Toward construction-based data hiding: from secrets to fingerprint images
Data hiding usually involves the alteration of a cover signal for embedding a secret
message. In this paper, we propose a construction-based data hiding technique which …
message. In this paper, we propose a construction-based data hiding technique which …
A new audio watermarking scheme based on singular value decomposition and quantization
In this paper, we propose a new robust and blind audio watermarking algorithm based on
singular value decomposition and quantization index modulation. The watermark insertion …
singular value decomposition and quantization index modulation. The watermark insertion …
Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys
YF Huang, HZ Tao, B **ao, CC Chang - Science China Technological …, 2017 - Springer
Since low bit-rate speech codecs used for voice over internet protocol (VoIP), such as iLBC
(internet low bit-rate codec), G. 723.1 and G. 729A, have less redundancy due to high …
(internet low bit-rate codec), G. 723.1 and G. 729A, have less redundancy due to high …
High capacity audio watermarking using the high frequency band of the wavelet domain
This paper proposes a novel high capacity robust audio watermarking algorithm by using
the high frequency band of the wavelet decomposition at which the human auditory system …
the high frequency band of the wavelet decomposition at which the human auditory system …
Audio watermarking with high embedding capacity based on multiple access techniques
M Khalil, A Adib - Digital Signal Processing, 2014 - Elsevier
This paper deals with a new digital audio watermarking scheme based on multiple access
techniques. In digital communication, multiple access techniques allow several users …
techniques. In digital communication, multiple access techniques allow several users …
A dual transform audio watermarking algorithm
A Al-Haj - Multimedia tools and applications, 2014 - Springer
In this paper, a non-blind digital audio watermarking algorithm that satisfies the minimum
requirements of optimal audio watermarking set by the International Federation of …
requirements of optimal audio watermarking set by the International Federation of …
A pseudo-Zernike moment based audio watermarking scheme robust against desynchronization attacks
XY Wang, TX Ma, PP Niu - Computers & Electrical Engineering, 2011 - Elsevier
Desynchronization attack is known as one of the most difficult attacks to resist, for it can
desynchronize the location of the watermark and hence causes incorrect watermark …
desynchronize the location of the watermark and hence causes incorrect watermark …
A coverless image information hiding algorithm based on fractal theory
To improve the robustness and imperceptibility of the existing coverless image information
hiding, a generative coverless image information hiding algorithm based on fractal theory is …
hiding, a generative coverless image information hiding algorithm based on fractal theory is …
Steganalysis of AMR speech based on multiple classifiers combination
In this paper, we focus on steganalysis in adaptive multi-rate (AMR) speech streams, whose
goal is to detect covert communication behaviors effectively to prevent illegal uses of AMR …
goal is to detect covert communication behaviors effectively to prevent illegal uses of AMR …
A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications.
This paper investigates digital data hiding schemes. The concept of information hiding will
be explained at first, and its traits, requirements, and applications will be described …
be explained at first, and its traits, requirements, and applications will be described …