2019
DOI: 10.1049/iet-spr.2018.5339
|View full text |Cite
|
Sign up to set email alerts
|

Pitch and Fourier magnitude based steganography for hiding 2.4 kbps MELP bitstream

Abstract: In this study, the authors present a new steganographic technique called random least significant bits of pitch and Fourier magnitude steganography (RLPFS). It is based on hiding a secret speech coded by mixed excitation linear prediction (MELP) speech coder in speech bitstream (cover signal), which is also encoded by MELP coder. First, the RLPFS leaks the hidden speech in the following modes: pitch‐based steganography, Fourier magnitude‐based steganography or both. These modes are selected randomly. Second, d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 38 publications
(54 reference statements)
0
4
0
Order By: Relevance
“…Frequently, SER is similar to ASR but with a form recognition (FR) module. Additionally, ASR can be used in the SS domain, as a steganalytic process, to check the integrity of the speech [4,23].…”
Section: Fr Semantic / Acoustic Integritymentioning
confidence: 99%
See 2 more Smart Citations
“…Frequently, SER is similar to ASR but with a form recognition (FR) module. Additionally, ASR can be used in the SS domain, as a steganalytic process, to check the integrity of the speech [4,23].…”
Section: Fr Semantic / Acoustic Integritymentioning
confidence: 99%
“…. (15) Moving on, different frameworks, including [4,23,70] have utilized ASR principles as a steganalysis process and MOS-LQO as an assessment tool to check the integrity and/or the steganography quality-loss (SQ-Loss) between the original unprocessed speech and degraded speech version that has been passed through the steganography distorting system.…”
Section: +46607mentioning
confidence: 99%
See 1 more Smart Citation
“…This method enhances capacity while maintaining good perceived speech quality. In [94], the so-called random LSB method (R-LSB) is used to hide a secret speech bitstream coded by a mixed excitation linear prediction (MELP) coder into the cover speech.…”
Section: Coded Domainmentioning
confidence: 99%
“…The goal is that only the sender and recipient can extract the embedded confidential message [2]. To achieve this, data-hiding methods like digital watermarking, steganography and cryptography have been proposed [3]. These approaches aim to prevent unauthorized access to patient information contained in medical images as they are stored and shared [2].…”
Section: Introductionmentioning
confidence: 99%