Toward construction-based data hiding: from secrets to fingerprint images

S Li, X Zhang - IEEE Transactions on Image Processing, 2018 - ieeexplore.ieee.org
Data hiding usually involves the alteration of a cover signal for embedding a secret
message. In this paper, we propose a construction-based data hiding technique which …

A new audio watermarking scheme based on singular value decomposition and quantization

V Bhat K, I Sengupta, A Das - Circuits, Systems, and Signal Processing, 2011 - Springer
In this paper, we propose a new robust and blind audio watermarking algorithm based on
singular value decomposition and quantization index modulation. The watermark insertion …

Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys

YF Huang, HZ Tao, B **ao, CC Chang - Science China Technological …, 2017 - Springer
Since low bit-rate speech codecs used for voice over internet protocol (VoIP), such as iLBC
(internet low bit-rate codec), G. 723.1 and G. 729A, have less redundancy due to high …

High capacity audio watermarking using the high frequency band of the wavelet domain

M Fallahpour, D Megías - Multimedia tools and Applications, 2011 - Springer
This paper proposes a novel high capacity robust audio watermarking algorithm by using
the high frequency band of the wavelet decomposition at which the human auditory system …

Audio watermarking with high embedding capacity based on multiple access techniques

M Khalil, A Adib - Digital Signal Processing, 2014 - Elsevier
This paper deals with a new digital audio watermarking scheme based on multiple access
techniques. In digital communication, multiple access techniques allow several users …

A dual transform audio watermarking algorithm

A Al-Haj - Multimedia tools and applications, 2014 - Springer
In this paper, a non-blind digital audio watermarking algorithm that satisfies the minimum
requirements of optimal audio watermarking set by the International Federation of …

A pseudo-Zernike moment based audio watermarking scheme robust against desynchronization attacks

XY Wang, TX Ma, PP Niu - Computers & Electrical Engineering, 2011 - Elsevier
Desynchronization attack is known as one of the most difficult attacks to resist, for it can
desynchronize the location of the watermark and hence causes incorrect watermark …

A coverless image information hiding algorithm based on fractal theory

X Zhang, F Peng, Z Lin, M Long - International Journal of Bifurcation …, 2020 - World Scientific
To improve the robustness and imperceptibility of the existing coverless image information
hiding, a generative coverless image information hiding algorithm based on fractal theory is …

Steganalysis of AMR speech based on multiple classifiers combination

H Tian, J Liu, CC Chang, CC Chen, Y Huang - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we focus on steganalysis in adaptive multi-rate (AMR) speech streams, whose
goal is to detect covert communication behaviors effectively to prevent illegal uses of AMR …

A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications.

MA Akhaee, F Marvasti - ISeCure, 2013 - search.ebscohost.com
This paper investigates digital data hiding schemes. The concept of information hiding will
be explained at first, and its traits, requirements, and applications will be described …