The following publications are possibly variants of this publication:
- A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IPHui Tian, Ke Zhou, Yongfeng Huang, Dan Feng, Jin Liu. icycs 2008: 647-652 [doi]
- An Adaptive Steganography Scheme for Voice Over IPHui Tian, Ke Zhou, Hong Jiang, Yongfeng Huang, Jin Liu, Dan Feng. iscas 2009: 2922-2925 [doi]
- Detecting Bitrate Modulation-Based Covert Voice-Over-IP CommunicationHui Tian, Jun Sun, Chin-Chen Chang 0001, Yongfeng Huang, Yonghong Chen. icl, 22(6):1196-1199, 2018. [doi]