Enhancement of Speech Quality in Telephony Communications by Steganography

Author(s):  
Naofumi Aoki

Steganography can transmit supplementary data without changing conventional data formats. The concept of high value-added communications is drawn from this advantage of steganography. As a specific application of the concept, this chapter describes two topics about the enhancement of the speech quality in telephony communications by steganography. A packet loss concealment technique and a band extension technique are explained. These techniques employ steganography for transmitting side information for improving the performance of signal processing. In addition, this chapter describes an efficient steganography technique devised for G.711, the most common codec for telephony speech standardized by ITU-T. The proposed technique, named selective LSB replacement technique, outperforms the conventional one in order to decrease the degradation caused by embedding side information into speech data by steganography.

Author(s):  
Tomasz Zok

Abstract Motivation Biomolecular structures come in multiple representations and diverse data formats. Their incompatibility with the requirements of data analysis programs significantly hinders the analytics and the creation of new structure-oriented bioinformatic tools. Therefore, the need for robust libraries of data processing functions is still growing. Results BioCommons is an open-source, Java library for structural bioinformatics. It contains many functions working with the 2D and 3D structures of biomolecules, with a particular emphasis on RNA. Availability and implementation The library is available in Maven Central Repository and its source code is hosted on GitHub: https://github.com/tzok/BioCommons Supplementary information Supplementary data are available at Bioinformatics online.


Author(s):  
Dan Yu ◽  
Farook Sattar

This chapter focuses on the issue of transaction tracking in multimedia distribution applications through digital watermarking terminology. The existing watermarking schemes are summarized and their assumptions as well as the limitations for tracking are analyzed. In particular, an Independent Component Analysis (ICA)-based watermarking scheme is proposed, which can overcome the problems of the existing watermarking schemes. Multiple watermarking technique is exploited—one watermark to identify the rightful owner of the work and the other one to identify the legal user of a copy of the work. In the absence of original data, watermark, embedding locations and strengths, the ICA-based watermarking scheme is introduced for efficient watermark extraction with some side information. The robustness of the proposed scheme against some common signal-processing attacks as well as the related future work are also presented. Finally, some challenging issues in multimedia transaction tracking through digital watermarking are discussed.


Author(s):  
Akinori Ito ◽  
Yôiti Suzuki

G.711 is the most popular speech codec for Voice over IP (VoIP). This chapter proposes a method for embedding data into G.711-coded speech for conveying side information for enhancing speech quality such as bandwidth extension or packet loss concealment. The proposed method refers to a low-bit rate encoder to determine how many bits are embedded into each sample. First, a variable-bit rate data hiding method is proposed as a basic framework of the proposed method. Then, the proposed method is extended to achieve fixed bit rate data hiding. According to comparison experiments, the proposed method is proved to achieve higher speech quality compared with the conventional method. Moreover, the authors developed a low-complexity speech bandwidth extension method that uses the proposed data hiding method.


Author(s):  
Subhrajit Sinha Roy ◽  
Abhishek Basu ◽  
Avik Chattopadhyay

In this chapter, hardware implementation of an LSB replacement-based digital image watermarking algorithm is introduced. The proposed scheme is developed in spatial domain. In this watermarking process, data or watermark is implanted into the cover image pixels through an adaptive last significant bit (LSB) replacement technique. The real-time execution of the watermarking logic is developed here using reversible logic. Utilization of reversible logic reduces the power dissipation by means of no information loss. The lesser power dissipation enables a faster operation as well as holds up Moore's law. The experimental results confirm that the proposed scheme offers high imperceptibility with a justified robustness.


2013 ◽  
Vol 284-287 ◽  
pp. 2867-2871 ◽  
Author(s):  
Jui Feng Yeh ◽  
Min Da Kuo ◽  
Zhong Hua Hsu

Packet loss is one of the most essential problems in speech communication. It will cause the information loss and uncomfortable for listeners in voice over IP. This investment proposed an approach based on waveform similarity measure using overlap-and-Add algorithm. The waveform similarity overlap-and-add (WSOLA) technique is an effective algorithm to deal with packet loss concealment (PLC). For real-time time communication, the WSOLA algorithm is widely used to deal with the length adaptation and packet loss concealment of speech signal. Time scale modification of audio signal is one of the most essential research topics in data communication, especially in voice of IP (VoIP). Herein, we proposed the dual-side WSOLA that is derived by standard WSOLA. Instead of only exploitation one direction speech data, the proposed method will reconstruct the lost voice data according to the preceding and cascading voice. The dual-side WSOLA can use both the past and future speech signal waveform to reconstruction voice waveform of lost packet. The evaluations show that the quality of the reconstructed speech signal of the dual-side WSOLA is higher than that of the standard WSOLA and GWSOLA on different packet loss rate and length using the metrics: PESQ and MOS. The significant improvement is obtained by dual side information in the proposed method. The proposed dual-side waveform similarity overlap-and-add (DSWSOLA) outperforms the traditional approaches.


Sign in / Sign up

Export Citation Format

Share Document