2015
DOI: 10.1049/cje.2015.01.026
|View full text |Cite
|
Sign up to set email alerts
|

An Approach of Steganography in G.729 Bitstream Based on Matrix Coding and Interleaving

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(10 citation statements)
references
References 13 publications
0
10
0
Order By: Relevance
“…Su et al [7] studied the characteristics of algorithm used in G.729a encoder, and analyzed the anti-noise performance of the vector codebook, and selected fixed codebook parameters as carriers to embed secret information. Wu et al [8] used the differential signal-to-noise ratio (DSNR) to evaluate the noise tolerance of G.729 encoder parameters, and selected the least significant bits to embed secret information by using the cross-coding technique. Lin [9] analyzed the parameter bits of the G.723.1 encoder and concluded that bits of the random excitation pulse parameters are more suitable for data embedding than other parameter bits.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Su et al [7] studied the characteristics of algorithm used in G.729a encoder, and analyzed the anti-noise performance of the vector codebook, and selected fixed codebook parameters as carriers to embed secret information. Wu et al [8] used the differential signal-to-noise ratio (DSNR) to evaluate the noise tolerance of G.729 encoder parameters, and selected the least significant bits to embed secret information by using the cross-coding technique. Lin [9] analyzed the parameter bits of the G.723.1 encoder and concluded that bits of the random excitation pulse parameters are more suitable for data embedding than other parameter bits.…”
Section: Related Workmentioning
confidence: 99%
“…Step 3: Embedding of secret information. Embed secret information into carriers with corresponding matrix coding according to the equation (7) and (8). The speech stream carrying secret information can be expressed as…”
Section: A Adaptive Speech Steganography Embedding Processmentioning
confidence: 99%
“…It is a method for hiding secret speech in the static speech, which uses multistage vector quantization and dithering techniques to ensure the speech quality. Wu et al [27] proposed an approach of covert communication by embedding a 2.4Kbps low bit rate MELP speech into G.729 coding speech. The method adapts the techniques of covering code and the interleaving to achieve covert communications.…”
Section: Related Workmentioning
confidence: 99%
“…in for the G.729.A codec. Data hiding algorithms dedicated to specific codecs were also proposed, that is, in for the G.721 codec, and in for G.728.…”
Section: Steganography In Voice Over Ip Systemsmentioning
confidence: 99%