Unified phase and magnitude speech spectra data hiding algorithm
dc.contributor.author | Djebbar, Fatiha | |
dc.contributor.author | Ayad, Beghdad | |
dc.contributor.author | Abed‐Meraim, Karim | |
dc.contributor.author | Hamam, Habib | |
dc.date.accessioned | 2020-02-26T09:30:58Z | |
dc.date.available | 2020-02-26T09:30:58Z | |
dc.date.copyright | 2013 | |
dc.date.issued | 2013 | |
dc.description | This article is not available at CUD collection. The version of scholarly record of this Article is published in Security and Communication Networks (2013), available online at: https://doi.org/10.1002/sec.644. | en_US |
dc.description.abstract | In this paper, we present a unified algorithm for phase and magnitude speech spectra data hiding. The phase and the magnitude speech spectra are concurrently investigated to increase the capacity and the security of the embedded information. The proposed algorithm in this paper is based on finding secure spectral embedding areas in wideband magnitude speech spectrum. Our approach exploits these areas to hide data in both speech components (i.e., phase and magnitude). The embedding locations and hiding capacity are defined according to a controlled acceptable distortion in the magnitude spectrum. The latter is expressed as a set of parameters controlled by the sender. Consequently, the hiding capacity and the locations of concealed data change for each data communication instance to further prevent malicious intrusions. Objective results show that the presented algorithm in this paper secures hidden data and achieves interesting tradeoffs between the hiding capacity and the speech quality. © 2013 John Wiley & Sons, Ltd. | en_US |
dc.identifier.citation | Djebbar, F., Ayad, B., Abed-Meraim, K., & Hamam, H. (2013). Unified phase and magnitude speech spectra data hiding algorithm. Security and Communication Networks, 6(8), 961–971. https://doi.org/10.1002/sec.644 | en_US |
dc.identifier.issn | 19390114 | |
dc.identifier.uri | http://dx.doi.org/10.1002/sec.644 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12519/166 | |
dc.language.iso | en | en_US |
dc.publisher | John Wiley and Sons Inc. | en_US |
dc.relation | Authors Affiliations: Djebbar, F., UAE University, Al Ain, UAE, United Arab Emirates; Ayad, B., Canadian University of Dubai, UAE, United Arab Emirates; Abed-Meraim, K., Telecom ParisTech, Paris, France; Hamam, H., Faculty of Engineering, Université de Moncton, Moncton, NB, Canada | |
dc.relation.ispartofseries | Security and Communication Networks;Vol. 6, no. 8 | |
dc.rights | License to reuse the abstract has been secured from John Wiley and Sons and Copyright Clearance Center. | |
dc.rights.holder | Copyright : 2013 John Wiley & Sons, Ltd. | |
dc.rights.uri | https://s100.copyright.com/CustomerAdmin/PLF.jsp?ref=1705589f-600f-4dcc-be36-372347c6cda4 | |
dc.subject | Speech recognition | en_US |
dc.subject | Steganography | en_US |
dc.subject | Audio steganalysis | en_US |
dc.subject | Data-communication | en_US |
dc.subject | Embedded information | en_US |
dc.subject | Hiding capacity | en_US |
dc.subject | Information hiding | en_US |
dc.subject | Magnitude spectrum | en_US |
dc.subject | Spectral embedding | en_US |
dc.subject | Unified algorithm | en_US |
dc.subject | Speech | en_US |
dc.title | Unified phase and magnitude speech spectra data hiding algorithm | en_US |
dc.type | Article | en_US |
Files
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: