Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

Slides:



Advertisements
Similar presentations
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Advertisements

Analogue to Digital Conversion (PCM and DM)
1 Computer Communication & Networks Lecture 6 Physical Layer: Digital Transmission Waleed Ejaz
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
CELLULAR COMMUNICATIONS 5. Speech Coding. Low Bit-rate Voice Coding  Voice is an analogue signal  Needed to be transformed in a digital form (bits)
EE2F1 Speech & Audio Technology Sept. 26, 2002 SLIDE 1 THE UNIVERSITY OF BIRMINGHAM ELECTRONIC, ELECTRICAL & COMPUTER ENGINEERING Digital Systems & Vision.
Digital Voice Communication Link EE 413 – TEAM 2 April 21 st, 2005.
Chapter 2 Fundamentals of Data and Signals
Department of Computer Engineering University of California at Santa Cruz Data Compression (2) Hai Tao.
1 Chapter 2 Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User’s Approach.
Chapter 4 Digital Transmission
Chapter Seven: Digital Communication
COSC 3213 – Computer Networks I Summer 2003 Topics: 1. Line Coding (Digital Data, Digital Signals) 2. Digital Modulation (Digital Data, Analog Signals)
Digital multiplexers In TDM a group of analog signals are sampled sequentially in time at a common sampling rate and then multiplexed for transmission.
LECTURE Copyright  1998, Texas Instruments Incorporated All Rights Reserved Encoding of Waveforms Encoding of Waveforms to Compress Information.
AUDIO COMPRESSION msccomputerscience.com. The process of digitizing audio signals is called PCM PCM involves sampling audio signal at minimum rate which.
Speech Coding Submitted To: Dr. Mohab Mangoud Submitted By: Nidal Ismail.
Computer Communication & Networks Lecture # 05 Physical Layer: Signals & Digital Transmission Nadeem Majeed Choudhary
MPEG Audio coders. Motion Pictures Expert Group(MPEG) The coders associated with audio compression part of MPEG standard are called MPEG audio compressor.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Chapter 4 Digital Transmission.
Kashif BashirWWW.Taleem.greatnow.com Chapter 4 Digital Transmission.
Spread Spectrum Spread-spectrum techniques are methods by which energy generated in a particular bandwidth is deliberately spread in the frequency domain,
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
1 Chapter 2 Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User’s Approach.
Pulse Code Modulation PCM is a method of converting an analog signal into a digital signal. (A/D conversion) The amplitude of Analog signal can take any.
Engineering and Physics University of Central Oklahoma Dr. Mohamed Bingabr Chapter 1 Introduction ENGR 4323/5323 Digital and Analog Communication.
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 3 – Digital Audio Representation Klara Nahrstedt Spring 2009.
4.1 Chapter 4 Digital Transmission Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 4 Digital Transmission
Subband Coding Jennie Abraham 07/23/2009. Overview Previously, different compression schemes were looked into – (i)Vector Quantization Scheme (ii)Differential.
Encoding How is information represented?. Way of looking at techniques Data Medium Digital Analog Digital Analog NRZ Manchester Differential Manchester.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Excerpts from Slides of Chapter 4 Forouzan Digital Transmission.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 4 Digital Transmission.
Fundamentals of Multimedia Chapter 6 Basics of Digital Audio Ze-Nian Li and Mark S. Drew 건국대학교 인터넷미디어공학부 임 창 훈.
Introduction to Communication Lecture (11) 1. Digital Transmission A computer network is designed to send information from one point to another. This.
Outline  Introduction (Resource Management and Utilization).  Compression and Multiplexing (Other related definitions).  The Most Important Access Utilization.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Physical Layer Summary Data-to-Signal Digital-to-Analog (Modem) Analog-to-Analog (Modem) Digital-to-Digital.
Lifecycle from Sound to Digital to Sound. Characteristics of Sound Amplitude Wavelength (w) Frequency ( ) Timbre Hearing: [20Hz – 20KHz] Speech: [200Hz.
Chapter 4. Digital Transmission
Chapter 4: Second generation Systems-Digital Modulation
Dr. Clincy Professor of CS
Figure 3–1 PAM signal with natural sampling.
Applications of Multirate Signal Processing
Topics discussed in this section:
Chapter 4 Digital Transmission
PCM (Pulse Code Modulation)
UNIT II.
4.1 Chapter 4 Digital Transmission Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Dr. Clincy Professor of CS
Reversible Data Hiding in JPEG Images using Ordered Embedding
CS 4594 Data Communications
Source : Signal Processing, Volume 133, April 2017, Pages
Basic Concepts of Audio Watermarking
MODULATION AND DEMODULATION
Lecture 3: Delta Modulation (DM) 1nd semester
Digital Control Systems Waseem Gulsher
High-capacity image hiding scheme based on vector quantization
A Data Hiding Scheme Based Upon Block Truncation Coding
Digital Communication Chapter 1: Introduction
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Lecture 10: Quantizing & PCM 1nd semester By: Adal ALashban.
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
High Capacity Data Hiding for Grayscale Images
EarthTour Presentations
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
A New Method for Tamper Detection and Recovery
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
A Restricted Region-based Data-hiding Scheme
Presentation transcript:

Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen Digital Object Identifier: /ICICS Speaker: Chung-Yi Wang Adviser: Quincy Wu Date: 2007/6/4

2007/6/42 outline Introduction Basic Ideals Flow Chart Results Reference

2007/6/43 Introduction(1/3) A speech technique that protects the speech signal from the peeping of illegal users is proposed

2007/6/44 SenderReceiver Network Illegal user SenderReceiver Network

2007/6/45 Introduction(2/3) Maybe Cryptosystem is not the best solution Encrypting data make signal be chaotic and meaningless Chaotic and meaningless signal always be detected by illegal user They want to break it! Encrypting Data (DES,AES,IDEA…)

2007/6/46 Introduction(3/3) Embedding the secret speech into another speech (cover speech) could be a good solution Stego speech (cover speech with secret speech) is meaningful Illegal users will be perplexed by speech hiding system Even if illegal users detect the Stego speech is fraud… They still can’t obtain the secret speech without the private key since the secret speech is encrypted

2007/6/47 Basic Ideals(1/4) For speech signal, small distortions make difference to human ears If we could hiding speech but make distortions be small, there is no difference to human ears!

2007/6/48 Basic Ideals(2/4) Speech signal could divide into two band, the high frequency band and low frequency band High frequency band always is noise alike to human ears

2007/6/49 Basic Ideals(3/4) | Low Frequency Band | | -- High Frequency -- | Hiding data here!

2007/6/410 Basic Ideals(4/4) Small distortions make difference to human ears Hiding speech but be no difference to human ears High frequency band always is noise alike to human ears Hiding data here!

2007/6/411 Flow chart S C S’’ 1.Compress and Encrypt Ch Cl 2.Sub-band 3.Hidden G 4.Combine G 5.Send Gh Gl 6.Sub-band S’’ 7.Construct S 8.Decode

2007/6/412 Flow chart Process Cover Speech C Fs 1.Sub-band Ch Fs/2 Cl Fs/2 Cl’ Fs/2 2.DPCM or PCM Ch’ Fs/2 Hiding Speech Band

2007/6/413 Flow chart Process Cover Speech Analog Digital DPCMP (Differential Pulse Code Modulation) PCM ( Pulse Code Modulation) Staircase, Finite Compress

2007/6/414 Flow chart Process Secret Speech S Fs 1.Sub-band Sh Fs/2 Sl Fs/2 Sl’ Fs/2 3.DPCM or PCM 2.Drop 1.Noise 2.Reduce bandwidth Sl’’ Fs/2 4.DES or IDEA

2007/6/415 Flow chart Hiding Secret Speech into Cover Speech S’’ … One Speech Sample Ch’ …

2007/6/416 Flow chart Hiding Secret Speech into Cover Speech Cover (Ch’) Speech Sample Secret (Sl’’) Speech Sample Cover (Ch’) Speech Sample Cover (Ch’) Speech Sample Embedding r bits from Sl’’ into Ch’ (to LSB r bits)

2007/6/417 Flow chart Hiding Secret Speech into Cover Speech How many bits need to pick up? n s is the bytes of Sl’’, n s x 8 means the sum bits of Sl’’ n C is the number of samples in C Ch’ has a half of frequency from C, we should count it by n C / 2 m is the number of bits required to store the value of n s

2007/6/418 Flow chart Hiding Secret Speech into Cover Speech For example… n s is 4 n C is 64 m is 16 (bits) … r = [4 * 8 / (64/2) – 16] = 2 (bits)

2007/6/419 Result Hiding Decode

2007/6/420 Result

2007/6/421 Reference A New Speech Hiding Scheme Based upon Sub- Band Coding Sub-Band Coding DES rd rd IDEA ption_Algorithm ption_Algorithm