Paper
14 November 2007 Audio data hiding using perceptual masking effect of HAS
Hanqiang Cao, Xinyu Zhang, Chao Cao, Fang Wei
Author Affiliations +
Proceedings Volume 6790, MIPPR 2007: Remote Sensing and GIS Data Processing and Applications; and Innovative Multispectral Technology and Applications; 679047 (2007) https://doi.org/10.1117/12.748553
Event: International Symposium on Multispectral Image Processing and Pattern Recognition, 2007, Wuhan, China
Abstract
Audio data hiding is an important branch of information hiding technology. In this paper, a novel digital audio data hiding scheme, which hides secret message into audio signals, including telephone speech, wideband speech, and wideband audio, is proposed. The advantage of this scheme is its fully utility of the perceptual masking effect of Human Audio System (HAS). Before the secret message embedded into the host signal, it is modulated according to the perceptual masking characteristic of the host signal. Therefore, it is not easily to detect the hiding message in it. This scheme also uses the cryptographic techniques before hiding message into host audio signal to ensure security. Moreover, the extraction of the desired message does not need the host audio signal because of the use of the pseudorandom sequence. Experimental results show that the embedded audio signal is not easily detected and the bit error of the blind extracted message is small.
© (2007) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Hanqiang Cao, Xinyu Zhang, Chao Cao, and Fang Wei "Audio data hiding using perceptual masking effect of HAS", Proc. SPIE 6790, MIPPR 2007: Remote Sensing and GIS Data Processing and Applications; and Innovative Multispectral Technology and Applications, 679047 (14 November 2007); https://doi.org/10.1117/12.748553
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data hiding

Digital watermarking

Modulation

Signal processing

Computer security

Algorithm development

Fourier transforms

Back to Top