scholarly journals Semifragile Speech Watermarking Based on Least Significant Bit Replacement of Line Spectral Frequencies

2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Mohammad Ali Nematollahi ◽  
Chalee Vorakulpipat ◽  
Hamurabi Gamboa Rosales

There are various techniques for speech watermarking based on modifying the linear prediction coefficients (LPCs); however, the estimated and modified LPCs vary from each other even without attacks. Because line spectral frequency (LSF) has less sensitivity to watermarking than LPC, watermark bits are embedded into the maximum number of LSFs by applying the least significant bit replacement (LSBR) method. To reduce the differences between estimated and modified LPCs, a checking loop is added to minimize the watermark extraction error. Experimental results show that the proposed semifragile speech watermarking method can provide high imperceptibility and that any manipulation of the watermark signal destroys the watermark bits since manipulation changes it to a random stream of bits.

2015 ◽  
Vol 77 (18) ◽  
Author(s):  
Sabur Ajibola Alim ◽  
Nahrul Khair Alang Rashid ◽  
Wahju Sediono ◽  
Nik Nur Wahidah Nik Hashim

Stuttering or stammering is disruptions in the normal flow of speech by dysfluencies, which can be repetitions or prolongations of phoneme or syllable. Stuttering cannot be permanently cured, though it may go into remission or stutterers can learn to shape their speech into fluent speech with an appropriate speech pathology treatment. Linear Prediction Coefficient (LPC), Linear Prediction Cepstral Coefficient (LPCC) and Line Spectral Frequency (LSF) were used for the feature extraction, while Multilayer Perceptron (MLP) was used as the classifier. The samples used were obtained from UCLASS (University College London Archive of Stuttered Speech) release 1. The LPCC-MLP system had the highest overall sensitivity, precision and the lowest overall misclassification rate. LPCC-MLP system had challenges with F3, the sensitivity of the system to F3 was negligible, similarly, the precision was moderate and the misclassification rate was negligible, but above 10%. 


2021 ◽  
Vol 48 (4) ◽  
Author(s):  
Zainab N. Sultani ◽  
◽  
Ban N. Dhannoon ◽  

Hiding the presence of data during communication has become a pressing concern in this overly digitalized world as a consequence of illegitimate access. These concerns have led to cryptography and steganography techniques as methods for securing data. This paper presents a modified information hiding technique based on an indirect least significant bit. Instead of saving each bit of the secret message in the least significant bit (LSB) of the cover media, each bit of the secret message is compared to a mask bit in the cover media. The result is saved in the cover media’s LSB. In this paper, two steganography schemas are designed in which the cover media are image and audio, while the secret message is a text file. A simple encryption technique is used to transform the secret message into an unreadable format before the hiding process begins. The experimental results indicate that the proposed algorithm achieves promising performance


2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Gandharba Swain

The combination of pixel value differencing (PVD) and least significant bit (LSB) substitution gives higher capacity and lesser distortion. However, there are three issues to be taken into account: (i) fall off boundary problem (FOBP), (ii) pixel difference histogram (PDH) analysis, and (iii) RS analysis. This paper proposes a steganography technique in two variants using combination of modified LSB substitution and PVD by taking care of these three issues. The first variant operates on 2 × 3 pixel blocks and the second technique operates on 3 × 3 pixel blocks. In one of the pixels of a block, embedding is performed using modified LSB substitution. Based on the new value of this pixel, difference values with other neighboring pixels are calculated. Using these differences, PVD approach is applied. The edges in multiple directions are exploited, so PDH analysis cannot detect this steganography. The LSB substitution is performed in only one pixel of the block, so RS analysis also cannot detect this steganography. To address the FOBP, suitable equations are used during embedding procedure. The experimental results such as bit rate and distortion measure are satisfactory.


1982 ◽  
Vol 104 (3) ◽  
pp. 619-625 ◽  
Author(s):  
H. Lyons ◽  
J. A. Collins

Dynamic excitations in machines and structures may lead to a form of wear caused by the phenomenon of fretting, which may cause premature mechanical or structural failure. Fretting-wear has been evaluated under a variety of conditions, and a linear prediction model is compared to experimental results with good agreement.


2014 ◽  
Vol 6 (2) ◽  
pp. 1-22
Author(s):  
Lin Gao ◽  
Tiegang Gao

A novel medical image tamper detection and recovery scheme based on Least Significant Bit (LSB) embedding and Piecewise Linear Chaotic Map (PWLCM) is proposed in the paper. To meet the demand of medical usage, the proposed scheme not only improved the precision of detection compared with block-wise scheme of watermark embedding, but also guaranteed the security of the scheme by applying PWLCM. To evaluate the proposed scheme, a former scheme proposed by Xiao et al is used for comparison; the two scheme's visual quality, accuracy of detection, recovery quality and security are tested during the experiment. The experimental results suggest that the proposed scheme meets the demand of visual quality and security for using in medical image tamper detection and recovery.


2006 ◽  
Vol 153 (5) ◽  
pp. 610 ◽  
Author(s):  
K. Al-Naimi ◽  
S. Villette ◽  
A. Kondoz ◽  
A.P. Heikkinen

Sign in / Sign up

Export Citation Format

Share Document