IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference 2008
DOI: 10.1109/glocom.2008.ecp.375
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to Information Hiding in Low Bit-Rate Speech Stream

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
88
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 97 publications
(88 citation statements)
references
References 8 publications
0
88
0
Order By: Relevance
“…As a result, much additive quantization noise is inevitably introduced in the embedding procedure. Xiao et al (2008) proposed a QIM based complementary neighbor vertex (CNV) algorithm utilizing Euclidean distance for codebook division. This algorithm takes the feature of codeword quantization into account, and decreases the introduced speech quality distortion.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, much additive quantization noise is inevitably introduced in the embedding procedure. Xiao et al (2008) proposed a QIM based complementary neighbor vertex (CNV) algorithm utilizing Euclidean distance for codebook division. This algorithm takes the feature of codeword quantization into account, and decreases the introduced speech quality distortion.…”
Section: Introductionmentioning
confidence: 99%
“…Owing to the advantages of low cost and flexible advanced digital features, VoIP became a popular alternative to the public-switched telephone network (PSTN), and extensive research on it was conducted [5]. In recent years, many researchers have carried out useful research on steganography over VoIP, such as prototype implementations of steganography over VoIP [6−10], a lossless steganography method for µ-law of G 711 [11], a steganography method named LACK using the lost VoIP packets [12], an adaptive steganography method using partial similarity [13], an m-sequence based steganography model [14], and a codebook partition based steganography method [15]. Differing from the previous studies, encoding strategies used to enhance the embedding performance were investigated in this work.…”
Section: Introductionmentioning
confidence: 99%
“…codecs was suggested in our previous papers [20] [21]. According to the steganographic algorithm, the Least Significant Bits (LSBs) of some parameters of the G.723.1 codec can be replaced with secret messages.…”
Section: Voip Applications With Covert Channelsmentioning
confidence: 99%