Unified phase and magnitude speech spectra data hiding algorithm

dc.contributor.authorDjebbar, Fatiha
dc.contributor.authorAyad, Beghdad
dc.contributor.authorAbed‐Meraim, Karim
dc.contributor.authorHamam, Habib
dc.date.accessioned2020-02-26T09:30:58Z
dc.date.available2020-02-26T09:30:58Z
dc.date.copyright2013
dc.date.issued2013
dc.descriptionThis article is not available at CUD collection. The version of scholarly record of this Article is published in Security and Communication Networks (2013), available online at: https://doi.org/10.1002/sec.644.en_US
dc.description.abstractIn this paper, we present a unified algorithm for phase and magnitude speech spectra data hiding. The phase and the magnitude speech spectra are concurrently investigated to increase the capacity and the security of the embedded information. The proposed algorithm in this paper is based on finding secure spectral embedding areas in wideband magnitude speech spectrum. Our approach exploits these areas to hide data in both speech components (i.e., phase and magnitude). The embedding locations and hiding capacity are defined according to a controlled acceptable distortion in the magnitude spectrum. The latter is expressed as a set of parameters controlled by the sender. Consequently, the hiding capacity and the locations of concealed data change for each data communication instance to further prevent malicious intrusions. Objective results show that the presented algorithm in this paper secures hidden data and achieves interesting tradeoffs between the hiding capacity and the speech quality. © 2013 John Wiley & Sons, Ltd.en_US
dc.identifier.citationDjebbar, F., Ayad, B., Abed-Meraim, K., & Hamam, H. (2013). Unified phase and magnitude speech spectra data hiding algorithm. Security and Communication Networks, 6(8), 961–971. https://doi.org/10.1002/sec.644en_US
dc.identifier.issn19390114
dc.identifier.urihttp://dx.doi.org/10.1002/sec.644
dc.identifier.urihttp://hdl.handle.net/20.500.12519/166
dc.language.isoenen_US
dc.publisherJohn Wiley and Sons Inc.en_US
dc.relationAuthors Affiliations: Djebbar, F., UAE University, Al Ain, UAE, United Arab Emirates; Ayad, B., Canadian University of Dubai, UAE, United Arab Emirates; Abed-Meraim, K., Telecom ParisTech, Paris, France; Hamam, H., Faculty of Engineering, Université de Moncton, Moncton, NB, Canada
dc.relation.ispartofseriesSecurity and Communication Networks;Vol. 6, no. 8
dc.rightsLicense to reuse the abstract has been secured from John Wiley and Sons and Copyright Clearance Center.
dc.rights.holderCopyright : 2013 John Wiley & Sons, Ltd.
dc.rights.urihttps://s100.copyright.com/CustomerAdmin/PLF.jsp?ref=1705589f-600f-4dcc-be36-372347c6cda4
dc.subjectSpeech recognitionen_US
dc.subjectSteganographyen_US
dc.subjectAudio steganalysisen_US
dc.subjectData-communicationen_US
dc.subjectEmbedded informationen_US
dc.subjectHiding capacityen_US
dc.subjectInformation hidingen_US
dc.subjectMagnitude spectrumen_US
dc.subjectSpectral embeddingen_US
dc.subjectUnified algorithmen_US
dc.subjectSpeechen_US
dc.titleUnified phase and magnitude speech spectra data hiding algorithmen_US
dc.typeArticleen_US

Files