scholarly journals Hybrid Speech Steganography System using SS-RDWT with IPDP-MLE approach

Author(s):  
Chinnarao Rayudu ◽  
Jayasree P.V.Y. ◽  
Srinivasa Rao S.

Abstract In the last two decades, it has been observed that there have been remarkable advancements in digital media communication. It has lots of advantages and business potential as it needs no physical media or transport. However, digital media can also create several big problems for media owners due to unauthorized use, ease of replication, plasticity, and equivalence of works in digital form. The possible solution is to secure digital media by cover writing which can also referred as steganography. Therefore, this article focusing on development of hybrid speech steganography system using spread spectrum-based redundant discrete wavelet transform (SS- RDWT). In general, speech steganography utilizes cover speech to embed the secrete message, however, the cover speech might be larger in size and contains many pauses, which requires more storage capacity, higher computational time, and even higher power usage results in system performance degradation. Hence, in addition to the proposed SS-RDWT approach, an intelligent pause detection protocol (IPDP) with maximum likelihood estimation (MLE) technique is employed for removing pause from cover speech signal, which reduces the transmission bandwidth, storage capacity and power consumption as well. Simulation results demonstrate that proposed hybrid steganography using integrated SS-RDWT with IPDP-MLE approach obtained superior performance as compared to state-of-art approaches.

The watermarking scheme in digital media communication has become an essential tool in helping content creators prove ownership if any dispute arises in copyright infringement. In this paper, Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) is performed in the watermarking process which improves the authentication of the image and the detection of the tampered region. The semi-fragile watermarking scheme provides robustness to the watermark during extraction process even after the unintentional compression attacks like JPEG compression. The watermark payload is significantly lowered in order to increase the quality of the image. The recovery is done using the absolute moment block truncation coding (AMBTC) of the image in the untampered region. Thus, both the mean and first absolute moment are used in recovering the tampered regions in the watermarked image.


Author(s):  
Tu Huynh-Kha ◽  
Thuong Le-Tien ◽  
Synh Ha ◽  
Khoa Huynh-Van

This research work develops a new method to detect the forgery in image by combining the Wavelet transform and modified Zernike Moments (MZMs) in which the features are defined from more pixels than in traditional Zernike Moments. The tested image is firstly converted to grayscale and applied one level Discrete Wavelet Transform (DWT) to reduce the size of image by a half in both sides. The approximation sub-band (LL), which is used for processing, is then divided into overlapping blocks and modified Zernike moments are calculated in each block as feature vectors. More pixels are considered, more sufficient features are extracted. Lexicographical sorting and correlation coefficients computation on feature vectors are next steps to find the similar blocks. The purpose of applying DWT to reduce the dimension of the image before using Zernike moments with updated coefficients is to improve the computational time and increase exactness in detection. Copied or duplicated parts will be detected as traces of copy-move forgery manipulation based on a threshold of correlation coefficients and confirmed exactly from the constraint of Euclidean distance. Comparisons results between proposed method and related ones prove the feasibility and efficiency of the proposed algorithm.


Entropy ◽  
2020 ◽  
Vol 23 (1) ◽  
pp. 62
Author(s):  
Zhengwei Liu ◽  
Fukang Zhu

The thinning operators play an important role in the analysis of integer-valued autoregressive models, and the most widely used is the binomial thinning. Inspired by the theory about extended Pascal triangles, a new thinning operator named extended binomial is introduced, which is a general case of the binomial thinning. Compared to the binomial thinning operator, the extended binomial thinning operator has two parameters and is more flexible in modeling. Based on the proposed operator, a new integer-valued autoregressive model is introduced, which can accurately and flexibly capture the dispersed features of counting time series. Two-step conditional least squares (CLS) estimation is investigated for the innovation-free case and the conditional maximum likelihood estimation is also discussed. We have also obtained the asymptotic property of the two-step CLS estimator. Finally, three overdispersed or underdispersed real data sets are considered to illustrate a superior performance of the proposed model.


2021 ◽  
Vol 4 (3) ◽  
pp. 50
Author(s):  
Preeti Warrier ◽  
Pritesh Shah

The control of power converters is difficult due to their non-linear nature and, hence, the quest for smart and efficient controllers is continuous and ongoing. Fractional-order controllers have demonstrated superior performance in power electronic systems in recent years. However, it is a challenge to attain optimal parameters of the fractional-order controller for such types of systems. This article describes the optimal design of a fractional order PID (FOPID) controller for a buck converter using the cohort intelligence (CI) optimization approach. The CI is an artificial intelligence-based socio-inspired meta-heuristic algorithm, which has been inspired by the behavior of a group of candidates called a cohort. The FOPID controller parameters are designed for the minimization of various performance indices, with more emphasis on the integral squared error (ISE) performance index. The FOPID controller shows faster transient and dynamic response characteristics in comparison to the conventional PID controller. Comparison of the proposed method with different optimization techniques like the GA, PSO, ABC, and SA shows good results in lesser computational time. Hence the CI method can be effectively used for the optimal tuning of FOPID controllers, as it gives comparable results to other optimization algorithms at a much faster rate. Such controllers can be optimized for multiple objectives and used in the control of various power converters giving rise to more efficient systems catering to the Industry 4.0 standards.


Author(s):  
Dakhaz Mustafa Abdullah ◽  
Siddeeq Y. Ameen ◽  
Naaman Omar ◽  
Azar Abid Salih ◽  
Dindar Mikaeel Ahmed ◽  
...  

Whether it's for work or personal well-being, keeping secrets or private information has become part of our everyday existence. Therefore, several researchers acquire an entire focus on secure transmitting secret information. Confidential information is collectively referred to as Steganography for inconspicuous digital media such as video, audio, and images. In disguising information, Steganography plays a significant role. Traditional Steganography faces a further concern of discovery as steganalysis develops. The safety of present steganographic technologies thus has to be improved. In this research, some of the techniques that have been used to hide information inside images have been reviewed. According to the hiding domain, these techniques can be divided into two main parts: The spatial Domain and Transform Domain. In this paper, three methods for each Domain have been chosen to be studied and evaluated. These are; Least Significant Bit (LSB), Pixel Value Difference (PVD), Exploiting Modification Direction (EMD), contourlet transform, Discrete Wavelet Transformation (DWT), and, Discrete Cosine Transformation (DCT). Finally, the best results that have been obtained in terms of higher PSNR, Capacity, and more robustness and security are discussed.


Author(s):  
Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra

This paper presents a new watermarking technique using hybrid image transforms that aims to be very robust against attacks. It also aims to reduce the amount of distortion created from embedding the watermark as much as possible, and have good capacity. The proposed system uses a hybrid watermarking technique that is based on Non-Subsampled Contourlet Transform and Discrete Wavelet Transform. In addition, the proposed system makes use of the fuzzy logic to automatically choose the strength of the embedded watermark. Furthermore, the system uses Spread Spectrum Code Division Multiple Access to embed and recover the watermark after transforming the image. To enhance recoverability of the watermarks, the system uses a high level of redundancy in the embedding process, which allows a powerful Error Correcting Code to be used in the recovery process. The fuzzy logic is used to help the system in producing watermarked images that reserve their quality and not be heavily altered after embedding the watermark. Experiments were performed to measure the quality of the proposed system using JPEG compression attacks. The results showed that the proposed system is robust and has good capacity and imperceptibly although it suffers from being computationally complex.


Author(s):  
Christian Fuchs

“Heidegger is the petty bourgeois of German philosophy, the man who has placed on German philosophy his kitschy night-cap […] When I see that even super-intelligent people have been taken in by Heidegger, […] I feel sickened to this day. […] Heidegger used to hold court at Todtnauberg and at all times would allow himself to be admired on his philosophical Black Forest plinth like a sacred cow. […] They made their pilgramages, as it were, into the philosophical Black Forest, to the sacred Martin Heidegger and knelt down before their idol”--- Thomas BernhardAbstract:In spring 2014, three volumes of the Schwarze Hefte (Black Notebooks), Heidegger’s philosophical notebooks, were published in the German edition of his collected works. They contain notes taken in the years 1931-1941 and have resulted in public debates about the role of anti-Semitism in Heidegger’s thought.This article asks: What are and should be the implications of the publication of the Black Notebooks for the reception of Heidegger in the study, theory, and philosophy of media, communication, and technology? It discusses Theodor W. Adorno’s and Moishe Postone’s contributions to the critical theory of anti-Semitism and applies these approaches for an analysis of Heidegger’s Black Notebooks.The analysis shows that the logic of modern technology plays an important role in the Black Notebooks. The paper therefore also re-visits some of Heidegger’s writings on technology in light of the Black Notebooks. There is a logical link between the Black Notebooks' anti-Semitism and the analysis of technology in Being and Time and The Question Concerning Technology. The first publication provides the missing link and grounding for the second and the third.Heidegger’s works have had significant influence on studies of the media, communication, and the Internet. Given the anti-Semitism in the Black Notebooks, it is time that Heideggerians abandon Heidegger, and instead focus on  alternative traditions of thought. It is now also the moment where scholars should consider stopping to eulogise and reference Heidegger when theorising and analysing the media, communication, culture, technology, digital media, and the Internet.Image source: By Willy Pragher (Landesarchiv Baden-Württemberg) [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0)], via Wikimedia Commons


2021 ◽  
Vol 9 (2) ◽  
pp. 10-15
Author(s):  
Harendra Singh ◽  
Roop Singh Solanki

In this research paper, a new modified approach is proposed for brain tumor classification as well as feature extraction from Magnetic Resonance Imaging (MRI) after pre-processing of the images. The discrete wavelet transformation (DWT) technique is used for feature extraction from MRI images and Artificial Neural Network (ANN) is used for the classification of the type of tumor according to extracted features. Mean, Standard deviation, Variance, Entropy, Skewness, Homogeneity, Contrast, Correlation are the main features used to classify the type of tumor. The proposed model can give a better result in comparison with other available techniques in less computational time as well as a high degree of accuracy. The training and testing accuracies of the proposed model are 100% and 98.20% with a 98.70 % degree of precision respectively.


Author(s):  
Katyayani Kashayp ◽  
Kandarpa Kumar Sarma ◽  
Manash Pratim Sarma

Spread spectrum modulation (SSM) finds important place in wireless communication primarily due to its application in Code Division Multiple Access (CDMA) and its effectiveness in channels fill with noise like signals. One of the critical issues in such modulation is the generation of spreading sequence. This chapter presents a design of chaotic spreading sequence for application in a Direct Sequence Spread Spectrum (DS SS) system configured for a faded wireless channel. Enhancing the security of data transmission is a prime issue which can better be addressed with a chaotic sequence. Generation and application of chaotic sequence is done and a comparison with Gold sequence is presented which clearly indicates achieving better performance with simplicity of design. Again a multiplierless logistic map sequence is generated for lower power requirements than the existing one. The primary blocks of the system are implemented using Verilog and the performances noted. Experimental results show that the proposed system is an efficient sequence generator suitable for wideband systems demonstrating lower BER levels, computational time and power requirements compared to traditional LFSR based approaches.


2013 ◽  
pp. 376-399
Author(s):  
Ali Al-Haj ◽  
Ahmad Mohammad ◽  
Samir Abou El-Seoud ◽  
Tuqa Manasrah ◽  
Lama Rajab ◽  
...  

The tremendous advancement of digital technology has increased the ease with which digital multimedia signals (image, video, audio) are stored, transmitted, and reproduced. Consequently, the content providers and owners are faced with problems of protection against copyright violation and other forms of abuse to their digital property. Digital watermarking has been proposed in the last decade as a solution to prevent illegal and malicious copying and distribution of digital media by embedding an unnoticeable information into the media content. This chapter describes three imperceptible and robust watermarking algorithms for different types of multimedia objects (image, video, audio). The three algorithms are based on cascading two powerful mathematical transforms; the Discrete Wavelet Transform (DWT), and the Singular Value Decomposition (SVD). The two transforms are different, and thus provide complementary levels of robustness against the same attack. In the proposed dual-transform algorithms, the watermark bits are not embedded directly on the wavelet coefficients, but rather on the elements of singular values of the DWT sub-bands of the multimedia object. Effectiveness of the proposed algorithms is demonstrated through extensive experimentation.


Sign in / Sign up

Export Citation Format

Share Document