2016 2nd IEEE International Conference on Computer and Communications (ICCC) 2016
DOI: 10.1109/compcomm.2016.7925046
|View full text |Cite
|
Sign up to set email alerts
|

An implementation of speech steganography for iLBC by using fixed codebook

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…The performance parameter for this criterion consists of objective quality that calculated by formula or model and subjective quality that is taken from survey to several persons. In [6] authors used codebook techniques to embed watermark data in frequency domain. He used log spectrum for embedding data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The performance parameter for this criterion consists of objective quality that calculated by formula or model and subjective quality that is taken from survey to several persons. In [6] authors used codebook techniques to embed watermark data in frequency domain. He used log spectrum for embedding data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…How to exploit the redundancy existing in the encoding process to achieve steganography is a new research hotspot. Some methods which embed secret messages into the bitstream during the encoding process have been proposed, such as quantization index modulation (QIM) steganography [4][5][6], fixed codebook (FCB) steganography [7][8][9], and pitch modulation (PM) steganography [10,11].…”
Section: Introductionmentioning
confidence: 99%
“…How to exploit redundancy existing in the encoding process to achieve steganography is a new research hotspot. Some methods which embed secret messages into the bitstream during the encoding process have been proposed, such as quantization index modulation (QIM) steganography [4,5,6], fixed codebook (FCB) steganography [7,8,9] and pitch modulation (PM) steganography [10,11].…”
Section: Introductionmentioning
confidence: 99%