Source Codec for Multimedia Data Hiding

Size: px
Start display at page:

Download "Source Codec for Multimedia Data Hiding"

Transcription

1 Source Codec for Multimedia Data Hiding K. Somasundaram 1, M. Sukumar 2, K. P.Vigneshkumar 3 1,3 M.Tech-Information Technology, SNS College of Engineering, Coimbatore 2 B.Tech-Information Technology, University College of Engineering, Tindivanam Abstract The communication system can be achieved based on steganography in stream media such as LSB based (Least Significant Bit) methods are the most popular strategies. The steganography algorithm for embedding data in the active and inactive frame audio streams encoded by XOR source codec. This is used extensively in channel. Then LSB embedding in the secret information flat regions of the speech. This method divides the two frames, each representing 0 and 1 respectively. The active and inactive frames of audio are more suitable for data embedding. The steganography in the active and inactive audio frames attains a larger data embedding capacity the same imperceptibility. An improved voice activity detection algorithm is suggested for detecting active voice and inactive voice. For each frame, the VAD function will return a 0 and 1 indication to indicate whether speech is active voice and inactive voice Experimental results show our proposed steganography algorithm not only achieved perfect imperceptibility but also gained the integrity of hidden messages in the case of packet loss. Keywords- Adaptive Steganography, Block Steganography, Steganalysis, Conver Communication, VAD I. INTRODUCTION Information hiding is the technology of embedding secret message into ordinary cover-object. The output of such operation is called stegano object, which is transmitted through the channel. The receiver can extract the secret message from the stegano object. This technology hides not only the content of the message, but also the existence of the transmission. Information hiding techniques have recently become important in the number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguish but imperceptible marks. Military communication systems make increasing use of the traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver, or its very existence. Similar techniques are used in some mobile phone systems for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity, and many of them are surprisingly easy to circumvent. 77 In this article, we try to give an overview of the field, of what we know, what works, what does not, and what are the interesting topics for research. Many researches on audio based information hiding have been reported, most of which are in audio files in high speed formats like WAV and MP3. However, information hiding in low bit-rate audio signal like compressed speech in Voice over IP (VoIP) is still an emerging problem. Low bit-rate codec has certain signal processing models as well as specific bit stream definition and codebooks. These restrictions might be the reasons that slow down the research of information hiding in low bit-rate speech. Also there are a couple of aspects that should be considered. The first is the requirement for real time communication. In other words, delay is not tolerable to be enlarged, especially if the cover speech is instantly spoken out rather than previously recorded. The speech is usually segmented into frames of 20ms or so, thus the message should also be embedded frame by frame. The second is robustness. The method of Least Significant Bit (LSB) might be efficient, but not able to survive low bit-rate compression. If the secret message is embedded in the original signal before the low bit-rate compression, there would be a probability of bit error during extraction. Hence directly embedding in the bit stream of low bit-rate speech is probably a better solution. It is more challenging to embed in low bit-rate speech because the redundancy in the original waveform is eliminated by the parameter model based coding. Generally speaking, most low bit-rate speech codec are based on LPC model, which uses auto regressive filter to predict current sample value. Such filter is called LPC analysis filter. The reversed LPC analysis filter is called LPC synthesis filter. The output of the former, or say the input of the later is called residual or excitation. Both the LPC filter coefficients and the residual are encoded and transmitted. In speech coding the Analysis-by- Synthesis (ABS) method is also widely used, which minimizes the distortion by means of decoding the encoded signal and choosing the codeword of least error. Taking the advantage of ABS, the distortion caused by embedding in the vector quantization index of LPC coefficients is decreased adaptively in the encoding of the residual. Our solution employs Quantization Index Modulation (QIM) method in the LPC (or LPC derived) field.

2 In each index one secret bit is embedded. The essence of QIM method is to divide the whole codebook into two parts and assign a label of 0 or 1 to every codeword. When a secret bit is embedded, only the corresponding part of the codebook is used. On the receiving side, the hidden bit is extracted by checking which part of the whole codebook the codeword belongs to. On condition that the channel is reliable, the receiver is able to directly extract the message from the compressed speech stream. Meanwhile the embedding algorithm only searches in half of the codebook rather than the entire one, so it does not cause additional delay. However, since the number of code words used in quantization is lessened, the distortion is increased. In order to lighten the distortion, one of the most important tasks is to find an ideal codebook partition scheme. Voice activity detection (VAD) refers to the ability of distinguishing speech from noise and is an integral part of a variety of speech communication systems, such as speech coding, speech recognition, hands-free telephony, audio conferencing and echo cancellation. In the GSMbased wireless system for instance a VAD module are used for discontinuous transmission to save battery power. Similarly a VAD device is used in any variable bit rate codec to control the average bit rate and the overall coding quality of speech. In wireless systems based on code division multiple accesses. This scheme is important for enhancing the system capacity by minimizing interference. In early VAD algorithms, short-term energy, zero-crossing rate and LPC coefficients were among the common features used for speech detection. Formant shape and least-square periodicity measure are some of the more recent metrics used in VAD designs. A set of metrics including line spectral frequencies (LSF), low band energy, zero-crossing rate and full-band energy is used along with heuristically determined regions and boundaries to make a VAD decision for each 10 ms frame. Higher-order statistics (HOS) have shown promising results in a number of signal processing applications, and are of particular value when dealing with a mixture of Gaussian and non- Gaussian processes and system nonlinearity. The application of HOS to speech processing has been primarily motivated by their inherent Gaussian suppression and phase preservation properties. Work in this area has been based on the assumptions that speech has certain HOS properties that are distinct from those of Gaussian noise. While previous work in the area of speech analysis such as detection voicing classification or pitch estimation, have attempted to exploit some of the observed features of the HOS of speech signals, little has been done in providing an analytical framework for using these cumulates in a voiced/unvoiced detector using the bispectrum is developed and based on the observation that unvoiced phonemes are produced by a Gaussian-like excitation and thus result in a small bispectrum whereas the same is not true for voiced phonemes. In a method based on Gaussianity tests for the bispectrum and the triple correlation is used to discriminate voiced and unvoiced segments. The method exploits the Gaussian blindness of HOS but not the peculiarities of the HOS of voiced speech to better classify the segments. In the normalized skewness and kurtosis of short-term speech segments are used to detect transitional speech events (termed innovation), based on the observation that these two statistics take on nonzero values at the boundaries of speech segments, but no Analytical ground is given to support the results. In a pitch estimation method based on the periodicity of the diagonal slice of the third order cumulate is described and yields more reliable pitch estimates than the autocorrelation but the claim of the thirdorder cumulate slice having similar periodicity as the underlying speech is not clearly demonstrated. A robust VAD algorithm based on newly established HOS properties of speech. The first part the characteristics of the third - and fourth-order cumulates of the LPC residual of speech signals. The flat spectral envelope of this residual results in distinct characteristics for these cumulates in terms of phase, periodicity and harmonic content and yields closed form expressions for the skewness and kurtosis. It is shown, in the case of voiced speech, that these cumulates have zero-phase, a similar harmonic nature as the underlying speech and harmonic amplitudes that are a function of speech energy. The expressions for the skewness and kurtosis of voiced speech show they may be expressed in terms of speech energy and that the normalized metrics have values that are greater than zero, regardless of the speech magnitude. In addition, experimental results show that while sustained unvoiced speech has zero HOS, it is seldom the case in real-life utterances, given that unvoiced segments are short and occur at transitional speech boundaries resulting in nonzero HOS. 78

3 The properties and experimental findings thus established show that the HOS of speech are in general nonzero and sufficiently distinct from those of Gaussian noise to be used as a basis for speech detection. The statistics are immune to Gaussian noise make them a set of robust metrics that are particularly effective in low SNR conditions. The second part of the HOS properties of speech thus established and presents a new VAD algorithm that combines HOS metrics with classical second-order measures to classify short frames as speech or noise. A necessary condition for voicing is derived based on the relation between the skewness and kurtosis of voiced speech. The practical issues related to HOS analysis such as the bias and variance of the estimators is addressed. Using the white Gaussian assumption about noise in the LPC residual, a new unbiased estimator for the kurtosis is proposed and the variances of the HOS estimators are derived and expressed in terms of the underlying process variance (i.e., the noise energy). Knowledge of these variances allows quantifying the noise likelihood of a given frame given the values of these two estimates. The algorithm is tested using a variety of noise types and different SNR levels and its performance compared to the ITU-T G.729B VAD. To quantify performance, the probability of correctly classifying speech and noise frames as well as the probability of false classification are computed by making references to truth marker files in clean speech conditions. To compute these metrics and generate the noisy speech test cases, we used the material in the TIA database proposed for the evaluation of VAD algorithms. Eighty test cases were used, with each case consisting of a different combination of speech normalization level, noise type and SNR. Four SNR levels are used db, 18 db, 12 db, and 6 db, with the SNR value computed as the ratio of the total energy of speech to that of the noise over the entire utterance, according to the procedure. The results show that the proposed algorithm performs overall better than G.729B with noticeable improvement in the Gaussianlike noises, such as street and parking garage and moderate to low SNR. Digital steganography in low bit rate audio streams is commonly regarded as a challenging topic in the field of data hiding. There have been several steganography methods of embedding data in audio streams. A G.711 based adaptive speech information hiding approach. lossless steganography in G.711 encoded speeches. A steganography method of embedding data in G.721 encoded speeches. All these methods adopt high bit rate audio streams encoded by the waveform codec as cover objects, in which plenty of least significant bits exist. 79 However, VoIP are usually transmitted over low bit rate audio streams encoded by the source codec like ITU G codec to save on network bandwidth. Low bit rate audio streams are less likely to be used as cover objects for steganography since they have fewer least significant bits than high bit rate audio streams. Little effort has been made to develop algorithms for embedding data in low bit rate audio streams. The embedded information in G.729 and MELP audio streams. A steganography algorithm for embedding information in low bit rate audio streams. But these steganography algorithms have constrains on the data embedding capacity that is, their data embedding rates are too low to have practical applications. Thus the main focus of this study was to work out how to increase the data embedding capacity of steganography in low bit rate audio streams. The some related work, discussing the possibility of embedding data in the inactive frames of low bit rate audio streams. In the imperceptibility of the steganography algorithm for embedding data in the inactive audio frames is analyzed. II. LITERATURE REVIEW A prediction-based conditional entropy coder which Annex A, et al [1] Dual rate speech coder for multimedia communications transmitting at 5.3 and 6.3 Kbit/s, G specifies a coded representation that can be used for compressing the speech or other audio signal component of multimedia services at a very low bit rate. In the design of this coder, the principal application considered was very low bit rate visual telephony as part of the overall H.324 family of standards. G has two bit rates associated with it. These are 5.3 and 6.3 Kbit/s. The higher bit rate has greater quality. The lower bit rate gives good quality and provides system designers with additional flexibility. Both rates are a mandatory part of the encoder and decoder. It is possible to switch between the two rates at any 30 ms frame boundary. An option for variable rate operation using discontinuous transmission and noise fill during nonspeech intervals is also possible. N. Aoki, et al [2] Steganography may be employed for secretly transmitting side information in order to improve the performance of signal processing such as packet loss concealment and band extension of telephony speech. The previous studies employ LSB replacement technique for embedding steganogram information into speech data. Instead of such a lossy steganography technique, this study has investigated a loss less steganography technique for G.711, the most common codec for telephony systems such as VoIP. The proposed technique in this study exploits the redundancy of G.711 for embedding steganogram information into speech data without degradation.

4 This paper newly investigates the possibility of a semiloss less steganography technique for increasing the capacity of the loss less steganography technique. C. Bao, et al [4] Based on the analyzing of the redundancy of coded parameters in G.723.1, a novel approach to detect hiding information is proposed in this paper. By using the statistical value of increaser entropy, this scheme can not only detect hidden messages embedded in compressed speech, but also estimate the embedded message length accurately. The experimental results show that the proposed scheme is effective. M. U. Celik, et al [5] A novel lossless (reversible) dataembedding technique, which enables the exact recovery of the original host signal upon extraction of the embedded information. A generalization of the well-known least significant bit (LSB) modification is proposed as the dataembedding method additional operating points on the capacity-distortion curve. Lossless recovery of the original is achieved by compressing portions of the signal that are susceptible to embedding distortion and transmitting these compressed descriptions as a part of the embedded payload. utilizes unaltered portions of the host signal as sideinformation improves the compression efficiency and thus the lossless data-embedding capacity. L. Ma, Z. Wu, and W. Yang, et al [8] an approach for speech information hiding based on G.721 scheme. Dynamic secret speech information data bits can be embedded into original carrier speech data, with high efficiency in steganography and good quality in output speech. This method is superior to available classical algorithms on hiding capacity and robustness. This paper implements the proposed approach based on speech coding scheme G.721 and the experiments show that this approach meets the requirements of information hiding, satisfies the constraints of speech quality for secure communication, and achieves high hiding capacity of 1.6Kbps with an excellent speech quality and complicating speakers recognition. F.A.P. Petit colas, et al [9] Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks. Military communications systems make increasing use of the traffic security techniques which, rather than the merely concealing the content of a message using encryption, seek to conceal its sender, its receiver, or its very existence. Similar techniques are used in some mobile phone systems for digital elections. Criminals try to use whatever traffic security properties are provide intentionally or otherwise in the available communications systems, and police forces try to restrict their use. Z. Wu and W. Yang et al [13] suggested a G.711-based an adaptive LSB (Least Significant Bit) algorithm to embed dynamic secret speech information data bits into public speech of G.711-PCM (Pulse Code Modulation) for the purpose of secure communication according to energy distribution with high efficiency in steganography and good quality in output speech. It is superior to available classical algorithms, LSB. The embedding up to 20 Kbps information data of secret speech into G.711 speech at an average embedded error rate of It meets the requirements of information hiding, and satisfies the secure communication speech quality constraints with an excellent speech quality and complicating speaker recognition. B. Xiao, et al [14] Which is applied to information hiding in instant low bit-rate speech stream. The QIM method divides the codebook into two parts, each representing 0 and 1 respectively. Instead of randomly partitioning the codebook, the relationship between code words is considered. The proposed algorithm Complementary Neighbor Vertices (CNV) guarantees that every codeword is in the opposite part to its nearest neighbor, and the distortion is limited by a bound. The feasibility of CNV is proved with graph theory. Moreover, in our work the secret message is embedded in the field of vector quantization index of LPC coefficients, getting the benefit that the distortion due to QIM is lightened adaptively by the rest of the encoding procedure. Experiments on ilbc and G verify the effectiveness of the proposed method. Both objective and subjective assessments show the proposed method only slightly decreases the speech quality to an indistinguishable degree. The hiding capacity is no less than 100 bps. To the best of our knowledge, this is the first work adopting graph theory to improve the codebook partition while using QIM in low bit-rate streaming media. III. PROPOSED SYSTEM The PCM codec is based on the waveform model that samples, quantizes, and encodes audio signals directly. The sample value represents the original volume of the signal. The inactive voice cannot be used to embed information since it will lead to obvious distortion. This codec compresses the speech at a very low bit rate and performs on a frame-by-frame each frame is encoded into various parameters rather than the sample volumes. 80

5 Thus the volume of the speech does not change imperceptibly even though their inactive audio frames contain hidden information. The theoretical analysis above suggests that steganography in the inactive frames of low bit rate audio streams would attain a larger data embedding capacity if an appropriate steganography algorithm were used. The two type of frame and steganography algorithms are then used respectively to embed the secret information. Then the low bit rate stream with hidden information is called stegano speech. which is transmitted to using VoIP. The stegano speech is then decoded and the extraction of secret information from the stegano speech is the inverse process of the embedding algorithm. Then finally got the secret information as well as PCM formatted audio stream. In our proposed steganography algorithm not only achieved perfect imperceptibility but also achieved a high data embedding capacity we using XOR operation with 8kb/s. The data embedding capacity of the proposed algorithm is very much larger than those of previously suggested algorithms. A. VAD Algorithm The input speech and noise data will be read from WAV files with a sampling rate of 8 khz. The speech data will be divided into frames of 80 samples (10 ms).for each frame, the VAD function (supplied) will return a 0/1 indication to indicate whether speech is active voice and inactive voice. If the Enr<Thresh is called inactive voice and Enr>=Thresh then it is called active voice. Active speech frame, the samples will be converted to µ-law codes (8-bits per sample).for the first inactive speech frame, a silence descriptor (SID) frame will be transmitted. This will contain at most 11 parameters. Subsequent inactive speech frames only send a place holder to indicate no information. This information for each frame will be written to a file. Active frames will contain a flag (byte with value 1), followed by 80 bytes of speech data. SID frames will contain a flag (byte with value 2), followed by 11 floating point values. Silence frames will contain a flag (byte with value 0) and nothing else. 16-bit samples to 8-bit codes and because of the "silence compression" afforded by DTX. The transmitter must generate a file. The receiver has only the file available and must generate speech samples from the data in the file. Even in this simple setup, the intermediate file will be significantly smaller than the original file because of the µ- law coding. The receiver reads the first byte of each frame from the data file and based on the flag value operates as follows. 81 For active frames, the speech data is decoded and converted to 80 speech samples. In SID, frames, 80 comfort noise samples are generated. The noise is generated based on the information in the 11 parameters contained in the SID frame. In silence frames, 80 comfort noise samples are generated based on the information received in SID frames. B. Data Embedding All the audio signal and secret message are then encoded uniformly by XOR into low bit rate stream. Then the output is for formed Encrypted message. The low bit rate stream contains inactive and active frames. The two type of frame and steganography algorithm are then used respectively to embed the secret information. Then the low bit rate stream with hidden information is called stegano speech, which is transmitted to using channel. Then the encrypted message are again hide with original audio. Then new audio is generated. This is provide the security. C. Data Extracting The stegano speech is then decoded and the extraction of secret information from the stegano speech is the inverse process of the embedding algorithm. Then the new audio is transmitted to the receiver through the channel. The receiver extract the audio signal and encrypted message. Then the encrypted message and audio signal is De-XOR. Then the receiver received formatted audio stream and secret information. Then finally got the secret information as well as PCM formatted audio stream. IV. CONCLUSION A high-capacity steganography algorithm for embedding data in the active and inactive frames of low bit rate audio streams encoded by XOR operation source codec. VAD algorithms are used to separate active frame and inactive frame from the audio. The data are hidden in both active and inactive frames. The encrypted messages are again hidden with the same audio. The experimental results have shown that our proposed steganography algorithm can achieve a larger data embedding capacity with imperceptible distortion of the original speech, compared with other three algorithms. We have also demonstrated that the proposed steganography algorithm is more suitable for embedding data in inactive audio frames than in active audio frames. However, before the proposed algorithm comes into practical use in conversion of VoIP communications. The algorithm comes into practical use in converting VoIP communications. VoIP streams are more suitable for the data embedding than the active and the inactive frames of streams.

6 To use this method VoIP uses the integrity of hidden message which gives no packet loss. In future we planned to make this method more efficient by giving zero packet loss and higher data security. REFERENCES [1 ] Annex, A. (2009) Dual rate speech coder for multimedia communications transmitting at 5.3 and 6.3 Kbit/s, ITU-T Recommendation G [Online]. Available: x?val= [2 ] Aoki, N. (2008) A technique of lossless steganography for G.711 telephony speech, in Proc th Int. Conf. Intelligent Inf. Hiding Multimedia Signal Process. (IIH-MSP), Harbin, Aug. 2008, pp [3 ] Bai, L.Y. and Xiao, B. (2008) Covert channels based on jitter field of the RTCP header, in Proc. IEEE Int. Conf. Intelligent Inf. Hiding Multimedia Signal Process, pp [4 ] Bao.C, and Zhu, C. (2006) Steganalysis of compressed speech, in Proc. IMACS Multiconf. Computational Eng. Syst. Applicat. (CESA), pp [5 ] Celik.M.U, Sharma, G. and Saber, E. (2005) Lossless generalized lsb data embedding, IEEE Trans. Image Process., vol. 14, no.2, pp [6 ] Chen.B, and Wornell, G.W. (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding'. IEEE Transactions on Information Theory, Vol47(4): pp [7 ] Kitawaki.N, Nagabuchi, H. and Itoh, K. (1988) Objective quality evaluation for low-bit-rate speech coding systems, IEEE J. Sel. Areas Commun.,vol. 6, no. 2, pp [8 ] Ma.L, Z. Wu, and Yang, W. (2007) Approach to hide secret speech information in G.721 scheme, Lecture Notes Comput. Sci., vol. 4681, pp [9 ] Petitcolas.F.A.P, and Kuhn,M.G. (1999) Information hiding-a survey Proceedings of the IEEE, Vol.87(7):pp [10 ] Phil Sallee, (2004) Model-Based Steganography, IWDW 2003, LNCS 2939, pp , [11 ] Quatieri.T.F. (2002) Discrete-Time speech signal processing: Principles and practice, Prentice Hall PTR. [12 ] Tian, H. Zhou, K, Feng, D and Liu, J. (2008) A covert communication model based on least significant bits steganography in voice over IP, in Proc. 9th Int. Conf. For Young Comput. Scientists, pp [13 ] Wang Chungyi, Wu Quincy.(2007) Information Hiding in Real- Time VoIP Streams. Ninth IEEE International Symposium on Multimedia, Proceedings, pp [14 ] Wu and W. Yang. (2006) G.711-based adaptive speech information hiding approach, Lecture Notes Comput. Sci., vol. 4113, pp [15 ] Xiao, B, Huang, Y. F. and Tang, S. (2008) An approach to information hiding in low bit rate speech stream, in Proc. IEEE GLOBECOM, pp , IEEE Press. 82

Index Terms Audio streams, inactive frames, steganography, Voice over Internet Protocol (VoIP), packet loss. I. Introduction

Index Terms Audio streams, inactive frames, steganography, Voice over Internet Protocol (VoIP), packet loss. I. Introduction Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Advanced Integrated Steganographic

More information

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29. Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet

More information

Digital Speech Coding

Digital Speech Coding Digital Speech Processing David Tipper Associate Professor Graduate Program of Telecommunications and Networking University of Pittsburgh Telcom 2720 Slides 7 http://www.sis.pitt.edu/~dtipper/tipper.html

More information

GiLBCSteg: VoIP Steganography Utilizing the Internet Low Bit-Rate Codec

GiLBCSteg: VoIP Steganography Utilizing the Internet Low Bit-Rate Codec Computer Science and Information Technology 1(2): 153-158, 2013 DOI: 10.13189/csit.2013.010212 http://www.hrpub.org GiLBCSteg: VoIP Steganography Utilizing the Internet Low Bit-Rate Codec Garrett Calpouzos

More information

A Comparison of Speech Coding Algorithms ADPCM vs CELP. Shannon Wichman

A Comparison of Speech Coding Algorithms ADPCM vs CELP. Shannon Wichman A Comparison of Speech Coding Algorithms ADPCM vs CELP Shannon Wichman Department of Electrical Engineering The University of Texas at Dallas Fall 1999 December 8, 1999 1 Abstract Factors serving as constraints

More information

VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.)

VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.) VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.) 1 Remember first the big picture VoIP network architecture and some terminologies Voice coders 2 Audio and voice quality measuring

More information

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3 Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is

More information

Analog-to-Digital Voice Encoding

Analog-to-Digital Voice Encoding Analog-to-Digital Voice Encoding Basic Voice Encoding: Converting Analog to Digital This topic describes the process of converting analog signals to digital signals. Digitizing Analog Signals 1. Sample

More information

Simple Voice over IP (VoIP) Implementation

Simple Voice over IP (VoIP) Implementation Simple Voice over IP (VoIP) Implementation ECE Department, University of Florida Abstract Voice over IP (VoIP) technology has many advantages over the traditional Public Switched Telephone Networks. In

More information

Introduction to Packet Voice Technologies and VoIP

Introduction to Packet Voice Technologies and VoIP Introduction to Packet Voice Technologies and VoIP Cisco Networking Academy Program Halmstad University Olga Torstensson 035-167575 olga.torstensson@ide.hh.se IP Telephony 1 Traditional Telephony 2 Basic

More information

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity

More information

Calculating Bandwidth Requirements

Calculating Bandwidth Requirements Calculating Bandwidth Requirements Codec Bandwidths This topic describes the bandwidth that each codec uses and illustrates its impact on total bandwidth. Bandwidth Implications of Codec 22 One of the

More information

Basic principles of Voice over IP

Basic principles of Voice over IP Basic principles of Voice over IP Dr. Peter Počta {pocta@fel.uniza.sk} Department of Telecommunications and Multimedia Faculty of Electrical Engineering University of Žilina, Slovakia Outline VoIP Transmission

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Overview Steganography is the process of hiding secret data inside other, normally transmitted data. In other words, as defined by [40] steganography means hiding of a secret

More information

Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics:

Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics: Voice Transmission --Basic Concepts-- Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics: Amplitude Frequency Phase Voice Digitization in the POTS Traditional

More information

PCM Encoding and Decoding:

PCM Encoding and Decoding: PCM Encoding and Decoding: Aim: Introduction to PCM encoding and decoding. Introduction: PCM Encoding: The input to the PCM ENCODER module is an analog message. This must be constrained to a defined bandwidth

More information

A TOOL FOR TEACHING LINEAR PREDICTIVE CODING

A TOOL FOR TEACHING LINEAR PREDICTIVE CODING A TOOL FOR TEACHING LINEAR PREDICTIVE CODING Branislav Gerazov 1, Venceslav Kafedziski 2, Goce Shutinoski 1 1) Department of Electronics, 2) Department of Telecommunications Faculty of Electrical Engineering

More information

MULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY

MULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY MULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY Yi J. Liang, Eckehard G. Steinbach, and Bernd Girod Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,

More information

Introduction and Comparison of Common Videoconferencing Audio Protocols I. Digital Audio Principles

Introduction and Comparison of Common Videoconferencing Audio Protocols I. Digital Audio Principles Introduction and Comparison of Common Videoconferencing Audio Protocols I. Digital Audio Principles Sound is an energy wave with frequency and amplitude. Frequency maps the axis of time, and amplitude

More information

MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music

MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music ISO/IEC MPEG USAC Unified Speech and Audio Coding MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music The standardization of MPEG USAC in ISO/IEC is now in its final

More information

Voice Over IP Per Call Bandwidth Consumption

Voice Over IP Per Call Bandwidth Consumption Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before

More information

Web-Conferencing System SAViiMeeting

Web-Conferencing System SAViiMeeting Web-Conferencing System SAViiMeeting Alexei Machovikov Department of Informatics and Computer Technologies National University of Mineral Resources Mining St-Petersburg, Russia amachovikov@gmail.com Abstract

More information

Indepth Voice over IP and SIP Networking Course

Indepth Voice over IP and SIP Networking Course Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.

More information

Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction

Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals Modified from the lecture slides of Lami Kaya (LKaya@ieee.org) for use CECS 474, Fall 2008. 2009 Pearson Education Inc., Upper

More information

Voice Activity Detection in the Tiger Platform. Hampus Thorell

Voice Activity Detection in the Tiger Platform. Hampus Thorell Voice Activity Detection in the Tiger Platform Examensarbete utfört i Reglerteknik av Hampus Thorell LiTH-ISY-EX--06/3817--SE Linköping 2006 Voice Activity Detection in the Tiger Platform Examensarbete

More information

JPEG Image Compression by Using DCT

JPEG Image Compression by Using DCT International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*

More information

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and

More information

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP Voice over IP Andreas Mettis University of Cyprus November 23, 2004 Overview What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP 1 VoIP VoIP (voice over IP - that is,

More information

An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP

An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Rui Miao Department of Electronic Engineering, Tsinghua University, Beijing, China rm870725@gmail.com Yongfeng

More information

Packet Loss Concealment Algorithm for VoIP Transmission in Unreliable Networks

Packet Loss Concealment Algorithm for VoIP Transmission in Unreliable Networks Packet Loss Concealment Algorithm for VoIP Transmission in Unreliable Networks Artur Janicki, Bartłomiej KsięŜak Institute of Telecommunications, Warsaw University of Technology E-mail: ajanicki@tele.pw.edu.pl,

More information

Advanced Speech-Audio Processing in Mobile Phones and Hearing Aids

Advanced Speech-Audio Processing in Mobile Phones and Hearing Aids Advanced Speech-Audio Processing in Mobile Phones and Hearing Aids Synergies and Distinctions Peter Vary RWTH Aachen University Institute of Communication Systems WASPAA, October 23, 2013 Mohonk Mountain

More information

SPEECH SIGNAL CODING FOR VOIP APPLICATIONS USING WAVELET PACKET TRANSFORM A

SPEECH SIGNAL CODING FOR VOIP APPLICATIONS USING WAVELET PACKET TRANSFORM A International Journal of Science, Engineering and Technology Research (IJSETR), Volume, Issue, January SPEECH SIGNAL CODING FOR VOIP APPLICATIONS USING WAVELET PACKET TRANSFORM A N.Rama Tej Nehru, B P.Sunitha

More information

How To Understand The Differences Between A Fax And A Fax On A G3 Network

How To Understand The Differences Between A Fax And A Fax On A G3 Network The Fax on IP Networks White Paper February 2011 2 The Fax on IP Networks Contents Overview... 3 Group 3 Fax Technology... 4 G.711 Fax Pass-Through... 5 T.38 IP Fax Relay... 6 Network Design Considerations...

More information

Reversible Data Hiding for Security Applications

Reversible Data Hiding for Security Applications Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.

More information

Digital Transmission of Analog Data: PCM and Delta Modulation

Digital Transmission of Analog Data: PCM and Delta Modulation Digital Transmission of Analog Data: PCM and Delta Modulation Required reading: Garcia 3.3.2 and 3.3.3 CSE 323, Fall 200 Instructor: N. Vlajic Digital Transmission of Analog Data 2 Digitization process

More information

Image Compression through DCT and Huffman Coding Technique

Image Compression through DCT and Huffman Coding Technique International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul

More information

Simulative Investigation of QoS parameters for VoIP over WiMAX networks

Simulative Investigation of QoS parameters for VoIP over WiMAX networks www.ijcsi.org 288 Simulative Investigation of QoS parameters for VoIP over WiMAX networks Priyanka 1, Jyoteesh Malhotra 2, Kuldeep Sharma 3 1,3 Department of Electronics, Ramgarhia Institue of Engineering

More information

Using transcoding for hidden communication in IP telephony

Using transcoding for hidden communication in IP telephony DOI 10.1007/s11042-012-1224-8 Using transcoding for hidden communication in IP telephony Wojciech Mazurczyk Paweł Szaga Krzysztof Szczypiorski # The Author(s) 2012. This article is published with open

More information

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits. Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic

More information

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of

More information

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,

More information

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen

More information

Linear Predictive Coding

Linear Predictive Coding Linear Predictive Coding Jeremy Bradbury December 5, 2000 0 Outline I. Proposal II. Introduction A. Speech Coding B. Voice Coders C. LPC Overview III. Historical Perspective of Linear Predictive Coding

More information

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)

More information

Image Authentication Scheme using Digital Signature and Digital Watermarking

Image Authentication Scheme using Digital Signature and Digital Watermarking www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for

More information

Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT)

Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) Page 1 Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) ECC RECOMMENDATION (06)01 Bandwidth measurements using FFT techniques

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

From Concept to Production in Secure Voice Communications

From Concept to Production in Secure Voice Communications From Concept to Production in Secure Voice Communications Earl E. Swartzlander, Jr. Electrical and Computer Engineering Department University of Texas at Austin Austin, TX 78712 Abstract In the 1970s secure

More information

Chapter 3 ATM and Multimedia Traffic

Chapter 3 ATM and Multimedia Traffic In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

More information

1 There are also private networks including leased-lines, analog PBXs

1 There are also private networks including leased-lines, analog PBXs Application Notes Title Series Overview Data and Fax modem performance on VoIP services VoIP Performance Management Date November 2005 This application note describes the typical performance issues that

More information

Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation

Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor

More information

A comprehensive survey on various ETC techniques for secure Data transmission

A comprehensive survey on various ETC techniques for secure Data transmission A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and

More information

IP-Telephony Quality of Service (QoS)

IP-Telephony Quality of Service (QoS) IP-Telephony Quality of Service (QoS) Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline End-to-end OoS of VoIP services Quality of speech codecs Network-QoS IntServ RSVP DiffServ

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

Challenges and Solutions in VoIP

Challenges and Solutions in VoIP Challenges and Solutions in VoIP Challenges in VoIP The traditional telephony network strives to provide 99.99 percent uptime to the user. This corresponds to 5.25 minutes per year of down time. Many data

More information

Voice over IP Protocols And Compression Algorithms

Voice over IP Protocols And Compression Algorithms University of Tehran Electrical and Computer Engineering School SI Lab. Weekly Presentations Voice over IP Protocols And Compression Algorithms Presented by: Neda Kazemian Amiri Agenda Introduction to

More information

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010 Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication

More information

Subjective SNR measure for quality assessment of. speech coders \A cross language study

Subjective SNR measure for quality assessment of. speech coders \A cross language study Subjective SNR measure for quality assessment of speech coders \A cross language study Mamoru Nakatsui and Hideki Noda Communications Research Laboratory, Ministry of Posts and Telecommunications, 4-2-1,

More information

How To Understand The Quality Of A Wireless Voice Communication

How To Understand The Quality Of A Wireless Voice Communication Effects of the Wireless Channel in VOIP (Voice Over Internet Protocol) Networks Atul Ranjan Srivastava 1, Vivek Kushwaha 2 Department of Electronics and Communication, University of Allahabad, Allahabad

More information

BLIND SOURCE SEPARATION OF SPEECH AND BACKGROUND MUSIC FOR IMPROVED SPEECH RECOGNITION

BLIND SOURCE SEPARATION OF SPEECH AND BACKGROUND MUSIC FOR IMPROVED SPEECH RECOGNITION BLIND SOURCE SEPARATION OF SPEECH AND BACKGROUND MUSIC FOR IMPROVED SPEECH RECOGNITION P. Vanroose Katholieke Universiteit Leuven, div. ESAT/PSI Kasteelpark Arenberg 10, B 3001 Heverlee, Belgium Peter.Vanroose@esat.kuleuven.ac.be

More information

Monitoring VoIP Call Quality Using Improved Simplified E-model

Monitoring VoIP Call Quality Using Improved Simplified E-model Monitoring VoIP Call Quality Using Improved Simplified E-model Haytham Assem, David Malone Hamilton Institute, National University of Ireland, Maynooth Hitham.Salama.2012, David.Malone@nuim.ie Jonathan

More information

WATERMARKING FOR IMAGE AUTHENTICATION

WATERMARKING FOR IMAGE AUTHENTICATION WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data

More information

Complexity-bounded Power Control in Video Transmission over a CDMA Wireless Network

Complexity-bounded Power Control in Video Transmission over a CDMA Wireless Network Complexity-bounded Power Control in Video Transmission over a CDMA Wireless Network Xiaoan Lu, David Goodman, Yao Wang, and Elza Erkip Electrical and Computer Engineering, Polytechnic University, Brooklyn,

More information

The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT

The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT The Effect of Network Cabling on Bit Error Rate Performance By Paul Kish NORDX/CDT Table of Contents Introduction... 2 Probability of Causing Errors... 3 Noise Sources Contributing to Errors... 4 Bit Error

More information

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

Emotion Detection from Speech

Emotion Detection from Speech Emotion Detection from Speech 1. Introduction Although emotion detection from speech is a relatively new field of research, it has many potential applications. In human-computer or human-human interaction

More information

Thirukkural - A Text-to-Speech Synthesis System

Thirukkural - A Text-to-Speech Synthesis System Thirukkural - A Text-to-Speech Synthesis System G. L. Jayavardhana Rama, A. G. Ramakrishnan, M Vijay Venkatesh, R. Murali Shankar Department of Electrical Engg, Indian Institute of Science, Bangalore 560012,

More information

Audio Engineering Society. Convention Paper. Presented at the 129th Convention 2010 November 4 7 San Francisco, CA, USA

Audio Engineering Society. Convention Paper. Presented at the 129th Convention 2010 November 4 7 San Francisco, CA, USA Audio Engineering Society Convention Paper Presented at the 129th Convention 2010 November 4 7 San Francisco, CA, USA The papers at this Convention have been selected on the basis of a submitted abstract

More information

Overview of the research results on Voice over IP

Overview of the research results on Voice over IP Overview of the research results on Voice over IP F. Beritelli (Università di Catania) C. Casetti (Politecnico di Torino) S. Giordano (Università di Pisa) R. Lo Cigno (Politecnico di Torino) 1. Introduction

More information

Performance Analysis of Interleaving Scheme in Wideband VoIP System under Different Strategic Conditions

Performance Analysis of Interleaving Scheme in Wideband VoIP System under Different Strategic Conditions Performance Analysis of Scheme in Wideband VoIP System under Different Strategic Conditions Harjit Pal Singh 1, Sarabjeet Singh 1 and Jasvir Singh 2 1 Dept. of Physics, Dr. B.R. Ambedkar National Institute

More information

Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis

Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis Published in IET Communications Received on 3rd May 2010 Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis Y.F. Huang 1 S. Tang 2 Y. Zhang 1 1 Department

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of

More information

STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION

STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION Adiel Ben-Shalom, Michael Werman School of Computer Science Hebrew University Jerusalem, Israel. {chopin,werman}@cs.huji.ac.il

More information

Combating Anti-forensics of Jpeg Compression

Combating Anti-forensics of Jpeg Compression IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng

More information

Voice Encryption over GSM:

Voice Encryption over GSM: End-to to-end Voice Encryption over GSM: A Different Approach Wesley Tanner Nick Lane-Smith www. Keith Lareau About Us: Wesley Tanner - Systems Engineer for a Software-Defined Radio (SDRF) company - B.S.

More information

MUSICAL INSTRUMENT FAMILY CLASSIFICATION

MUSICAL INSTRUMENT FAMILY CLASSIFICATION MUSICAL INSTRUMENT FAMILY CLASSIFICATION Ricardo A. Garcia Media Lab, Massachusetts Institute of Technology 0 Ames Street Room E5-40, Cambridge, MA 039 USA PH: 67-53-0 FAX: 67-58-664 e-mail: rago @ media.

More information

Voice over IP. Abdus Salam ICTP, February 2004 School on Digital Radio Communications for Research and Training in Developing Countries

Voice over IP. Abdus Salam ICTP, February 2004 School on Digital Radio Communications for Research and Training in Developing Countries Voice over IP Abdus Salam ICTP, February 2004 School on Digital Radio Communications for Research and Training in Developing Countries Ermanno Pietrosemoli Latin American Networking School (Fundación EsLaRed)

More information

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder Performance Analysis and Comparison of 15.1 and H.264 Encoder and Decoder K.V.Suchethan Swaroop and K.R.Rao, IEEE Fellow Department of Electrical Engineering, University of Texas at Arlington Arlington,

More information

Delivering reliable VoIP Services

Delivering reliable VoIP Services QoS Tips and Tricks for VoIP Services: Delivering reliable VoIP Services Alan Clark CEO, Telchemy alan.d.clark@telchemy.com 1 Objectives Clear understanding of: typical problems affecting VoIP service

More information

International ejournals

International ejournals ISSN 0976 1411 Available online at www.internationalejournals.com International ejournals International ejournal of Mathematics and Engineering 227 (2013) 2216-2222 EFFICIENT METHOD OF AUDIO STEGANOGRAPHY

More information

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah

More information

Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically.

Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically. Sampling Theorem We will show that a band limited signal can be reconstructed exactly from its discrete time samples. Recall: That a time sampled signal is like taking a snap shot or picture of signal

More information

Lecture 2 Outline. EE 179, Lecture 2, Handout #3. Information representation. Communication system block diagrams. Analog versus digital systems

Lecture 2 Outline. EE 179, Lecture 2, Handout #3. Information representation. Communication system block diagrams. Analog versus digital systems Lecture 2 Outline EE 179, Lecture 2, Handout #3 Information representation Communication system block diagrams Analog versus digital systems Performance metrics Data rate limits Next lecture: signals and

More information

Timing Errors and Jitter

Timing Errors and Jitter Timing Errors and Jitter Background Mike Story In a sampled (digital) system, samples have to be accurate in level and time. The digital system uses the two bits of information the signal was this big

More information

Robust Blind Watermarking Mechanism For Point Sampled Geometry

Robust Blind Watermarking Mechanism For Point Sampled Geometry Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,

More information

(Refer Slide Time: 2:10)

(Refer Slide Time: 2:10) Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture-12 Multiplexer Applications-1 Hello and welcome to today s lecture on multiplexer

More information

L9: Cepstral analysis

L9: Cepstral analysis L9: Cepstral analysis The cepstrum Homomorphic filtering The cepstrum and voicing/pitch detection Linear prediction cepstral coefficients Mel frequency cepstral coefficients This lecture is based on [Taylor,

More information

Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu

Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu Video Coding Basics Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu Outline Motivation for video coding Basic ideas in video coding Block diagram of a typical video codec Different

More information

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

IAB CONCERNS ABOUT CONGESTION CONTROL. Iffat Hasnian 1832659

IAB CONCERNS ABOUT CONGESTION CONTROL. Iffat Hasnian 1832659 IAB CONCERNS ABOUT CONGESTION CONTROL Iffat Hasnian 1832659 IAB CONCERNS Outline 1- Introduction 2- Persistent High Drop rate Problem 3- Current Efforts in the IETF 3.1 RTP 3.2 TFRC 3.3 DCCP 3.4 Audio

More information

Adaptive Equalization of binary encoded signals Using LMS Algorithm

Adaptive Equalization of binary encoded signals Using LMS Algorithm SSRG International Journal of Electronics and Communication Engineering (SSRG-IJECE) volume issue7 Sep Adaptive Equalization of binary encoded signals Using LMS Algorithm Dr.K.Nagi Reddy Professor of ECE,NBKR

More information

Data Masking: A New Approach for Steganography?

Data Masking: A New Approach for Steganography? Journal of VLSI Signal Processing 41, 293 303, 2005 c 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. DOI: 10.1007/s11265-005-4153-1 Data Masking: A New Approach for Steganography?

More information

Secret Communication through Web Pages Using Special Space Codes in HTML Files

Secret Communication through Web Pages Using Special Space Codes in HTML Files International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a

More information

Figure1. Acoustic feedback in packet based video conferencing system

Figure1. Acoustic feedback in packet based video conferencing system Real-Time Howling Detection for Hands-Free Video Conferencing System Mi Suk Lee and Do Young Kim Future Internet Research Department ETRI, Daejeon, Korea {lms, dyk}@etri.re.kr Abstract: This paper presents

More information

The Problem with Faxing over VoIP Channels

The Problem with Faxing over VoIP Channels The Problem with Faxing over VoIP Channels Lower your phone bill! is one of many slogans used today by popular Voice over IP (VoIP) providers. Indeed, you may certainly save money by leveraging an existing

More information

HD Radio FM Transmission System Specifications Rev. F August 24, 2011

HD Radio FM Transmission System Specifications Rev. F August 24, 2011 HD Radio FM Transmission System Specifications Rev. F August 24, 2011 SY_SSS_1026s TRADEMARKS HD Radio and the HD, HD Radio, and Arc logos are proprietary trademarks of ibiquity Digital Corporation. ibiquity,

More information

VoIP Bandwidth Considerations - design decisions

VoIP Bandwidth Considerations - design decisions VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or

More information