2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW) 2016
DOI: 10.1109/icce-tw.2016.7521040
|View full text |Cite
|
Sign up to set email alerts
|

High capacity information hiding scheme using VAD algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…Then, the stateless coefficients were used to calculate residual energy, which was then compared with the threshold, so the VAD results kept invariable after steganography. Due to the silence compression function being optional for G.723.1 codec and there being some bits in the VoIP packet header to direct whether to use the silence compression function during encoding process, Lin [29] used the one free bit generated by disabling the silence compression function to mark the inactive frames embedded with secret messages. When decoding the VoIP streams at the receiver end, there is no need to run the VAD algorithm again and the secret messages are extracted from the inactive frames that have been marked.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Then, the stateless coefficients were used to calculate residual energy, which was then compared with the threshold, so the VAD results kept invariable after steganography. Due to the silence compression function being optional for G.723.1 codec and there being some bits in the VoIP packet header to direct whether to use the silence compression function during encoding process, Lin [29] used the one free bit generated by disabling the silence compression function to mark the inactive frames embedded with secret messages. When decoding the VoIP streams at the receiver end, there is no need to run the VAD algorithm again and the secret messages are extracted from the inactive frames that have been marked.…”
Section: Related Workmentioning
confidence: 99%
“…Huang et al [28] and Lin [29] selected the parameters to embed secret messages by evaluating the effects after being modified. There are 101 bits per frame for steganography with 6.3 kbit/s mode, 81 bits per frame for steganography with 5.3 kbit/s mode, and the suitable parameters for steganography are listed in Tables 3 and 4.…”
Section: Steganography In Inactive Framementioning
confidence: 99%
See 2 more Smart Citations
“…In general, VoIP-based steganography can be divided into two categories [6]- [9]. One employs the network protocols as carriers [10], [16]- [18], while the other hides information by modifying payloads in speech streams [7]- [9], [19]- [28]. Due to its high steganographic capacity, the second category has been the mainstream of VoIP-based steganography.…”
Section: Introductionmentioning
confidence: 99%