Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Seve constraints affect this process: the quantity of data to be hidden, the need for invariance of the data under cond
An approach of speech inform ation hiding based on G.729 scheme,and ABS(Analysis—by—synthesis) algorithm of speech inform ation hiding and extracting, which form ing the theoretical basis for designing a secure speech com m unication system are prop
Abstract—In this paper, a new idea for speech information hiding using fractional cosine transform (FRCT) is proposed. We find in our analysis that the 3rd parameter of FRCT presents property of high frequency, then we put forward two methods for em
Abstract-Traditional speech information hiding methods have several disadvantages, for example, constant embedding amplitude, lower speech quality, higher bit error rate. A novel speech information hiding method based on Itakura-Saito measure and ps
In this paper a information hiding algorithm applied to compressed speech bitstream is proposed. Covering codes are used to hide information in the least important bits in G.729 frames. The embedding rate is fairly high compared with the state of ar
Absimcf-User identification must be done in speech information hiding. To shorten the time of building link and exchanging protocol, this paper presents a technology for fast cross-identification. To enhance the security of communication, encryption
Abstract—The discrete cosine transform (DCT) has performance close to Karhunen-Loeve Transform (K-L Transform). In this paper, DCT is used for speech information hiding. Secret information is embedded by changing the parameters in DCT domain and ext
Attacks to biometric data are the primary danger to the self-security of biometrics. To improve the iris feature template data security, a data hiding approach based on bit streams is proposed, in which an iris feature template is embedded into a fac