We have collected the most relevant information on Audio Steganography Cepstrum Modification. Open the URLs, which are collected below, and you will find all the info you are interested in.


Audio steganography by cepstrum modification | IEEE ...

    https://ieeexplore.ieee.org/abstract/document/1416345/
    Audio steganography by cepstrum modification Abstract: A method of embedding information in the cepstral domain of a cover audio signal is described for audio steganography applications. The proposed technique combines the commonly employed psychoacoustical masking property of the human auditory system with the decorrelation property of the ...

Audio steganography by cepstrum modification | Request …

    https://www.researchgate.net/publication/4137392_Audio_steganography_by_cepstrum_modification
    Request PDF | Audio steganography by cepstrum modification | A method of embedding information in the cepstral domain of a cover audio signal is described for audio steganography applications. The ...

US7555432B1 - Audio steganography method and …

    https://patents.google.com/patent/US7555432B1/en
    In another audio steganography method, employing cepstrum modification, the cepstrum of each frame of host speech is modified to carry data without causing audible difference. In this method, the mean of the cepstrum of a selected range of quefrencies is modified in a nonreturn-to-zero mode by first removing the mean of a frame cepstrum.

Audio steganography by modification of cepstrum at a …

    https://www.researchgate.net/publication/261479747_Audio_steganography_by_modification_of_cepstrum_at_a_pair_of_frequencies
    Request PDF | Audio steganography by modification of cepstrum at a pair of frequencies | A method of embedding information in the cepstral domain …

Audio steganography by modification of cepstrum at a pair ...

    https://www.infona.pl/resource/bwmeta1.element.ieee-art-000004697579
    A method of embedding information in the cepstral domain of a cover audio signal is proposed. An earlier technique that combines the psychoacoustical masking property with the decorrelation property of speech cepstrum for audio steganography has been extended to achieve faster and stronger key-based embedding implementation without compromising imperceptibility, …

Secured Mobile Communication using Audio Steganography …

    https://www.ijsr.net/archive/v3i12/U1VCMTQyNDI=.pdf
    Secured Mobile Communication using Audio Steganography by Mel-Frequency Cepstrum Analysis Aswin.V1, Narmadha.V2 1, 2SSN College of Engineering, Chennai, India Abstract: The voluminous amounts of data that aretransmitted through wireless network majorly constituted by speech signal. In

Comparative study of digital audio steganography ...

    https://asmp-eurasipjournals.springeropen.com/articles/10.1186/1687-4722-2012-25
    Gopalan K: Audio Steganography by Cepstrum Modification, Proc. of the IEEE 2005 International Conference on, Acoustics, Speech, and Signal Processing (ICASSP’05),. (Philadelphia, USA, March 2005) Book Google Scholar 37.

Pros and Cons of Mel-cepstrum Based Audio …

    https://link.springer.com/chapter/10.1007/978-3-540-77370-2_24
    Kraetzer, C., Dittmann, J.: Mel-Cepstrum Based Steganalysis for VoIP-Steganography, To appear in Security, Steganography, and Watermarking of Multimedia Contents IX. In: Delp III, E.J., Wong, P.W. (eds.) Proceedings of the 19th Annual Symposium of the Electronic Imaging Science and Technology, SPIE and IS&T, San Jose, California, USA (January ...

Survey of steganography

    https://www.cise.ufl.edu/~nemo/crypto/presentations/eric_stego.pptx
    What is Steganography? Literally, “covered writing” Invisible inks. Character arrangement (non-cryptographic) Wax coverings. Formal Definition: “Steganography is the technique of concealing information within seemingly innocuous carriers. It is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects …

Cepstral domain modification of audio signals for data ...

    https://ui.adsabs.harvard.edu/abs/2004SPIE.5306..151G/abstract
    Pitch-synchronous cepstrum modification, for example, may be more robust to attacks. In addition, cepstrum modification in regions of speech that are perceptually masked - analogous to embedding in frequency masked regions - may yield imperceptible stego audio with low BER.

Now you know Audio Steganography Cepstrum Modification

Now that you know Audio Steganography Cepstrum Modification, we suggest that you familiarize yourself with information on similar questions.