Source Codec for Multimedia Data Hiding
|
|
- Miles Reynolds
- 7 years ago
- Views:
Transcription
1 Source Codec for Multimedia Data Hiding K. Somasundaram 1, M. Sukumar 2, K. P.Vigneshkumar 3 1,3 M.Tech-Information Technology, SNS College of Engineering, Coimbatore 2 B.Tech-Information Technology, University College of Engineering, Tindivanam Abstract The communication system can be achieved based on steganography in stream media such as LSB based (Least Significant Bit) methods are the most popular strategies. The steganography algorithm for embedding data in the active and inactive frame audio streams encoded by XOR source codec. This is used extensively in channel. Then LSB embedding in the secret information flat regions of the speech. This method divides the two frames, each representing 0 and 1 respectively. The active and inactive frames of audio are more suitable for data embedding. The steganography in the active and inactive audio frames attains a larger data embedding capacity the same imperceptibility. An improved voice activity detection algorithm is suggested for detecting active voice and inactive voice. For each frame, the VAD function will return a 0 and 1 indication to indicate whether speech is active voice and inactive voice Experimental results show our proposed steganography algorithm not only achieved perfect imperceptibility but also gained the integrity of hidden messages in the case of packet loss. Keywords- Adaptive Steganography, Block Steganography, Steganalysis, Conver Communication, VAD I. INTRODUCTION Information hiding is the technology of embedding secret message into ordinary cover-object. The output of such operation is called stegano object, which is transmitted through the channel. The receiver can extract the secret message from the stegano object. This technology hides not only the content of the message, but also the existence of the transmission. Information hiding techniques have recently become important in the number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguish but imperceptible marks. Military communication systems make increasing use of the traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver, or its very existence. Similar techniques are used in some mobile phone systems for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity, and many of them are surprisingly easy to circumvent. 77 In this article, we try to give an overview of the field, of what we know, what works, what does not, and what are the interesting topics for research. Many researches on audio based information hiding have been reported, most of which are in audio files in high speed formats like WAV and MP3. However, information hiding in low bit-rate audio signal like compressed speech in Voice over IP (VoIP) is still an emerging problem. Low bit-rate codec has certain signal processing models as well as specific bit stream definition and codebooks. These restrictions might be the reasons that slow down the research of information hiding in low bit-rate speech. Also there are a couple of aspects that should be considered. The first is the requirement for real time communication. In other words, delay is not tolerable to be enlarged, especially if the cover speech is instantly spoken out rather than previously recorded. The speech is usually segmented into frames of 20ms or so, thus the message should also be embedded frame by frame. The second is robustness. The method of Least Significant Bit (LSB) might be efficient, but not able to survive low bit-rate compression. If the secret message is embedded in the original signal before the low bit-rate compression, there would be a probability of bit error during extraction. Hence directly embedding in the bit stream of low bit-rate speech is probably a better solution. It is more challenging to embed in low bit-rate speech because the redundancy in the original waveform is eliminated by the parameter model based coding. Generally speaking, most low bit-rate speech codec are based on LPC model, which uses auto regressive filter to predict current sample value. Such filter is called LPC analysis filter. The reversed LPC analysis filter is called LPC synthesis filter. The output of the former, or say the input of the later is called residual or excitation. Both the LPC filter coefficients and the residual are encoded and transmitted. In speech coding the Analysis-by- Synthesis (ABS) method is also widely used, which minimizes the distortion by means of decoding the encoded signal and choosing the codeword of least error. Taking the advantage of ABS, the distortion caused by embedding in the vector quantization index of LPC coefficients is decreased adaptively in the encoding of the residual. Our solution employs Quantization Index Modulation (QIM) method in the LPC (or LPC derived) field.
2 In each index one secret bit is embedded. The essence of QIM method is to divide the whole codebook into two parts and assign a label of 0 or 1 to every codeword. When a secret bit is embedded, only the corresponding part of the codebook is used. On the receiving side, the hidden bit is extracted by checking which part of the whole codebook the codeword belongs to. On condition that the channel is reliable, the receiver is able to directly extract the message from the compressed speech stream. Meanwhile the embedding algorithm only searches in half of the codebook rather than the entire one, so it does not cause additional delay. However, since the number of code words used in quantization is lessened, the distortion is increased. In order to lighten the distortion, one of the most important tasks is to find an ideal codebook partition scheme. Voice activity detection (VAD) refers to the ability of distinguishing speech from noise and is an integral part of a variety of speech communication systems, such as speech coding, speech recognition, hands-free telephony, audio conferencing and echo cancellation. In the GSMbased wireless system for instance a VAD module are used for discontinuous transmission to save battery power. Similarly a VAD device is used in any variable bit rate codec to control the average bit rate and the overall coding quality of speech. In wireless systems based on code division multiple accesses. This scheme is important for enhancing the system capacity by minimizing interference. In early VAD algorithms, short-term energy, zero-crossing rate and LPC coefficients were among the common features used for speech detection. Formant shape and least-square periodicity measure are some of the more recent metrics used in VAD designs. A set of metrics including line spectral frequencies (LSF), low band energy, zero-crossing rate and full-band energy is used along with heuristically determined regions and boundaries to make a VAD decision for each 10 ms frame. Higher-order statistics (HOS) have shown promising results in a number of signal processing applications, and are of particular value when dealing with a mixture of Gaussian and non- Gaussian processes and system nonlinearity. The application of HOS to speech processing has been primarily motivated by their inherent Gaussian suppression and phase preservation properties. Work in this area has been based on the assumptions that speech has certain HOS properties that are distinct from those of Gaussian noise. While previous work in the area of speech analysis such as detection voicing classification or pitch estimation, have attempted to exploit some of the observed features of the HOS of speech signals, little has been done in providing an analytical framework for using these cumulates in a voiced/unvoiced detector using the bispectrum is developed and based on the observation that unvoiced phonemes are produced by a Gaussian-like excitation and thus result in a small bispectrum whereas the same is not true for voiced phonemes. In a method based on Gaussianity tests for the bispectrum and the triple correlation is used to discriminate voiced and unvoiced segments. The method exploits the Gaussian blindness of HOS but not the peculiarities of the HOS of voiced speech to better classify the segments. In the normalized skewness and kurtosis of short-term speech segments are used to detect transitional speech events (termed innovation), based on the observation that these two statistics take on nonzero values at the boundaries of speech segments, but no Analytical ground is given to support the results. In a pitch estimation method based on the periodicity of the diagonal slice of the third order cumulate is described and yields more reliable pitch estimates than the autocorrelation but the claim of the thirdorder cumulate slice having similar periodicity as the underlying speech is not clearly demonstrated. A robust VAD algorithm based on newly established HOS properties of speech. The first part the characteristics of the third - and fourth-order cumulates of the LPC residual of speech signals. The flat spectral envelope of this residual results in distinct characteristics for these cumulates in terms of phase, periodicity and harmonic content and yields closed form expressions for the skewness and kurtosis. It is shown, in the case of voiced speech, that these cumulates have zero-phase, a similar harmonic nature as the underlying speech and harmonic amplitudes that are a function of speech energy. The expressions for the skewness and kurtosis of voiced speech show they may be expressed in terms of speech energy and that the normalized metrics have values that are greater than zero, regardless of the speech magnitude. In addition, experimental results show that while sustained unvoiced speech has zero HOS, it is seldom the case in real-life utterances, given that unvoiced segments are short and occur at transitional speech boundaries resulting in nonzero HOS. 78
3 The properties and experimental findings thus established show that the HOS of speech are in general nonzero and sufficiently distinct from those of Gaussian noise to be used as a basis for speech detection. The statistics are immune to Gaussian noise make them a set of robust metrics that are particularly effective in low SNR conditions. The second part of the HOS properties of speech thus established and presents a new VAD algorithm that combines HOS metrics with classical second-order measures to classify short frames as speech or noise. A necessary condition for voicing is derived based on the relation between the skewness and kurtosis of voiced speech. The practical issues related to HOS analysis such as the bias and variance of the estimators is addressed. Using the white Gaussian assumption about noise in the LPC residual, a new unbiased estimator for the kurtosis is proposed and the variances of the HOS estimators are derived and expressed in terms of the underlying process variance (i.e., the noise energy). Knowledge of these variances allows quantifying the noise likelihood of a given frame given the values of these two estimates. The algorithm is tested using a variety of noise types and different SNR levels and its performance compared to the ITU-T G.729B VAD. To quantify performance, the probability of correctly classifying speech and noise frames as well as the probability of false classification are computed by making references to truth marker files in clean speech conditions. To compute these metrics and generate the noisy speech test cases, we used the material in the TIA database proposed for the evaluation of VAD algorithms. Eighty test cases were used, with each case consisting of a different combination of speech normalization level, noise type and SNR. Four SNR levels are used db, 18 db, 12 db, and 6 db, with the SNR value computed as the ratio of the total energy of speech to that of the noise over the entire utterance, according to the procedure. The results show that the proposed algorithm performs overall better than G.729B with noticeable improvement in the Gaussianlike noises, such as street and parking garage and moderate to low SNR. Digital steganography in low bit rate audio streams is commonly regarded as a challenging topic in the field of data hiding. There have been several steganography methods of embedding data in audio streams. A G.711 based adaptive speech information hiding approach. lossless steganography in G.711 encoded speeches. A steganography method of embedding data in G.721 encoded speeches. All these methods adopt high bit rate audio streams encoded by the waveform codec as cover objects, in which plenty of least significant bits exist. 79 However, VoIP are usually transmitted over low bit rate audio streams encoded by the source codec like ITU G codec to save on network bandwidth. Low bit rate audio streams are less likely to be used as cover objects for steganography since they have fewer least significant bits than high bit rate audio streams. Little effort has been made to develop algorithms for embedding data in low bit rate audio streams. The embedded information in G.729 and MELP audio streams. A steganography algorithm for embedding information in low bit rate audio streams. But these steganography algorithms have constrains on the data embedding capacity that is, their data embedding rates are too low to have practical applications. Thus the main focus of this study was to work out how to increase the data embedding capacity of steganography in low bit rate audio streams. The some related work, discussing the possibility of embedding data in the inactive frames of low bit rate audio streams. In the imperceptibility of the steganography algorithm for embedding data in the inactive audio frames is analyzed. II. LITERATURE REVIEW A prediction-based conditional entropy coder which Annex A, et al [1] Dual rate speech coder for multimedia communications transmitting at 5.3 and 6.3 Kbit/s, G specifies a coded representation that can be used for compressing the speech or other audio signal component of multimedia services at a very low bit rate. In the design of this coder, the principal application considered was very low bit rate visual telephony as part of the overall H.324 family of standards. G has two bit rates associated with it. These are 5.3 and 6.3 Kbit/s. The higher bit rate has greater quality. The lower bit rate gives good quality and provides system designers with additional flexibility. Both rates are a mandatory part of the encoder and decoder. It is possible to switch between the two rates at any 30 ms frame boundary. An option for variable rate operation using discontinuous transmission and noise fill during nonspeech intervals is also possible. N. Aoki, et al [2] Steganography may be employed for secretly transmitting side information in order to improve the performance of signal processing such as packet loss concealment and band extension of telephony speech. The previous studies employ LSB replacement technique for embedding steganogram information into speech data. Instead of such a lossy steganography technique, this study has investigated a loss less steganography technique for G.711, the most common codec for telephony systems such as VoIP. The proposed technique in this study exploits the redundancy of G.711 for embedding steganogram information into speech data without degradation.
4 This paper newly investigates the possibility of a semiloss less steganography technique for increasing the capacity of the loss less steganography technique. C. Bao, et al [4] Based on the analyzing of the redundancy of coded parameters in G.723.1, a novel approach to detect hiding information is proposed in this paper. By using the statistical value of increaser entropy, this scheme can not only detect hidden messages embedded in compressed speech, but also estimate the embedded message length accurately. The experimental results show that the proposed scheme is effective. M. U. Celik, et al [5] A novel lossless (reversible) dataembedding technique, which enables the exact recovery of the original host signal upon extraction of the embedded information. A generalization of the well-known least significant bit (LSB) modification is proposed as the dataembedding method additional operating points on the capacity-distortion curve. Lossless recovery of the original is achieved by compressing portions of the signal that are susceptible to embedding distortion and transmitting these compressed descriptions as a part of the embedded payload. utilizes unaltered portions of the host signal as sideinformation improves the compression efficiency and thus the lossless data-embedding capacity. L. Ma, Z. Wu, and W. Yang, et al [8] an approach for speech information hiding based on G.721 scheme. Dynamic secret speech information data bits can be embedded into original carrier speech data, with high efficiency in steganography and good quality in output speech. This method is superior to available classical algorithms on hiding capacity and robustness. This paper implements the proposed approach based on speech coding scheme G.721 and the experiments show that this approach meets the requirements of information hiding, satisfies the constraints of speech quality for secure communication, and achieves high hiding capacity of 1.6Kbps with an excellent speech quality and complicating speakers recognition. F.A.P. Petit colas, et al [9] Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks. Military communications systems make increasing use of the traffic security techniques which, rather than the merely concealing the content of a message using encryption, seek to conceal its sender, its receiver, or its very existence. Similar techniques are used in some mobile phone systems for digital elections. Criminals try to use whatever traffic security properties are provide intentionally or otherwise in the available communications systems, and police forces try to restrict their use. Z. Wu and W. Yang et al [13] suggested a G.711-based an adaptive LSB (Least Significant Bit) algorithm to embed dynamic secret speech information data bits into public speech of G.711-PCM (Pulse Code Modulation) for the purpose of secure communication according to energy distribution with high efficiency in steganography and good quality in output speech. It is superior to available classical algorithms, LSB. The embedding up to 20 Kbps information data of secret speech into G.711 speech at an average embedded error rate of It meets the requirements of information hiding, and satisfies the secure communication speech quality constraints with an excellent speech quality and complicating speaker recognition. B. Xiao, et al [14] Which is applied to information hiding in instant low bit-rate speech stream. The QIM method divides the codebook into two parts, each representing 0 and 1 respectively. Instead of randomly partitioning the codebook, the relationship between code words is considered. The proposed algorithm Complementary Neighbor Vertices (CNV) guarantees that every codeword is in the opposite part to its nearest neighbor, and the distortion is limited by a bound. The feasibility of CNV is proved with graph theory. Moreover, in our work the secret message is embedded in the field of vector quantization index of LPC coefficients, getting the benefit that the distortion due to QIM is lightened adaptively by the rest of the encoding procedure. Experiments on ilbc and G verify the effectiveness of the proposed method. Both objective and subjective assessments show the proposed method only slightly decreases the speech quality to an indistinguishable degree. The hiding capacity is no less than 100 bps. To the best of our knowledge, this is the first work adopting graph theory to improve the codebook partition while using QIM in low bit-rate streaming media. III. PROPOSED SYSTEM The PCM codec is based on the waveform model that samples, quantizes, and encodes audio signals directly. The sample value represents the original volume of the signal. The inactive voice cannot be used to embed information since it will lead to obvious distortion. This codec compresses the speech at a very low bit rate and performs on a frame-by-frame each frame is encoded into various parameters rather than the sample volumes. 80
5 Thus the volume of the speech does not change imperceptibly even though their inactive audio frames contain hidden information. The theoretical analysis above suggests that steganography in the inactive frames of low bit rate audio streams would attain a larger data embedding capacity if an appropriate steganography algorithm were used. The two type of frame and steganography algorithms are then used respectively to embed the secret information. Then the low bit rate stream with hidden information is called stegano speech. which is transmitted to using VoIP. The stegano speech is then decoded and the extraction of secret information from the stegano speech is the inverse process of the embedding algorithm. Then finally got the secret information as well as PCM formatted audio stream. In our proposed steganography algorithm not only achieved perfect imperceptibility but also achieved a high data embedding capacity we using XOR operation with 8kb/s. The data embedding capacity of the proposed algorithm is very much larger than those of previously suggested algorithms. A. VAD Algorithm The input speech and noise data will be read from WAV files with a sampling rate of 8 khz. The speech data will be divided into frames of 80 samples (10 ms).for each frame, the VAD function (supplied) will return a 0/1 indication to indicate whether speech is active voice and inactive voice. If the Enr<Thresh is called inactive voice and Enr>=Thresh then it is called active voice. Active speech frame, the samples will be converted to µ-law codes (8-bits per sample).for the first inactive speech frame, a silence descriptor (SID) frame will be transmitted. This will contain at most 11 parameters. Subsequent inactive speech frames only send a place holder to indicate no information. This information for each frame will be written to a file. Active frames will contain a flag (byte with value 1), followed by 80 bytes of speech data. SID frames will contain a flag (byte with value 2), followed by 11 floating point values. Silence frames will contain a flag (byte with value 0) and nothing else. 16-bit samples to 8-bit codes and because of the "silence compression" afforded by DTX. The transmitter must generate a file. The receiver has only the file available and must generate speech samples from the data in the file. Even in this simple setup, the intermediate file will be significantly smaller than the original file because of the µ- law coding. The receiver reads the first byte of each frame from the data file and based on the flag value operates as follows. 81 For active frames, the speech data is decoded and converted to 80 speech samples. In SID, frames, 80 comfort noise samples are generated. The noise is generated based on the information in the 11 parameters contained in the SID frame. In silence frames, 80 comfort noise samples are generated based on the information received in SID frames. B. Data Embedding All the audio signal and secret message are then encoded uniformly by XOR into low bit rate stream. Then the output is for formed Encrypted message. The low bit rate stream contains inactive and active frames. The two type of frame and steganography algorithm are then used respectively to embed the secret information. Then the low bit rate stream with hidden information is called stegano speech, which is transmitted to using channel. Then the encrypted message are again hide with original audio. Then new audio is generated. This is provide the security. C. Data Extracting The stegano speech is then decoded and the extraction of secret information from the stegano speech is the inverse process of the embedding algorithm. Then the new audio is transmitted to the receiver through the channel. The receiver extract the audio signal and encrypted message. Then the encrypted message and audio signal is De-XOR. Then the receiver received formatted audio stream and secret information. Then finally got the secret information as well as PCM formatted audio stream. IV. CONCLUSION A high-capacity steganography algorithm for embedding data in the active and inactive frames of low bit rate audio streams encoded by XOR operation source codec. VAD algorithms are used to separate active frame and inactive frame from the audio. The data are hidden in both active and inactive frames. The encrypted messages are again hidden with the same audio. The experimental results have shown that our proposed steganography algorithm can achieve a larger data embedding capacity with imperceptible distortion of the original speech, compared with other three algorithms. We have also demonstrated that the proposed steganography algorithm is more suitable for embedding data in inactive audio frames than in active audio frames. However, before the proposed algorithm comes into practical use in conversion of VoIP communications. The algorithm comes into practical use in converting VoIP communications. VoIP streams are more suitable for the data embedding than the active and the inactive frames of streams.
6 To use this method VoIP uses the integrity of hidden message which gives no packet loss. In future we planned to make this method more efficient by giving zero packet loss and higher data security. REFERENCES [1 ] Annex, A. (2009) Dual rate speech coder for multimedia communications transmitting at 5.3 and 6.3 Kbit/s, ITU-T Recommendation G [Online]. Available: x?val= [2 ] Aoki, N. (2008) A technique of lossless steganography for G.711 telephony speech, in Proc th Int. Conf. Intelligent Inf. Hiding Multimedia Signal Process. (IIH-MSP), Harbin, Aug. 2008, pp [3 ] Bai, L.Y. and Xiao, B. (2008) Covert channels based on jitter field of the RTCP header, in Proc. IEEE Int. Conf. Intelligent Inf. Hiding Multimedia Signal Process, pp [4 ] Bao.C, and Zhu, C. (2006) Steganalysis of compressed speech, in Proc. IMACS Multiconf. Computational Eng. Syst. Applicat. (CESA), pp [5 ] Celik.M.U, Sharma, G. and Saber, E. (2005) Lossless generalized lsb data embedding, IEEE Trans. Image Process., vol. 14, no.2, pp [6 ] Chen.B, and Wornell, G.W. (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding'. IEEE Transactions on Information Theory, Vol47(4): pp [7 ] Kitawaki.N, Nagabuchi, H. and Itoh, K. (1988) Objective quality evaluation for low-bit-rate speech coding systems, IEEE J. Sel. Areas Commun.,vol. 6, no. 2, pp [8 ] Ma.L, Z. Wu, and Yang, W. (2007) Approach to hide secret speech information in G.721 scheme, Lecture Notes Comput. Sci., vol. 4681, pp [9 ] Petitcolas.F.A.P, and Kuhn,M.G. (1999) Information hiding-a survey Proceedings of the IEEE, Vol.87(7):pp [10 ] Phil Sallee, (2004) Model-Based Steganography, IWDW 2003, LNCS 2939, pp , [11 ] Quatieri.T.F. (2002) Discrete-Time speech signal processing: Principles and practice, Prentice Hall PTR. [12 ] Tian, H. Zhou, K, Feng, D and Liu, J. (2008) A covert communication model based on least significant bits steganography in voice over IP, in Proc. 9th Int. Conf. For Young Comput. Scientists, pp [13 ] Wang Chungyi, Wu Quincy.(2007) Information Hiding in Real- Time VoIP Streams. Ninth IEEE International Symposium on Multimedia, Proceedings, pp [14 ] Wu and W. Yang. (2006) G.711-based adaptive speech information hiding approach, Lecture Notes Comput. Sci., vol. 4113, pp [15 ] Xiao, B, Huang, Y. F. and Tang, S. (2008) An approach to information hiding in low bit rate speech stream, in Proc. IEEE GLOBECOM, pp , IEEE Press. 82
Index Terms Audio streams, inactive frames, steganography, Voice over Internet Protocol (VoIP), packet loss. I. Introduction
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Advanced Integrated Steganographic
More informationBroadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
More informationDigital Speech Coding
Digital Speech Processing David Tipper Associate Professor Graduate Program of Telecommunications and Networking University of Pittsburgh Telcom 2720 Slides 7 http://www.sis.pitt.edu/~dtipper/tipper.html
More informationGiLBCSteg: VoIP Steganography Utilizing the Internet Low Bit-Rate Codec
Computer Science and Information Technology 1(2): 153-158, 2013 DOI: 10.13189/csit.2013.010212 http://www.hrpub.org GiLBCSteg: VoIP Steganography Utilizing the Internet Low Bit-Rate Codec Garrett Calpouzos
More informationA Comparison of Speech Coding Algorithms ADPCM vs CELP. Shannon Wichman
A Comparison of Speech Coding Algorithms ADPCM vs CELP Shannon Wichman Department of Electrical Engineering The University of Texas at Dallas Fall 1999 December 8, 1999 1 Abstract Factors serving as constraints
More informationVoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.)
VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.) 1 Remember first the big picture VoIP network architecture and some terminologies Voice coders 2 Audio and voice quality measuring
More informationHow To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3
Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is
More informationAnalog-to-Digital Voice Encoding
Analog-to-Digital Voice Encoding Basic Voice Encoding: Converting Analog to Digital This topic describes the process of converting analog signals to digital signals. Digitizing Analog Signals 1. Sample
More informationSimple Voice over IP (VoIP) Implementation
Simple Voice over IP (VoIP) Implementation ECE Department, University of Florida Abstract Voice over IP (VoIP) technology has many advantages over the traditional Public Switched Telephone Networks. In
More informationIntroduction to Packet Voice Technologies and VoIP
Introduction to Packet Voice Technologies and VoIP Cisco Networking Academy Program Halmstad University Olga Torstensson 035-167575 olga.torstensson@ide.hh.se IP Telephony 1 Traditional Telephony 2 Basic
More information2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
More informationCalculating Bandwidth Requirements
Calculating Bandwidth Requirements Codec Bandwidths This topic describes the bandwidth that each codec uses and illustrates its impact on total bandwidth. Bandwidth Implications of Codec 22 One of the
More informationBasic principles of Voice over IP
Basic principles of Voice over IP Dr. Peter Počta {pocta@fel.uniza.sk} Department of Telecommunications and Multimedia Faculty of Electrical Engineering University of Žilina, Slovakia Outline VoIP Transmission
More informationCHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Overview Steganography is the process of hiding secret data inside other, normally transmitted data. In other words, as defined by [40] steganography means hiding of a secret
More informationVoice---is analog in character and moves in the form of waves. 3-important wave-characteristics:
Voice Transmission --Basic Concepts-- Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics: Amplitude Frequency Phase Voice Digitization in the POTS Traditional
More informationPCM Encoding and Decoding:
PCM Encoding and Decoding: Aim: Introduction to PCM encoding and decoding. Introduction: PCM Encoding: The input to the PCM ENCODER module is an analog message. This must be constrained to a defined bandwidth
More informationA TOOL FOR TEACHING LINEAR PREDICTIVE CODING
A TOOL FOR TEACHING LINEAR PREDICTIVE CODING Branislav Gerazov 1, Venceslav Kafedziski 2, Goce Shutinoski 1 1) Department of Electronics, 2) Department of Telecommunications Faculty of Electrical Engineering
More informationMULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY
MULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY Yi J. Liang, Eckehard G. Steinbach, and Bernd Girod Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,
More informationIntroduction and Comparison of Common Videoconferencing Audio Protocols I. Digital Audio Principles
Introduction and Comparison of Common Videoconferencing Audio Protocols I. Digital Audio Principles Sound is an energy wave with frequency and amplitude. Frequency maps the axis of time, and amplitude
More informationMPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music
ISO/IEC MPEG USAC Unified Speech and Audio Coding MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music The standardization of MPEG USAC in ISO/IEC is now in its final
More informationVoice Over IP Per Call Bandwidth Consumption
Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before
More informationWeb-Conferencing System SAViiMeeting
Web-Conferencing System SAViiMeeting Alexei Machovikov Department of Informatics and Computer Technologies National University of Mineral Resources Mining St-Petersburg, Russia amachovikov@gmail.com Abstract
More informationIndepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
More informationComputer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction
Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals Modified from the lecture slides of Lami Kaya (LKaya@ieee.org) for use CECS 474, Fall 2008. 2009 Pearson Education Inc., Upper
More informationVoice Activity Detection in the Tiger Platform. Hampus Thorell
Voice Activity Detection in the Tiger Platform Examensarbete utfört i Reglerteknik av Hampus Thorell LiTH-ISY-EX--06/3817--SE Linköping 2006 Voice Activity Detection in the Tiger Platform Examensarbete
More informationJPEG Image Compression by Using DCT
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*
More informationA Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
More informationVoice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP
Voice over IP Andreas Mettis University of Cyprus November 23, 2004 Overview What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP 1 VoIP VoIP (voice over IP - that is,
More informationAn Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Rui Miao Department of Electronic Engineering, Tsinghua University, Beijing, China rm870725@gmail.com Yongfeng
More informationPacket Loss Concealment Algorithm for VoIP Transmission in Unreliable Networks
Packet Loss Concealment Algorithm for VoIP Transmission in Unreliable Networks Artur Janicki, Bartłomiej KsięŜak Institute of Telecommunications, Warsaw University of Technology E-mail: ajanicki@tele.pw.edu.pl,
More informationAdvanced Speech-Audio Processing in Mobile Phones and Hearing Aids
Advanced Speech-Audio Processing in Mobile Phones and Hearing Aids Synergies and Distinctions Peter Vary RWTH Aachen University Institute of Communication Systems WASPAA, October 23, 2013 Mohonk Mountain
More informationSPEECH SIGNAL CODING FOR VOIP APPLICATIONS USING WAVELET PACKET TRANSFORM A
International Journal of Science, Engineering and Technology Research (IJSETR), Volume, Issue, January SPEECH SIGNAL CODING FOR VOIP APPLICATIONS USING WAVELET PACKET TRANSFORM A N.Rama Tej Nehru, B P.Sunitha
More informationHow To Understand The Differences Between A Fax And A Fax On A G3 Network
The Fax on IP Networks White Paper February 2011 2 The Fax on IP Networks Contents Overview... 3 Group 3 Fax Technology... 4 G.711 Fax Pass-Through... 5 T.38 IP Fax Relay... 6 Network Design Considerations...
More informationReversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
More informationDigital Transmission of Analog Data: PCM and Delta Modulation
Digital Transmission of Analog Data: PCM and Delta Modulation Required reading: Garcia 3.3.2 and 3.3.3 CSE 323, Fall 200 Instructor: N. Vlajic Digital Transmission of Analog Data 2 Digitization process
More informationImage Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
More informationSimulative Investigation of QoS parameters for VoIP over WiMAX networks
www.ijcsi.org 288 Simulative Investigation of QoS parameters for VoIP over WiMAX networks Priyanka 1, Jyoteesh Malhotra 2, Kuldeep Sharma 3 1,3 Department of Electronics, Ramgarhia Institue of Engineering
More informationUsing transcoding for hidden communication in IP telephony
DOI 10.1007/s11042-012-1224-8 Using transcoding for hidden communication in IP telephony Wojciech Mazurczyk Paweł Szaga Krzysztof Szczypiorski # The Author(s) 2012. This article is published with open
More informationNetwork administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.
Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic
More informationPERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
More informationAN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,
More informationBandwidth Adaptation for MPEG-4 Video Streaming over the Internet
DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen
More informationLinear Predictive Coding
Linear Predictive Coding Jeremy Bradbury December 5, 2000 0 Outline I. Proposal II. Introduction A. Speech Coding B. Voice Coders C. LPC Overview III. Historical Perspective of Linear Predictive Coding
More informationANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)
More informationImage Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
More informationElectronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT)
Page 1 Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) ECC RECOMMENDATION (06)01 Bandwidth measurements using FFT techniques
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationFrom Concept to Production in Secure Voice Communications
From Concept to Production in Secure Voice Communications Earl E. Swartzlander, Jr. Electrical and Computer Engineering Department University of Texas at Austin Austin, TX 78712 Abstract In the 1970s secure
More informationChapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
More information1 There are also private networks including leased-lines, analog PBXs
Application Notes Title Series Overview Data and Fax modem performance on VoIP services VoIP Performance Management Date November 2005 This application note describes the typical performance issues that
More informationEfficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor
More informationA comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
More informationIP-Telephony Quality of Service (QoS)
IP-Telephony Quality of Service (QoS) Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline End-to-end OoS of VoIP services Quality of speech codecs Network-QoS IntServ RSVP DiffServ
More informationClearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
More informationChallenges and Solutions in VoIP
Challenges and Solutions in VoIP Challenges in VoIP The traditional telephony network strives to provide 99.99 percent uptime to the user. This corresponds to 5.25 minutes per year of down time. Many data
More informationVoice over IP Protocols And Compression Algorithms
University of Tehran Electrical and Computer Engineering School SI Lab. Weekly Presentations Voice over IP Protocols And Compression Algorithms Presented by: Neda Kazemian Amiri Agenda Introduction to
More informationINTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
More informationSubjective SNR measure for quality assessment of. speech coders \A cross language study
Subjective SNR measure for quality assessment of speech coders \A cross language study Mamoru Nakatsui and Hideki Noda Communications Research Laboratory, Ministry of Posts and Telecommunications, 4-2-1,
More informationHow To Understand The Quality Of A Wireless Voice Communication
Effects of the Wireless Channel in VOIP (Voice Over Internet Protocol) Networks Atul Ranjan Srivastava 1, Vivek Kushwaha 2 Department of Electronics and Communication, University of Allahabad, Allahabad
More informationBLIND SOURCE SEPARATION OF SPEECH AND BACKGROUND MUSIC FOR IMPROVED SPEECH RECOGNITION
BLIND SOURCE SEPARATION OF SPEECH AND BACKGROUND MUSIC FOR IMPROVED SPEECH RECOGNITION P. Vanroose Katholieke Universiteit Leuven, div. ESAT/PSI Kasteelpark Arenberg 10, B 3001 Heverlee, Belgium Peter.Vanroose@esat.kuleuven.ac.be
More informationMonitoring VoIP Call Quality Using Improved Simplified E-model
Monitoring VoIP Call Quality Using Improved Simplified E-model Haytham Assem, David Malone Hamilton Institute, National University of Ireland, Maynooth Hitham.Salama.2012, David.Malone@nuim.ie Jonathan
More informationWATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
More informationComplexity-bounded Power Control in Video Transmission over a CDMA Wireless Network
Complexity-bounded Power Control in Video Transmission over a CDMA Wireless Network Xiaoan Lu, David Goodman, Yao Wang, and Elza Erkip Electrical and Computer Engineering, Polytechnic University, Brooklyn,
More informationThe Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT
The Effect of Network Cabling on Bit Error Rate Performance By Paul Kish NORDX/CDT Table of Contents Introduction... 2 Probability of Causing Errors... 3 Noise Sources Contributing to Errors... 4 Bit Error
More informationROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
More informationVoice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
More informationEmotion Detection from Speech
Emotion Detection from Speech 1. Introduction Although emotion detection from speech is a relatively new field of research, it has many potential applications. In human-computer or human-human interaction
More informationThirukkural - A Text-to-Speech Synthesis System
Thirukkural - A Text-to-Speech Synthesis System G. L. Jayavardhana Rama, A. G. Ramakrishnan, M Vijay Venkatesh, R. Murali Shankar Department of Electrical Engg, Indian Institute of Science, Bangalore 560012,
More informationAudio Engineering Society. Convention Paper. Presented at the 129th Convention 2010 November 4 7 San Francisco, CA, USA
Audio Engineering Society Convention Paper Presented at the 129th Convention 2010 November 4 7 San Francisco, CA, USA The papers at this Convention have been selected on the basis of a submitted abstract
More informationOverview of the research results on Voice over IP
Overview of the research results on Voice over IP F. Beritelli (Università di Catania) C. Casetti (Politecnico di Torino) S. Giordano (Università di Pisa) R. Lo Cigno (Politecnico di Torino) 1. Introduction
More informationPerformance Analysis of Interleaving Scheme in Wideband VoIP System under Different Strategic Conditions
Performance Analysis of Scheme in Wideband VoIP System under Different Strategic Conditions Harjit Pal Singh 1, Sarabjeet Singh 1 and Jasvir Singh 2 1 Dept. of Physics, Dr. B.R. Ambedkar National Institute
More informationDetection of covert voice-over Internet protocol communications using sliding window-based steganalysis
Published in IET Communications Received on 3rd May 2010 Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis Y.F. Huang 1 S. Tang 2 Y. Zhang 1 1 Department
More informationA Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
More informationStudy and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of
More informationSTUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION
STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION Adiel Ben-Shalom, Michael Werman School of Computer Science Hebrew University Jerusalem, Israel. {chopin,werman}@cs.huji.ac.il
More informationCombating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng
More informationVoice Encryption over GSM:
End-to to-end Voice Encryption over GSM: A Different Approach Wesley Tanner Nick Lane-Smith www. Keith Lareau About Us: Wesley Tanner - Systems Engineer for a Software-Defined Radio (SDRF) company - B.S.
More informationMUSICAL INSTRUMENT FAMILY CLASSIFICATION
MUSICAL INSTRUMENT FAMILY CLASSIFICATION Ricardo A. Garcia Media Lab, Massachusetts Institute of Technology 0 Ames Street Room E5-40, Cambridge, MA 039 USA PH: 67-53-0 FAX: 67-58-664 e-mail: rago @ media.
More informationVoice over IP. Abdus Salam ICTP, February 2004 School on Digital Radio Communications for Research and Training in Developing Countries
Voice over IP Abdus Salam ICTP, February 2004 School on Digital Radio Communications for Research and Training in Developing Countries Ermanno Pietrosemoli Latin American Networking School (Fundación EsLaRed)
More informationPerformance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder
Performance Analysis and Comparison of 15.1 and H.264 Encoder and Decoder K.V.Suchethan Swaroop and K.R.Rao, IEEE Fellow Department of Electrical Engineering, University of Texas at Arlington Arlington,
More informationDelivering reliable VoIP Services
QoS Tips and Tricks for VoIP Services: Delivering reliable VoIP Services Alan Clark CEO, Telchemy alan.d.clark@telchemy.com 1 Objectives Clear understanding of: typical problems affecting VoIP service
More informationInternational ejournals
ISSN 0976 1411 Available online at www.internationalejournals.com International ejournals International ejournal of Mathematics and Engineering 227 (2013) 2216-2222 EFFICIENT METHOD OF AUDIO STEGANOGRAPHY
More informationAlaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
More informationSampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically.
Sampling Theorem We will show that a band limited signal can be reconstructed exactly from its discrete time samples. Recall: That a time sampled signal is like taking a snap shot or picture of signal
More informationLecture 2 Outline. EE 179, Lecture 2, Handout #3. Information representation. Communication system block diagrams. Analog versus digital systems
Lecture 2 Outline EE 179, Lecture 2, Handout #3 Information representation Communication system block diagrams Analog versus digital systems Performance metrics Data rate limits Next lecture: signals and
More informationTiming Errors and Jitter
Timing Errors and Jitter Background Mike Story In a sampled (digital) system, samples have to be accurate in level and time. The digital system uses the two bits of information the signal was this big
More informationRobust Blind Watermarking Mechanism For Point Sampled Geometry
Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,
More information(Refer Slide Time: 2:10)
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture-12 Multiplexer Applications-1 Hello and welcome to today s lecture on multiplexer
More informationL9: Cepstral analysis
L9: Cepstral analysis The cepstrum Homomorphic filtering The cepstrum and voicing/pitch detection Linear prediction cepstral coefficients Mel frequency cepstral coefficients This lecture is based on [Taylor,
More informationVideo Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu
Video Coding Basics Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu Outline Motivation for video coding Basic ideas in video coding Block diagram of a typical video codec Different
More informationVolume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationLog-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
More informationIAB CONCERNS ABOUT CONGESTION CONTROL. Iffat Hasnian 1832659
IAB CONCERNS ABOUT CONGESTION CONTROL Iffat Hasnian 1832659 IAB CONCERNS Outline 1- Introduction 2- Persistent High Drop rate Problem 3- Current Efforts in the IETF 3.1 RTP 3.2 TFRC 3.3 DCCP 3.4 Audio
More informationAdaptive Equalization of binary encoded signals Using LMS Algorithm
SSRG International Journal of Electronics and Communication Engineering (SSRG-IJECE) volume issue7 Sep Adaptive Equalization of binary encoded signals Using LMS Algorithm Dr.K.Nagi Reddy Professor of ECE,NBKR
More informationData Masking: A New Approach for Steganography?
Journal of VLSI Signal Processing 41, 293 303, 2005 c 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. DOI: 10.1007/s11265-005-4153-1 Data Masking: A New Approach for Steganography?
More informationSecret Communication through Web Pages Using Special Space Codes in HTML Files
International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a
More informationFigure1. Acoustic feedback in packet based video conferencing system
Real-Time Howling Detection for Hands-Free Video Conferencing System Mi Suk Lee and Do Young Kim Future Internet Research Department ETRI, Daejeon, Korea {lms, dyk}@etri.re.kr Abstract: This paper presents
More informationThe Problem with Faxing over VoIP Channels
The Problem with Faxing over VoIP Channels Lower your phone bill! is one of many slogans used today by popular Voice over IP (VoIP) providers. Indeed, you may certainly save money by leveraging an existing
More informationHD Radio FM Transmission System Specifications Rev. F August 24, 2011
HD Radio FM Transmission System Specifications Rev. F August 24, 2011 SY_SSS_1026s TRADEMARKS HD Radio and the HD, HD Radio, and Arc logos are proprietary trademarks of ibiquity Digital Corporation. ibiquity,
More informationVoIP Bandwidth Considerations - design decisions
VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or
More information