cham, Switzerland, 1 ed., June 2019.
[29] J. Liu, H. Tian, J. Lu, and Y. Chen, Neighbor-index-division steganography based on qim method for g. 723.1 speech streams, Journal of Ambient Intelligence and Humanized Computing, 7 (2016), pp. 139–147.
[30] P. Liu, S. Li, and H. Wang, Steganography integrated into linear predictive coding for low bit-rate speech codec, Multimedia Tools and Applications, 76 (2017), pp. 2837–2859.
[31] S. Liu, J. Li, P. Reviriego, M. Ottavi, and L. Xiao, A double error correction code for 32-bit data words with efficent decoding, IEEE Transactions on Device and Materials Reliability, 18 (2018), pp. 125–127.
[32] X. Liu, Speech steganography based on adaptive codebook partition and its detection, Huaqiao University: Quanzhou, China, (2020).
[33] X. Liu, H. Tian, Y. Huang, and J. Lu, A novel steganographic method for algebraic-code-excited-linearprediction speech streams based on fractional pitch delay search, Multimedia Tools and Applications, 78 (2019), pp. 8447–8461.
[34] X. Liu, H. Tian, J. Liu, and J. Lu, Survey for voice-over-ip steganography and steganalysis, J. Chongqing Univ. Posts Telecommun.(Nat. Sci. Ed.), 31 (2019), pp. 407–418.
[35] W. Mazurczyk, Lost audio packets steganography: the first practical evaluation, Security and Communication Networks, 5 (2012), pp. 1394–1403.
[36] , Voip steganography and its detection—a survey, ACM Computing Surveys (CSUR), 46 (2013), pp. 1–21.
[37] W. Mazurczyk and J. Lubacz, Lack—a voip steganographic method, Telecommunication Systems, 45 (2010), pp. 153–163.
[38] W. Mazurczyk, P. Szaga, and K. Szczypiorski, Using transcoding for hidden communication in ip telephony, Multimedia Tools and Applications, 70 (2014), pp. 2139–2165.
[39] M. Mehic, J. ´ Slachta, and M. Voznak ˇ , Hiding data in sip session, in 2015 38th International Conference on Telecommunications and Signal Processing (TSP), IEEE, 2015, pp. 1–5.
[40] H. A. Nassrullah, W. N. Flayyih, and M. A. Nasrullah, Enhancement of lsb audio steganography based on carrier and message characteristics., J. Inf. Hiding Multim. Signal Process., 11 (2020), pp. 126–137.
[41] H. Neal and H. ElAarag, A packet loss tolerant algorithm for information hiding in voice over ip, in 2012 Proceedings of IEEE Southeastcon, IEEE, 2012, pp. 1–6.
[42] , A reliable covert communication scheme based on voip steganography, in Transactions on data hiding and multimedia security x, Springer, 2015, pp. 55–68.
[43] B. I. Neelgar, C. D. Kumar, A. S. Vyshnavi, A. O. S. Vigna, and U. S. Anush, Audio wavelet compression and audio steganography using lsb technique, International Research Journal of Advanced Engineering and Science, 5 (2020), pp. 111–114.
[45] D. Qu, B. Wang, B. Li, L. Zhang, Q. Chen, and W. Zhang, Voip speech processing and recognition, National Defense Industry Press: Beijing, China, (2010), pp. 3–6.
[46] I. S. Reed and G. Solomon, Polynomial codes over certain finite fields, Journal of the society for industrial and applied mathematics, 8 (1960), pp. 300–304.
[47] Y. Ren, H. Yang, H. Wu, and L. Wang, A secure steganography method for amr fixed codebook based on pulse distribution model, Patent CN201910347984, 3 (2019).
[48] W. Ryan and S. Lin, Channel codes: classical and modern, Cambridge university press, 2009.
[49] S. Tang, Y. Jiang, L. Zhang, and Z. Zhou, Audio steganography with aes for real-time covert voice over internet protocol communications, Science China Information Sciences, 57 (2014), pp. 1–14.
[50] A. Tasdighi and M.-R. Sadeghi, On advisability of designing short length qc-ldpc codes using perfect difference families, arXiv preprint arXiv:1701.06218, (2017).
[51] H. Tian, H. Jiang, K. Zhou, and D. Feng, Transparency-orientated encoding strategies for voice-over-ip steganography, The Computer Journal, 55 (2012), pp. 702–716.
[52] H. Tian, Y. Wu, Y. Huang, J. Liu, Y. Chen, T. Wang, and Y. Cai, Steganalysis of low bit-rate speech based on statistic characteristics of pulse positions, in 2015 10th International Conference on Availability, Reliability and Security, Toulouse, France, IEEE, 2015, pp. 455–460.
[53] H. Tian, K. Zhou, H. Jiang, Y. Huang, J. Liu, and D. Feng, An adaptive steganography scheme for voice over ip, in 2009 IEEE International Symposium on Circuits and Systems, IEEE, 2009, pp. 2922–2925.
[54] H. Wang, X. Zhao, Y. Shi, H. J. Kim, and A. Piva, Digital Forensics and Watermarking: 18th International Workshop, IWDW 2019, Chengdu, China, vol. 12022, Springer Nature, 2020.
[55] A. Westfeld, F5—a steganographic algorithm, in International workshop on information hiding, Springer, 2001, pp. 289–302.
[56] G. Xin, Y. Liu, T. Yang, and Y. Cao, An adaptive audio steganography for covert wireless communication, Security and Communication Networks, 2018 (2018), pp. 1–10.
[57] T. Xu and Z. Yang, Simple and effective speech steganography in g. 723.1 low-rate codes, in 2009 International conference on wireless communications & signal processing, IEEE, 2009, pp. 1–4.
[58] P. Yadav and S. Dhall, Comparative analysis of steganography technique for information security, Int. J. Math. Sci. Comput, 6 (2020), pp. 42–69.
[59] H. Yang, Z. Yang, Y. Bao, S. Liu, and Y. Huang, Fast steganalysis method for voip streams, IEEE Signal Processing Letters, 27 (2019), pp. 286–290.
[60] J. Yang, Research on technologies of amr steganography and steganalysis based on pitch delay, Wuhan Uni[1]versity: Wuhan, China, (2017).
[61] P. Yue, Research on self-adaption voip steganographic method based on lpc cepstrum distortion cost, Wirel. Internet Technol, 4 (2017), pp. 100–103.
[62] R. Zhang, V. Sachnev, M. B. Botnan, H. J. Kim, and J. Heo, An efficient embedder for bch coding for steganography, IEEE Transactions on Information Theory, 58 (2012), pp. 7272–7279.
[63] X. Zhang, Y.-A. Tan, C. Liang, Y. Li, and J. Li, A covert channel over volte via adjusting silence periods, IEEE Access, 6 (2018), pp. 9292–9302.
[64] W. Zhijun, L. Changliang, and S. Yongpeng, Speech information hiding algorithm based on complete binary tree dynamic codebook grouping, IEEE Access, 7 (2019), pp. 147513–147522.