Steganography in Audio Files by Entropy using FEC as Reed–Solomon of VOIP Streams
نویسندگان
چکیده
In this paper introduce a novel technique to identify the voice (active frames) and silent regions (inactive frames) of a speech stream very much suitable for VoIP calls. Thus here the proposed a better voice activity detection based on the entropy algorithm. High-capacity steganography algorithm for embedding data in the inactive frames . Then inactive frames are encoded by G. 723. 1 source codec, which is used extensively in Voice over Internet Protocol (VoIP). As the data embedding capacity is very high on inactive frames of the audio signals than in the active frames. Entropy based Voice Activity Detection algorithms for VoIP applications can save bandwidth by filtering the frames that do not contain speech . On evaluating the proposed approach with the existing methods, our approach yield a better saving in bandwidth, yet maintaining high capacity of data embedding. yet maintaining good quality of the speech streams and then finally using forward error correcting code as Reed-Solomon codes. It can be used as encoder and decoder. By using Reed-Solomon code, data losses occur in the transmission can be detected and recovered by adding extra information (redundancy) to the original data.
منابع مشابه
An Information- Theoretical Model for Streaming Media Based Stegosystems
Steganography in streaming media differs from steganography in images or audio files because of the continuous embedding process and the necessary synchronization of sender and receiver due to packet loss in streaming media. The conventional theoretical model for image steganography is not appropriate for explaining the security scenarios for streaming media based stegosystems. In this paper, w...
متن کاملThe Steganography In Inactive Frames Of Voip
This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1 source codec, which isused extensively in Voice over Internet Protocol (VoIP). This study reveals that, contrary to existing thought, the inactive frames of VoIP streams are more suitable for data embedding than the active frames of the st...
متن کاملSteganography of VoIP Streams
The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols’ fields and is known for IP, UDP or TCP protoc...
متن کاملSteganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
متن کاملSimple Reed-Solomon Forward Error Correction (FEC) Scheme for FECFRAME
This document describes a fully-specified simple Forward Error Correction (FEC) scheme for Reed-Solomon codes over the finite field (also known as the Galois Field) GF(2^^m), with 2 <= m <= 16, that can be used to protect arbitrary media streams along the lines defined by FECFRAME. The Reed-Solomon codes considered have attractive properties, since they offer optimal protection against packet e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016