2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation 2010
DOI: 10.1109/ams.2010.60
|View full text |Cite
|
Sign up to set email alerts
|

MELPe Coded Speech Hiding on Enhanced Full Rate Compressed Domain

Abstract: This paper proposes a data hiding approach to embed data on compressed speech bit stream in order to transmit two simultaneous speeches instead of one. The host and embedded signals are Enhanced Full Rate (EFR) and Mixed-Excitation Linear Predictive enhanced (MELPe) encoded speech bit streams. Host and hidden speech quality is determined by Perceptual Evaluation of Speech Quality (PESQ) which is an objective testing. The effect of embedding data to each specific bit of EFR coefficients, on speech quality has b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 13 publications
(16 reference statements)
0
3
0
Order By: Relevance
“…In (Xu and Yang 2009), a simple and effective steganographic approach, which may be applied to 5.3 Kbps G.723.1 speech, was presented on analyzing the redundancy of code parameters, and augmented identity matrix was utilized to lower the distortion of cover audio. Similarly, by calculating speech quality on each encoded bit out of 244 bits using perceptual evaluation of audio quality (PESQ) criterion, a data hiding method to embedding data in enhanced full rate (EFR) compressed audio bitstream is proposed in (Shahbazi, Rezaie, and Shahbazi 2010). In addition, Nishimura (Nishimura 2009) proposed three methods of securing data in the pitch delay data of the AMR speech.…”
Section: Introductionmentioning
confidence: 99%
“…In (Xu and Yang 2009), a simple and effective steganographic approach, which may be applied to 5.3 Kbps G.723.1 speech, was presented on analyzing the redundancy of code parameters, and augmented identity matrix was utilized to lower the distortion of cover audio. Similarly, by calculating speech quality on each encoded bit out of 244 bits using perceptual evaluation of audio quality (PESQ) criterion, a data hiding method to embedding data in enhanced full rate (EFR) compressed audio bitstream is proposed in (Shahbazi, Rezaie, and Shahbazi 2010). In addition, Nishimura (Nishimura 2009) proposed three methods of securing data in the pitch delay data of the AMR speech.…”
Section: Introductionmentioning
confidence: 99%
“…They are distributed in protocol headers (e.g. IP, UDP/TCP, RTP/RTCP, SIP) [1,15] and payloads (compressed pcm data or speech frames) [9,2]. Lubacz et al [5] classified VoIP specified steganography into three types which include a third type implemented by modifying time related fields of VoIP packets [4].…”
Section: Introductionmentioning
confidence: 99%
“…In [7], a simple and effective steganographic approach, which may be applied to 5.3 Kbps G.723.1 speech, was presented based on analyzing the redundancy of code parameters, and augmented identity matrix was utilized to lower the distortion of cover speech. Similarly, by calculating speech quality sensitivity on each encoded bit out of 244 bits using perceptual evaluation of speech quality (PESQ) criterion, a 2 Security and Communication Networks data hiding approach to embedding data in enhanced full rate (EFR) compressed speech bitstream is proposed in [8]. In addition, Nishimura [9] proposed three methods of hiding data in the pitch delay data of the AMR speech.…”
Section: Introductionmentioning
confidence: 99%