Adaptive VoIP Steganography for Information Hiding within Network Audio Streams

Size: px
Start display at page:

Download "Adaptive VoIP Steganography for Information Hiding within Network Audio Streams"

Transcription

1 2011 International Conference on Network-Based Information Systems Adaptive VoIP Steganography for Information Hiding within Network Audio Streams Erchi Xu, Bo Liu, Liyang Xu, Ziling Wei, Baokang Zhao,JinshuSu School of Computer Science National University of Defense Technology P.R. of China Abstract With the rapid development of the Internet, steganography on Voice over IP (VoIP) has been attracted a lot of research efforts. To date, existing VoIP steganography research commonly focus on information hiding in the LSB bits of Network Audio Streams, yet, we found this approach may raise serious security threat, where the hidden information may be easily removed, detected and attacked. Towards this issue, in this paper, we propose AVIS, a novel Adaptive VoIP steganography approach to hide information within Network Audio Streams. AVIS consists of two parts, named VAMI and VADDI. VAMI works by dynamically select multiple bits based on the VoIP vector value, while VADDI dynamically changes embedding intervals to avoid detection and attacking. We also implemented AVIS and conducted extensive experiments in real systems. Experimental results demonstrate the effectiveness of our proposed AVIS scheme. I. INTRODUCTION Differs from the cryptography techniques that only conceals the content of the message, the steganography focus on hiding the presence of the message itself by providing important approaches to protect the information transmission channels. Therefore, the steganography issues have attracted a lot of research efforts[1]. In the earlier years, the steganography techniques are focused on static file based information hidding, such as images, text files[2], [3]; yet, with the rapid deployment of the Internet, network-based steganography has becoming more and more critical and challenging[4], especially for information hidden in VoIP audio streams. So far, many classic steganography technologies tend to hide the information within the LSB(Least Significant Bits) [5], [6], [7], [8] of the stream, which makes it possible for detecting and attacking methods to interfere the information transmission. However, detecting and attacking measures such as NVR (neighbor vectors ratio) detection [9], LSB interference can still be effective by adjusting to the VoIP stream platform. To enhance the anti-detecting and anti-attacking ability of the VoIP steganography, in this paper, we propose AVIS(Adaptive VoIP Steganography), a novel approach to enhance the VoIP steganograhy by setting embedding places and embedding intervals dynamically. AVIS consists of two parts, VAMI(VAlue-based Multiple Insertion) and VADDI(Voice Activity Detection Dynamic Insertion). In VAMI, instead of simply hiding in LSB only, we dynamically select multiple bits based on the VoIP vector value. Consequently, not only LSB interference and NVR detection will no longer be effective but also the quality of transmission will be better than simply hiding information in relatively high bits. Although VAMI method can cheat the NVR detection, the NVR detection can still be effective by not only detecting the LSB neighbor vectors but also the other higher bits. Aiming at overcoming potential security threats, in AVIS strategy, we propose the other method VADDI to dynamically change embedding intervals.by applying VADDI, the information will only be embedded when people talking in the VoIP communication. By this mean, the VoIP stream will not satisfy the NVR detection conditions and, due to HAS (Human Audio System) covering effects, it is rarely possible for adversaries to eavesdropping the audio streams. The remainder part of this paper is organized as follows. The preliminaries are reviewed in section II. We propose our AVIS scheme in section III. After extensive experiments, the results and detailed analysis are described in Section IV. II. PRELIMINARIES A. the VoIP information Embedding Process Figure 1. The Sender Process /11 $ IEEE DOI /NBiS

2 In the VoIP information embedding process, as illustrated in Fig 1, senders can allocate information in the VoIP communication speech packet. The speech packet is denoted by C. The information space is denoted as HS and will be embedded with information. Let us denote the secret information as S. Suppose we obtain S by dividing S, and hide S into HS. The modified speech packet (which contains S ) is called the steganographified speech, which is denoted by G. Now G can be sent to the receiver via public Internet. The receiver may reverse the process to get the information S. B. The Classic LSB steganography According to the stego process, we know that stego needs HS and embedding interval to nail down the embedding place. For example, in [4], in order to arouse less sound distortion, the passage chooses to embed information in LSB and choose half of the speech packet to hide information. As shown in the Fig 2, in speech packets all odd speech vectors form 1 to (N-1) are embedded with information. By embedding in LSB, the process will only arouse a litter sound distortion and relative broad bandwidth. Figure 2. The typical message embedding process in LSB steganography C. the audio quality In general, the Mean Opinion Score (MOS) provides a numerical indication of the perceived quality of received media after compression or transmission. The MOS value is expressed from 1 to 5, where 1 stands for the lowest quality and 5 stands for highest voice quality. According to ITU-T[10], more than 16 experts are required to obtain MOS. Yet, due to drawbacks including high expense and time-consumption of obtaining MOS, ITU came up with PESQ[10] to simulate a listening test and is optimized to reproduce the average result of all listeners. Thus users can use PESQ algorithm to estimate the codec quality quickly. Table I THE MOS STANDARD Mean opinion score (MOS) MOS Quality Impairment 5 Excellent Imperceptible 4 Good Perceptible but not annoying 3 Fair Slightly annoying 2 Poor Annoying 1 Bad Very annoying Table II THE G.711 CODEC Mode Linear input vector(l) Compressed vector(c) Bit-weight 0 s wxyza... s000wxyz s wxyzab... s001wxyz s000001wxyzabc... s010wxyz s00001wxyzabcd... s011wxyz s0001wxyzabcde... s100wxyz s001wxyzabcdef... s101wxyz s01wxyzabcdefg... s110wxyz s1wxyzabcdefgh... s111wxyz 2 10 III. THE PROPOSED AVIS SCHEME Classic steganography technologies usually choose LSB for its low distortion. However, using LSB actually has potential threats due its vulnerability to attacking and detecting. Therefore, we proposed AVIS. In this section, we will describe the VAMI and VADDI sequentially. A. VAMI Since VAMI is dedicated to vary the embedding place for information hiding, it is better to utilize the potential embedding bits as much as possible. So we firstly should judge whether the potential embedding bit is available for each mode. 1) G.711-PCMU Codec analysis: Let s take the G.711- PCMU codec as a VAMI example. As shown in table II [6], G.711 converts a 16- bits linear input vector L to a compressed vector C as, The notation bits of L are same as C. Following the notation bit, the next three bits of C, also known as the Mode bits, are used to mark the place of first 1 shown in L. The w, x, y and z bit of L remain the same in C. As shown in table. II, there are two properties of G.711 codec as follows, The value of C is classified by the three mode bits into 8 modes. In a VoIP stream, if two vectorsc 1 and C 2 are belong to different modes, the w, x, y and z bit of each will have different bit-weight respectively. In other words, if the mode of a vector is small, the value of thisvector and the bit-weight of the last four bits will both be small. 613

3 In compressed vector C, the bit-weights of last four bits are decided by mode bits and s is the notation bit. So it is not likely to hide information in these four bits, since any minor changes to them will cause a huge value loss. To clarify, in the following parts, we use Mode to denote the class of different speech vector values, and use w, x, y, and z bit to indicate the potential embedding bits. 2) The proposed VAMI Algorithm: From the previous analysis of G.711 codec, we find that, when two vectors C 1 and C 2 of different modes, assuming C 1 <C 2 ), the smaller one will have smaller bit-weight of w, x, y and z bit. That is to say, when we embed the same bit, for example bit w, C 1 will suffer less sound loss due to its smaller bit-weights. Because whether the potential embedding places available is decided by sound quality, availability of embedding places is decided by both mode and embedding places. Therefore, using MOS to estimate sound quality, we propose the following algorithm to judge the availability of potential embedding bit. Firstly, assume information embeds in the signal C of mode n and embedding bit t. Then we define the following function: Pesq(n, t) = MOS nt,wheremos nt denotes the MOS value according to the signal of mode n and embedding bit t. Furthermore, according to the MOS standard and practical demand, we set a threshold MOS value MOS thres.when MOS nt MOS thres, it indicates that such mode n and embedding bit t can satisfy the required quality. In other words, potential embedding bit t is available for vector of mode n. MOS The Mode Index Figure 3. Relation between MOS and Mode Mode 0 Mode 1 Mode 2 Mode 3 the MOS value with different Modes Table IV POTENTIAL EMBEDDING PLACES Mode Available potential embedding places w,x,y,z x, y, z y, z z Hiding information in higher bits distracts the statistical characters therefore the NVR detection is difficult to examine whether there are hidden data within the VoIP stream or not. Pesq(n, t) =MOS nt In order to find out all the available potential embedding places for each mode, we conduct the following experiment. We embed information in w, x, y and z of mode from 0 to 7 then evaluate their MOS value and bandwidth respectively. The results are illustrated in figure. 3 and table. III. Table III BANDWIDTH OF DIFFERENT MODES Figure 4. The VAMI Mode bps According to the results and MOS standard, we use Fig. 3 to demonstrate the available potential embedding bits for each mode.the result of mode 4, 5, 6 and 7 are not shown in result due to their rare appearance in VoIP stream. In Fig. 3, smaller mode owns a wider range of available embedding bits and broader bandwidth. On the other hand, higher modes have less choice and narrow bandwidth. In all, we list the all the available potential embedding places in table Table IV. B. VADDI In VAMI, although the embedding place is dynamically decided, the embedding intervals are still fixed. Fixing embedding intervals bring vulnerability to anti-detecting ability and will be suffered from more loss of sound quality. To tackle this issue, we proposed VAD, based on NVR detection condition, dynamically change embedding intervals. Firstly, we study the different results by embedding in silence and conversation. Then we propose VAD algorithm to judge whether the communication is in conversation. Further, 614

4 Figure 5. A sample for different features within silent and active voices according to HAS (Human Audio System) covering effect [7], we dynamically decide the embedding intervals. 1) the NVR Detection Analysis: As it introduced in related work, NVR detection demands following conditions to detect embedding information: Incept enough speech packets. NVR relies on a basic fact, in a large file,the ratio between even vectors and odd vectors will approximately be 1. Thus, unless incept enough packets, NVR detection will misjudge many common packets to be suspicious. Close value. Referring to a certain audio stream, NVR detection also requires lot value-close speech packets. The more value-close packets the larger NVR distortion will be. To study the voice activity features, we measure the waveform for different voices streams in different environments, and the results are shown in Fig. 5. As indicated in the left waveform the value swings in small scales for silence voices, while in the right waveform the value changed frequently for active VoIP communications. 2) Enhancing anti-detecting ability: From the previous analysis, we find out that by embedding information during the conversation period will enhance the anti-detecting ability. To be specific, in VADDI, we use VAD (Voice Activity Detection) to decide when to embed information. In other words we choose embedding intervals based on communication period. Firstly, since lots of value-close packets appear in silence,that is to say, when we embedding information in silent period of VoIP stream, it will show an obvious statistic character and therefore can be easily discovered the stream is embedded with information. However, when we embed information during the conversation, the value-close speech packets may rarely appear. Plus, due to the uncertainty of the length of the conversation, it is difficult for NVR detection to intercept enough speech packets. Moreover, according to the HAS (Human Audio System), it is easier for human to discover the noise in silent environment. Since the embedding process will inevitably generate sound distortion, use VAD to guide embedding information during conversation will improve the sound quality. Hence, it is getting even harder for eavesdropper to notice the VoIP steganography is running. 3) the VADDI algorithm: When applying VADDI, we firstly should use VAD to judge whether the VoIP stream is in conversation period. We separate the stream into frames and use frames as the units for VAD. Each frame consists of certain amount of vectors. The size of frame will affect the accuracy and efficiency of VAD algorithm. Containing fewervectors will result in higher acuteness in value changes. On the other hand, more vectors will result in higher accuracy in judging value changes. Based on G.711 codec, we choose the frame of 40 speech vectors. After acquiring the frames, on the basis of requirements of increasing anti-detecting ability, VADshould follow listedconditions to examine the communication status, Detect value-close neighbor vectors to sabotage NVR detection. Detect high value frequencies to apply HAS-based embedding. Effective and simple algorithm to reduce the high latency. 4) Extracting and calculating VAD feature value : Conversation demonstrates an interesting fact that within the conversation period the value oscillates around the zero periodically. Thus we denote the speech packet threshold value L which means packet above L can be used to embed information. Then denote the number of half waves above L as n. By referring to the first VAD requirement, the bigger n indicates greater difference between neighbor vectors. Then if n is bigger than zero, it indicates high value appears in this frame. Therefore, according to the second requirement, the information can be embedded in. Moreover, n can be used as the feature value of VAD. Let the VAD algorithm as P and input frames as frame i. Then frame i can be denoted as frame i =< x 1,x 2,..., x 40 >, where x i represents speech vectors. P (frame i ) {true, false}, where {truefalse} denotes voice activity status. The process of calculation of n works as follows. Firstly, for frame i find out its longest sub-sequence frame sub =< x i1, x i2,..., x ik >. Thereafter, x ik frame sub indicates x ik >Land x ik x i(k+1) < 0(1 k<n). Then, the threshold N can be calculated as P (frame i )= { true iff n > N false iff n N When P (frame i ) is true, it indicates the following frame i+1 is suitable for embedding. If P (frame i ) is false, the information will stop embedding in theframe i+1. In Fig 6, half waves are recognized. If n 5,thenwave indicates the conversation is running. In other words, the next frame can be embedded. (1) 615

5 The anti detection results Origin AVIS VAMI LSB L L X0 X1 X2 X3 X4 X5 X6 X7 X8 X9 NVR x The Audio Sample Index Figure 6. The wave detection results Figure 7. The Anti-Detecting Test results A. Experiment setup IV. EXPERIMENTAL RESULTS To evaluate the performance of AVIS, we implemented our algorithms in Linphone, a famous open-source VoIP platform. Moreover, according to VoIP testing standard (ITU-T Rec. P.830) [10], we choose 25 audio samples from the famous Open Speech Repositories. We intercept the VoIP stream of receiver and use the Emiprix Call Analyzer and the Pesq tool to evaluate performance of AVIS. We evaluate the metrics of anti-detecting performance, voice quality, latency and bandwidth. For AVIS parameters, we set L = 5 and N = 2. Meanwhile, due to HAS covering effect, the embedding intervals was set to 0 in order to expand the bandwidth which means all vectors in conversation frame can be embedded. After all, if a frame indicates the conversation is running, the next frame which contains 40 vectors will all be embedded with information. B. Anti-detection capability In the anti-detecting test, we focus on the neighbor vectors ratio in LSB steganography, VAMI method and AVIS strategy. In figure 7, the purple, green, red and blue lines represents the LSB steganography, VAMI method, AVIS strategy and original audio wave, respectively. All vectors of original audio waves value are lower than Hence, we choose 1.01 as threshold value which means the communication is suspicious of using steganography if its value above threshold.to be specific, probability of failure of detection of LSB steganography is 80%, VAMI with 20% and AVIS strategy with only 8%. The result demonstrates that using VAMI can distract the statistical character caused by information embedding. Further, using AVIS strategy can dynamically choose the embedding intervals and when to embed. As a result, using AVIS strategy can effectively protect the information from NVR detection. C. MOS Value Test MOS The MOS results The Audio Sample Index Figure 8. The MOS Value results Any unmodified G.711 coded audio will be qualified as 4.5. We intercept the speech packets of the receiver and use PESQ to calculate the MOS. With all 25 samples are above 4.0, we hold the point that it is hardly possible for eavesdropper SNR(Signal-to-Noise Ratio) detection to notice steganography is used in VoIP. D. The Latency Test In the test, though applying AVIS strategy will occupies one third of the process time. However, with regard to latency of Internet up to 20ms, such increasing in encoding and decoding process will not be perceivable by humans. 616

6 Latency(S) AVIS(encode) Origin(encode) AVIS(decode) Origin(decode) China (973 project) under Grant No.2009CB320503; the National 863 Development Plan of China under Grant No. 2009AA01A334, 2009AA01A346, 2009AA01Z423; and the project of National Science Foundation of China under grant No , , , ; and the Supported by Program for Changjiang Scholars and Innovative Research Team in University of the Ministry of Education, the Innovative Research Team in University of Hunan Province; and the University student Innovation project of Hunan Provience. REFERENCES [1] N. Provos and P. Honeyman, Hide and seek: An introduction to steganography, IEEE Security and Privacy, vol. 1, pp , May Figure 9. The Latency Test results [2] K. Bailey and K. Curran, An evaluation of image based steganography methods, Multimedia Tools Appl., vol. 30, pp , July E. The Bandwidth Test We use the 25 samples as input and get average bandwidth of Bps. Although it seems somewhat narrow, it is enough for secret information transmission. F. The security concerns of AVIS Information security comes from anti-detecting ability and anti-attacking ability. Since N represents the changes in vectors, the anti-detecting performance is mainly related with half waves threshold N. Fig. 10 indicates the relationship between NVR and N. The bigger the N leads to NVR closer to 1 which means the higher anti-detecting ability. NVR No. of Half waves Figure 10. The Security results ACKNOWLEDGMENT The work described in this paper is partially supported by the grants of the National Basic Research Program of [3] C. Wang and Q. Wu, Information hiding in real-time voip streams, in Proceedings of the Ninth IEEE International Symposium on Multimedia, ser. ISM 07. Washington, DC, USA: IEEE Computer Society, 2007, pp [4] W. Mazurczyk and K. Szczypiorski, Steganography of voip streams, in Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE Part II on On the Move to Meaningful Internet Systems, ser. OTM 08. Berlin, Heidelberg: Springer-Verlag, 2008, pp [5] N. Aoki, A technique of lossless steganography for g.711 telephony speech, in Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, ser. IIH-MSP 08. Washington, DC, USA: IEEE Computer Society, 2008, pp [6] H. Tian, K. Zhou, Y. Huang, D. Feng, and J. Liu, A covert communication model based on least significant bits steganography in voice over ip, in Proceedings of the 2008 The 9th International Conference for Young Computer Scientists. Washington, DC, USA: IEEE Computer Society, 2008, pp [7] H. Tian, K. Zhou, H. Jiang, and D. Feng, Digital logic based encoding strategies for steganography on voice-over-ip, in Proceedings of the 17th ACM international conference on Multimedia, ser. MM 09. New York, NY, USA: ACM, 2009, pp [8] G. T. Juan You, Statistics detection algorithm based on audio lsb steganography, Computer Engineering of CHINA, vol. 35(24), pp , [9] C. Wang, improved voip security with real-time speech hiding in g.711, Ph.D. dissertation, National Chi Nan University, [10] N. Harada, Y. Kamamoto, T. Moriya, and et.al, Emerging itu-t standard g lossless compression of g.711 pulse code modulation, in ICASSP, 2010, pp

The Steganography In Inactive Frames Of Voip

The Steganography In Inactive Frames Of Voip The Steganography In Inactive Frames Of Voip This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1

More information

Towards a Key Consuming Detection in QKD-VoIP Systems

Towards a Key Consuming Detection in QKD-VoIP Systems Towards a Key Consuming Detection in QKD-VoIP Systems Guohong Zhao, Wanrong Yu, Baokang Zhao, and Chunqing Wu School of Computer Science, National University of Defense Technology, Changsha, Hunan, China

More information

A Synchronization Scheme for Hiding Information in Encoded Bitstream of Inactive Speech Signal

A Synchronization Scheme for Hiding Information in Encoded Bitstream of Inactive Speech Signal Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 5, September 2016 A Synchronization Scheme for Hiding Information in Encoded

More information

Robust Steganography Using Texture Synthesis

Robust Steganography Using Texture Synthesis Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,

More information

A Covert Channel in RTP Protocol

A Covert Channel in RTP Protocol RIT Scholar Works Presentations and other scholarship 8-2010 A Covert Channel in RTP Protocol Chrisopher Forbes Bo Yuan Daryl Johnson Peter Lutz Follow this and additional works at: http://scholarworks.rit.edu/other

More information

Voice Quality Assessment for Mobile to SIP Call over Live 3G Network

Voice Quality Assessment for Mobile to SIP Call over Live 3G Network Abstract 132 Voice Quality Assessment for Mobile to SIP Call over Live 3G Network G.Venkatakrishnan, I-H.Mkwawa and L.Sun Signal Processing and Multimedia Communications, University of Plymouth, Plymouth,

More information

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

User-Friendly Sharing System using Polynomials with Different Primes in Two Images User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed

More information

Experimental Evaluation of Jitter Buffer Algorithms on Voice over IP Networks

Experimental Evaluation of Jitter Buffer Algorithms on Voice over IP Networks Experimental Evaluation of Jitter Buffer Algorithms on Voice over IP Networks Abstract J.P.Ouedraogo, L.Sun and I.H.Mkwawa Signal Processing and Multimedia Communications, University of Plymouth, Plymouth,

More information

Adaptive Pixel Pair Matching Technique for Data Embedding

Adaptive Pixel Pair Matching Technique for Data Embedding Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

White Paper Voice Quality Sound design is an art form at Snom and is at the core of our development utilising some of the world's most advance voice

White Paper Voice Quality Sound design is an art form at Snom and is at the core of our development utilising some of the world's most advance voice White Paper Voice Quality Sound design is an art form at and is at the core of our development utilising some of the world's most advance voice quality engineering tools White Paper - Audio Quality Table

More information

Performance Analysis of Voice Call using Skype

Performance Analysis of Voice Call using Skype Abstract Performance Analysis of Voice Call using Skype L. Liu and L. Sun Centre for Security, Communications and Network Research Plymouth University, United Kingdom e-mail: info@cscan.org The purpose

More information

GSM Network and Services

GSM Network and Services GSM Network and Services Voice coding 1 From voice to radio waves voice/source coding channel coding block coding convolutional coding interleaving encryption burst building modulation diff encoding symbol

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

QoE Evaluation Framework for Multimedia Content

QoE Evaluation Framework for Multimedia Content A Crowdsourceable QoE Evaluation Framework for Multimedia Content Kuan Ta Chen Chen Chi Wu Yu Chun Chang Chin Laung Lei Academia Sinica National Taiwan University National Taiwan University National Taiwan

More information

Investigation of Algorithms for VoIP Signaling

Investigation of Algorithms for VoIP Signaling Journal of Electrical Engineering 4 (2016) 203-207 doi: 10.17265/2328-2223/2016.04.007 D DAVID PUBLISHING Todorka Georgieva 1, Ekaterina Dimitrova 2 and Slava Yordanova 3 1. Telecommunication Department,

More information

Efficient & Secure Data Hiding Using Secret Reference Matrix

Efficient & Secure Data Hiding Using Secret Reference Matrix Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

AT&T Collaborate TM. Network Assessment Tool

AT&T Collaborate TM. Network Assessment Tool AT&T Collaborate TM Network Assessment Tool 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain

Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain YAHYA E. A. AL-SALHI a, SONGFENG LU *b a. Research Scholar, School of computer science, Huazhong

More information

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca ROI based Tamper Detection and Recovery for Medical Images Using Reversible Watermarking Technique Osamah M. Al-Qershi, Bee Ee Khoo School of Electrical and Electronic Engineering Universiti Sains Malaysia

More information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE

AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE 1 SITI DHALILA MOHD SATAR, 1 NAZIRAH ABD HAMID, 1 FATIMAH GHAZALI, 1 ROSLINDA MUDA, 1 MOHAMAD AFENDEE MOHAMED 1 Faculty of Informatics and Computing,

More information

19 th INTERNATIONAL CONGRESS ON ACOUSTICS MADRID, 2-7 SEPTEMBER 2007

19 th INTERNATIONAL CONGRESS ON ACOUSTICS MADRID, 2-7 SEPTEMBER 2007 19 th INTERNATIONAL CONGRESS ON ACOUSTICS MADRID, 2-7 SEPTEMBER 2007 SUBJECTIVE AND OBJECTIVE QUALITY EVALUATION FOR AUDIO WATERMARKING BASED ON SINUSOIDAL AMPLITUDE MODULATION PACS: 43.10.Pr, 43.60.Ek

More information

Does your Voice Quality Monitoring Measure Up?

Does your Voice Quality Monitoring Measure Up? Does your Voice Quality Monitoring Measure Up? Measure voice quality in real time Today s voice quality monitoring tools can give misleading results. This means that service providers are not getting a

More information

Performance analysis of voip over wimax

Performance analysis of voip over wimax Performance analysis of voip over wimax Shima Faisal Ahmed Muhi-Aldean 1, Amin Babiker 2 1,2 Department of Communications, Faculty of Engineering Al Neelain University, Khartoum,Sudan Abstract: Voice over

More information

A LOW-COMPLEXITY AND LOSSLESS REFERENCE FRAME ENCODER ALGORITHM FOR VIDEO CODING

A LOW-COMPLEXITY AND LOSSLESS REFERENCE FRAME ENCODER ALGORITHM FOR VIDEO CODING 2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) A LOW-COMPLEXITY AND LOSSLESS REFERENCE FRAME ENCODER ALGORITHM FOR VIDEO CODING Dieison Silveira, Guilherme Povala,

More information

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting

More information

A Packet Loss Tolerant Algorithm for Information Hiding in Voice over IP

A Packet Loss Tolerant Algorithm for Information Hiding in Voice over IP A Packet Loss Tolerant Algorithm for Information Hiding in Voice over IP Harrison Neal and Hala ElAarag Department of Mathematics and Computer Science Stetson University DeLand, FL, USA {hneal,helaarag@stetson.edu

More information

Digital Speech Coding

Digital Speech Coding Digital Speech Processing David Tipper Associate Professor Graduate Program of Telecommunications and Networking University of Pittsburgh Telcom 2700/INFSCI 1072 Slides 7 http://www.sis.pitt.edu/~dtipper/tipper.html

More information

Improved Qualitative Color Image Steganography Based on DWT

Improved Qualitative Color Image Steganography Based on DWT Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V

More information

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,

More information

MOHAMMAD ZAKI BIN NORANI THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING)

MOHAMMAD ZAKI BIN NORANI THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING) PERFORMANCE ANALYSIS OF 8KBPS VOICE CODEC (G.729, G.711 ALAW, G.711 ULAW) FOR VOIP OVER WIRELESS LOCAL AREA NETWORK WITH RESPECTIVE SIGNAL-TO- NOISE RATIO MOHAMMAD ZAKI BIN NORANI THESIS SUBMITTED IN FULFILMENT

More information

ABSTRACT. that it avoids the tolls charged by ordinary telephone service

ABSTRACT. that it avoids the tolls charged by ordinary telephone service ABSTRACT VoIP (voice over IP - that is, voice delivered using the Internet Protocol) is a term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet

More information

Channel-Adaptive Error Protection for Scalable Audio Streaming over Wireless Internet

Channel-Adaptive Error Protection for Scalable Audio Streaming over Wireless Internet Channel-Adaptive Error Protection for Scalable Audio Streaming over Wireless Internet GuiJin Wang Qian Zhang Wenwu Zhu Jianping Zhou Department of Electronic Engineering, Tsinghua University, Beijing,

More information

Reversible Data Hiding VIA Optimal Code for Image

Reversible Data Hiding VIA Optimal Code for Image Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

User Level QoS Assessment of a Multipoint to Multipoint TV Conferencing Application over IP Networks

User Level QoS Assessment of a Multipoint to Multipoint TV Conferencing Application over IP Networks User Level QoS Assessment of a Multipoint to Multipoint TV Conferencing Application over IP Networks Yoshihiro Ito and Shuji Tasaka Department of Computer Science and Engineering, Graduate School of Engineering

More information

Assessing Call Quality of VoIP and Data Traffic over Wireless LAN

Assessing Call Quality of VoIP and Data Traffic over Wireless LAN Assessing Call Quality of VoIP and Data Traffic over Wireless LAN Wen-Tzu Chen and Chih-Yuan Lee Institute of Telecommunications Management, National Cheng Kung University, No. 1 University Road, Tainan

More information

Secret Communication through Audio for Defense Application

Secret Communication through Audio for Defense Application Secret Communication through Audio for Defense Application A.Nageshwar Rao Maduguri Sudhir R.Venkatesh Abstract: A steganographic method of embedding textual information in an audio file is presented in

More information

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti

More information

Protocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012

Protocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012 Protocol Data Hiding By Chet Hosmer Article Posted: March 06, 2012 On Cinco de Mayo in 1997, which happened to be the first Monday in May that year, the Hacker Publication First Monday included an article

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

Synopsis of Basic VoIP Concepts

Synopsis of Basic VoIP Concepts APPENDIX B The Catalyst 4224 Access Gateway Switch (Catalyst 4224) provides Voice over IP (VoIP) gateway applications for a micro branch office. This chapter introduces some basic VoIP concepts. This chapter

More information

Concealing Information in Images using Progressive Recovery

Concealing Information in Images using Progressive Recovery Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,

More information

Mubug: a mobile service for rapid bug tracking

Mubug: a mobile service for rapid bug tracking . MOO PAPER. SCIENCE CHINA Information Sciences January 2016, Vol. 59 013101:1 013101:5 doi: 10.1007/s11432-015-5506-4 Mubug: a mobile service for rapid bug tracking Yang FENG, Qin LIU *,MengyuDOU,JiaLIU&ZhenyuCHEN

More information

A Video Watermarking Algorithm Based on the Human Visual System Properties

A Video Watermarking Algorithm Based on the Human Visual System Properties A Video Watermarking Algorithm Based on the Human Visual System Properties Ji-Young Moon 1 and Yo-Sung Ho 2 1 Samsung Electronics Co., LTD 416, Maetan3-dong, Paldal-gu, Suwon-si, Gyenggi-do, Korea jiyoung.moon@samsung.com

More information

Speech-Coding Techniques. Chapter 3

Speech-Coding Techniques. Chapter 3 Speech-Coding Techniques Chapter 3 Introduction Efficient speech-coding techniques Advantages for VoIP Digital streams of ones and zeros The lower the bandwidth, the lower the quality RTP payload types

More information

AUDIOVISUAL COMMUNICATION

AUDIOVISUAL COMMUNICATION AUDIOVISUAL COMMUNICATION Laboratory Session: Audio Processing and Coding The objective of this lab session is to get the students familiar with audio processing and coding, notably psychoacoustic analysis

More information

Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method

Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method ShriRam College of Engineering & Management 1 Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method Rinki Baghel Pragya Sharma Abstract In this paper, we present a novel high

More information

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing

More information

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

2 Framework of The Proposed Voice Quality Assessment System

2 Framework of The Proposed Voice Quality Assessment System 3rd International Conference on Multimedia Technology(ICMT 2013) A Packet-layer Quality Assessment System for VoIP Liangliang Jiang 1 and Fuzheng Yang 2 Abstract. A packet-layer quality assessment system

More information

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Meaningful Shadows for Image Secret Sharing with Steganography

More information

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,

More information

Metamorphosis of High Capacity Steganography Schemes

Metamorphosis of High Capacity Steganography Schemes 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Metamorphosis of High Capacity Steganography Schemes 1 Shami

More information

International Journal of Computer Engineering and Applications,

International Journal of Computer Engineering and Applications, International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 SECURING TEXT DATA BY HIDING IN AN IMAGE USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY

More information

A Formula Diamond Encoding Data Hiding Scheme

A Formula Diamond Encoding Data Hiding Scheme Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 A Formula Diamond Encoding Data Hiding Scheme Wen-Chung Kuo

More information

Random Image Embedded in Videos using LSB Insertion Algorithm

Random Image Embedded in Videos using LSB Insertion Algorithm Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.

More information

Statistical Modeling of Huffman Tables Coding

Statistical Modeling of Huffman Tables Coding Statistical Modeling of Huffman Tables Coding S. Battiato 1, C. Bosco 1, A. Bruna 2, G. Di Blasi 1, and G.Gallo 1 1 D.M.I. University of Catania - Viale A. Doria 6, 95125, Catania, Italy {battiato, bosco,

More information

Digital Image Processing

Digital Image Processing Digital Image Processing Fundamentals of Image Compression DR TANIA STATHAKI READER (ASSOCIATE PROFFESOR) IN SIGNAL PROCESSING IMPERIAL COLLEGE LONDON Compression New techniques have led to the development

More information

Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack

Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack Masoud Afrakhteh Dept. of

More information

CHAPTER 3. Digital Carriers of Steganography

CHAPTER 3. Digital Carriers of Steganography CHAPTER 3 Digital Carriers of Steganography 3.1 Introduction It has been observed that all digital file formats can be used as digital carrier for steganography, but the formats those are with a high degree

More information

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam

More information

Evaluation of VoIP Speech Quality Using Neural Network

Evaluation of VoIP Speech Quality Using Neural Network Journal of Communication and Computer 12 (2015) 237-243 doi: 10.17265/1548-7709/2015.05.003 D DAVID PUBLISHING Evaluation of VoIP Speech Quality Using Neural Network Angel Garabitov and Aleksandar Tsenov

More information

Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram

Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram , October 24-26, 2012, San Francisco, USA Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram Neeta Nain, Jaideep Singh, Ishan Dayma, Rajesh Meena The authors are

More information

AUDIOVISUAL COMMUNICATION

AUDIOVISUAL COMMUNICATION AUDIOVISUAL COMMUNICATION Laboratory Session: Audio Processing and Coding The objective of this lab session is to get the students familiar with audio processing and coding, notably psychoacoustic analysis

More information

ZyXEL V120 Support Notes. ZyXEL V120. (V120 IP Attendant 1 Runtime License) Support Notes

ZyXEL V120 Support Notes. ZyXEL V120. (V120 IP Attendant 1 Runtime License) Support Notes ZyXEL V120 (V120 IP Attendant 1 Runtime License) Support Notes Version 1.00 April 2009 1 Contents Overview 1. Overview of V120 IP Attendant...3 2. Setting up the V120...4 3. Auto Provision...7 4. V120

More information

A Framework to Reversible Data Hiding Using Histogram-Modification

A Framework to Reversible Data Hiding Using Histogram-Modification A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya

More information

High capacity data hiding scheme based on (7, 4) Hamming code

High capacity data hiding scheme based on (7, 4) Hamming code DOI 10.1186/s40064-016-1818-0 RESEARCH Open Access High capacity data hiding scheme based on (7, 4) Hamming code Zekun Cao 1, Zhaoxia Yin 1,2*, Honghe Hu 1, Xiangping Gao 1 and Liangmin Wang 1 *Correspondence:

More information

Network Traffic Classification Based on Deep Learning

Network Traffic Classification Based on Deep Learning Journal of Physics: Conference Series PAPER OPEN ACCESS Network Traffic Classification Based on Deep Learning To cite this article: Jun Hua Shu et al 2018 J. Phys.: Conf. Ser. 1087 062021 View the article

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH, Abstract In the future of Mobile networks it is important to implement a Femtocell at homes and to improve the domestic network. Even

More information

Digital Signal Processing

Digital Signal Processing Digital Signal Processing 20 (2010) 1629 1636 Contents lists available at ScienceDirect Digital Signal Processing wwwelseviercom/locate/dsp High capacity lossless data embedding technique for palette images

More information

A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX

A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX Abdalla A\ Alrahman Mohamed Abdalla 1, Dr. Amin Babiker A\ Nabi 2, Dr. Ashraf A. Osman 3 1,2,3 Department of communication,

More information

Keywords Sosemanuk, VOIP, Android, Encryption, Descryption

Keywords Sosemanuk, VOIP, Android, Encryption, Descryption Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Implementation

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Impact of Voice Coding in Performance of VoIP

Impact of Voice Coding in Performance of VoIP Impact of Voice Coding in Performance of VoIP Batoul Alia Baker Koko 1, Dr. Mohammed Abaker 2 1, 2 Department of Communication Engineering, Al-Neelain University Abstract: Voice over Internet Protocol

More information

Voice Analysis for Mobile Networks

Voice Analysis for Mobile Networks White Paper VIAVI Solutions Voice Analysis for Mobile Networks Audio Quality Scoring Principals for Voice Quality of experience analysis for voice... 3 Correlating MOS ratings to network quality of service...

More information

Optimized Watermarking Using Swarm-Based Bacterial Foraging

Optimized Watermarking Using Swarm-Based Bacterial Foraging Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Chi-Yao Weng 1, Yen-Chia Huang 1, Chin-Feng Lee 2(&), and Dong-Peng Lin 2 1 Department of Computer Science, National Pingtung University,

More information

Adaptive Playout Buffering for H.323 Voice over IP Applications

Adaptive Playout Buffering for H.323 Voice over IP Applications Adaptive Playout Buffering for H.323 Voice over IP Applications M. Narbutt and L. Murphy Department of Computer Science University College Dublin Belfield, Dublin 4 Abstract In this paper we investigate

More information

An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode

An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode Jia-Ji Wang1, Rang-Ding Wang1*, Da-Wen Xu1, Wei Li1 CKC Software Lab, Ningbo University, Ningbo, Zhejiang 3152,

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

End-to-end speech and audio quality evaluation of networks using AQuA - competitive alternative for PESQ (P.862) Endre Domiczi Sevana Oy

End-to-end speech and audio quality evaluation of networks using AQuA - competitive alternative for PESQ (P.862) Endre Domiczi Sevana Oy End-to-end speech and audio quality evaluation of networks using AQuA - competitive alternative for PESQ (P.862) Endre Domiczi Sevana Oy Overview Significance of speech and audio quality Problems with

More information

A Flexible Scheme of Self Recovery for Digital Image Protection

A Flexible Scheme of Self Recovery for Digital Image Protection www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China

More information

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor

More information

A Defense System for DDoS Application Layer Attack Based on User Rating

A Defense System for DDoS Application Layer Attack Based on User Rating 4th International Conference on Advanced Materials and Information Technology Processing (AMITP 216) A Defense System for DDoS Application Layer Attack Based on User Rating Gaojun Jiang1, a, Zhengping

More information

DATA hiding [1] and watermarking in digital images

DATA hiding [1] and watermarking in digital images 14 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 1, MARCH 2011 Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error Hussein A. Aly, Member,

More information

How Many Humans Does it Take to Judge Video Quality?

How Many Humans Does it Take to Judge Video Quality? How Many Humans Does it Take to Judge Video Quality? Bill Reckwerdt, CTO Video Clarity, Inc. Version 1.0 A Video Clarity Case Study page 1 of 5 Abstract for Subjective Video Quality Assessment In order

More information

ReLACK: A Reliable VoIP Steganography Approach

ReLACK: A Reliable VoIP Steganography Approach 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement ReLACK: A Reliable VoIP Steganography Approach Mohammad Hamdaqa, Ladan Tahvildari Software Technologies Applied

More information

Webpage: Volume 4, Issue V, May 2016 ISSN

Webpage:   Volume 4, Issue V, May 2016 ISSN EMBEDDING & EXTRACTION OF POWER DATA INTO A AUDIO FILE USING MODIFIED DIRECT SEQUENCE SPREAD SPECTRUM TECHNIQUE Vijeta Pandey 1, Vikas Verma 2, Gourav Sharma 3 1,M.Tech Student, Electrical Engineering

More information