Unified phase and magnitude speech spectra data hiding algorithm

dc.contributor.author Djebbar, Fatiha
dc.contributor.author Ayad, Beghdad
dc.contributor.author Abed‐Meraim, Karim
dc.contributor.author Hamam, Habib
dc.date.accessioned 2020-02-26T09:30:58Z
dc.date.available 2020-02-26T09:30:58Z
dc.date.copyright 2013
dc.date.issued 2013
dc.description This article is not available at CUD collection. The version of scholarly record of this Article is published in Security and Communication Networks (2013), available online at: https://doi.org/10.1002/sec.644. en_US
dc.description.abstract In this paper, we present a unified algorithm for phase and magnitude speech spectra data hiding. The phase and the magnitude speech spectra are concurrently investigated to increase the capacity and the security of the embedded information. The proposed algorithm in this paper is based on finding secure spectral embedding areas in wideband magnitude speech spectrum. Our approach exploits these areas to hide data in both speech components (i.e., phase and magnitude). The embedding locations and hiding capacity are defined according to a controlled acceptable distortion in the magnitude spectrum. The latter is expressed as a set of parameters controlled by the sender. Consequently, the hiding capacity and the locations of concealed data change for each data communication instance to further prevent malicious intrusions. Objective results show that the presented algorithm in this paper secures hidden data and achieves interesting tradeoffs between the hiding capacity and the speech quality. © 2013 John Wiley & Sons, Ltd. en_US
dc.identifier.citation Djebbar, F., Ayad, B., Abed-Meraim, K., & Hamam, H. (2013). Unified phase and magnitude speech spectra data hiding algorithm. Security and Communication Networks, 6(8), 961–971. https://doi.org/10.1002/sec.644 en_US
dc.identifier.issn 19390114
dc.identifier.uri http://dx.doi.org/10.1002/sec.644
dc.identifier.uri http://hdl.handle.net/20.500.12519/166
dc.language.iso en en_US
dc.publisher John Wiley and Sons Inc. en_US
dc.relation Authors Affiliations: Djebbar, F., UAE University, Al Ain, UAE, United Arab Emirates; Ayad, B., Canadian University of Dubai, UAE, United Arab Emirates; Abed-Meraim, K., Telecom ParisTech, Paris, France; Hamam, H., Faculty of Engineering, Université de Moncton, Moncton, NB, Canada
dc.relation.ispartofseries Security and Communication Networks;Vol. 6, no. 8
dc.rights License to reuse the abstract has been secured from John Wiley and Sons and Copyright Clearance Center.
dc.rights.holder Copyright : 2013 John Wiley & Sons, Ltd.
dc.rights.uri https://s100.copyright.com/CustomerAdmin/PLF.jsp?ref=1705589f-600f-4dcc-be36-372347c6cda4
dc.subject Speech recognition en_US
dc.subject Steganography en_US
dc.subject Audio steganalysis en_US
dc.subject Data-communication en_US
dc.subject Embedded information en_US
dc.subject Hiding capacity en_US
dc.subject Information hiding en_US
dc.subject Magnitude spectrum en_US
dc.subject Spectral embedding en_US
dc.subject Unified algorithm en_US
dc.subject Speech en_US
dc.title Unified phase and magnitude speech spectra data hiding algorithm en_US
dc.type Article en_US
Files
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: