Speech encryption using chaotic shift keying for secured speech communication

P Sathiyamurthi, S Ramakrishnan - … Journal on Audio, Speech, and Music …, 2017 - Springer
This paper throws light on chaotic shift keying-based speech encryption and decryption
method. In this method, the input speech signals are sampled and its values are segmented …

Comprehensive review of audio steganalysis methods

H Ghasemzadeh, MH Kayvanrad - IET Signal Processing, 2018 - Wiley Online Library
Recently, merging signal processing techniques with information security services has
drawn a lot of attention. Steganography and steganalysis are among those trends. Like their …

Steganalysis of QIM steganography in low-bit-rate speech signals

S Li, Y Jia, CCJ Kuo - IEEE/ACM Transactions on Audio …, 2017 - ieeexplore.ieee.org
Steganalysis of the quantization index modulation (QIM) steganography in a low-bit-rate
encoded speech stream is conducted in this research. According to the speech generation …

Recognition of brand and models of cell-phones from recorded speech signals

C Hanilci, F Ertas, T Ertas… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Speech signals convey various pieces of information such as the identity of its speaker, the
language spoken, and the linguistic information about the text being spoken, etc. In this …

Load forecasting combining phase space reconstruction and stacking ensemble learning

H Hou, C Liu, Q Wang, B Zhao, L Zhang… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Electric power load forecasting used to rely on some key information such as weather or
socioeconomic development data. However, it is usually difficult to obtain accurate data on …

Audio steganalysis based on reversed psychoacoustic model of human hearing

H Ghasemzadeh, MT Khass, MK Arjmandi - Digital signal processing, 2016 - Elsevier
During the last decade, audio information hiding has attracted lots of attention due to its
ability to provide a covert communication channel. On the other hand, various audio …

Steganalysis of VoIP streams with CNN-LSTM network

H Yang, Z Yang, Y Huang - Proceedings of the ACM workshop on …, 2019 - dl.acm.org
Steganalysis of the Quantization Index Modulation (QIM) steganography in VoIP (Voice-over
IP) stream is conducted in this research. VoIP is a popular media streaming and …

Linguistic steganalysis based on meta features and immune mechanism

H Yang, X Cao - Chinese Journal of Electronics, 2010 - ieeexplore.ieee.org
Linguistic steganalysis depends on efficient detection features due to the diversity of syntax
and the polysemia of semantics in natural language processing. This paper presents a novel …

Detection of vocal disorders based on phase space parameters and Lyapunov spectrum

H Ghasemzadeh, MT Khass, MK Arjmandi… - … signal processing and …, 2015 - Elsevier
Previous studies have shown that the underlying process of speech generation exhibits
nonlinear characteristics. Since linear features cannot represent a nonlinear system …

TENet: leveraging transformer encoders for steganalysis of QIM steganography in VoIP speech streams

C Zhang, S Jiang, Z Chen - Multimedia Tools and Applications, 2024 - Springer
Quantization index modulation (QIM) based steganography allows concealing confidential
information in the Voice-over-Internet-Protocol (VoIP) speech streams. Cyber attackers and …