CFP last date
20 May 2024
Reseach Article

Steganography in Audio Files by Entropy using FEC as Reed–Solomon of VOIP Streams

by Santhana Mangai P.s, G.selva Vinayagam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 4
Year of Publication: 2012
Authors: Santhana Mangai P.s, G.selva Vinayagam
10.5120/7617-0667

Santhana Mangai P.s, G.selva Vinayagam . Steganography in Audio Files by Entropy using FEC as Reed–Solomon of VOIP Streams. International Journal of Computer Applications. 49, 4 ( July 2012), 28-31. DOI=10.5120/7617-0667

@article{ 10.5120/7617-0667,
author = { Santhana Mangai P.s, G.selva Vinayagam },
title = { Steganography in Audio Files by Entropy using FEC as Reed–Solomon of VOIP Streams },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 4 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 28-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number4/7617-0667/ },
doi = { 10.5120/7617-0667 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:45:26.593134+05:30
%A Santhana Mangai P.s
%A G.selva Vinayagam
%T Steganography in Audio Files by Entropy using FEC as Reed–Solomon of VOIP Streams
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 4
%P 28-31
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper introduce a novel technique to identify the voice (active frames) and silent regions (inactive frames) of a speech stream very much suitable for VoIP calls. Thus here the proposed a better voice activity detection based on the entropy algorithm. High-capacity steganography algorithm for embedding data in the inactive frames . Then inactive frames are encoded by G. 723. 1 source codec, which is used extensively in Voice over Internet Protocol (VoIP). As the data embedding capacity is very high on inactive frames of the audio signals than in the active frames. Entropy based Voice Activity Detection algorithms for VoIP applications can save bandwidth by filtering the frames that do not contain speech . On evaluating the proposed approach with the existing methods, our approach yield a better saving in bandwidth, yet maintaining high capacity of data embedding. yet maintaining good quality of the speech streams and then finally using forward error correcting code as Reed-Solomon codes. It can be used as encoder and decoder. By using Reed-Solomon code, data losses occur in the transmission can be detected and recovered by adding extra information (redundancy) to the original data.

References
  1. Z. Wu andW. Yang, "G. 711-based adaptive speech information hiding approach," Lecture Notes Comput. Sci. , vol. 4113, pp. 1139–1144, 2006.
  2. N. Aoki, "A technique of lossless steganography for G. 711 telephony speech," in Proc. 2008 4th Int. Conf. Intelligent Inf. HidingMultimedia Signal Process. (IIH-MSP), Harbin, Aug. 2008, pp. 608–611.
  3. L. Ma, Z. Wu, and W. Yang, "Approach to hide secret speech information in G. 721 scheme," Lecture Notes Comput. Sci. , vol. 4681, pp. 1315–1324, 2007.
  4. "Low-complexity coding at 24 and 32 kbit/s for hands-free operation in systems with low frame loss," International Telecommunication Union, Recommendation G. 722, 2001.
  5. S. Andersen, A. Duric, H. Astrom, R. Hagen, W. Kleijn, and J. Linden,"Internet low bit rate codec (iLBC)," Internet Engineering Task Force,RFC 3951, 2001.
  6. "GSM-enhanced full rate specifications," European Telecommunications Standards Institute, Specification 06. 51, 06. 60-63 and 06. 82, 2001 .
  7. B. Gold and N. Morgan, Speech and Audio Signal Processing. New York: John Wiley and Sons, 2000.
  8. J. Natvig, S. Hansen, and J. De Brito, "Speech processing in the paneuropean digital mobile radio system (GSM) – system overview," in Proc. IEEE Global Telecommunications Conference (IEEE GLOBECOM 1989), vol. 2, Nov. 1989, pp. 1060–1064.
  9. K. El-Maleh and P. Kabal, "Natural quality background noise coding using residual substitution," in Proc. EUROSPEECH, vol. 5, Sept. 1999, pp. 2359–2362.
  10. A. M. Kondoz, Digital Speech. New York: John Wiley and Sons, 1999.
  11. R. V. Prasad, A. Sangwan, H. S. Jamadagni, and M. C. Chiranth, "Comparison of voice activity detection algorithms for voip," in Proc. IEEE Symposium on Computer and Communications, vol. 5, July 2002,pp. 530–535.
  12. S. Lin and D. Costello, Error Control Coding. Prentice-Hall, 1983.
  13. Z. Wu,W. Yang, and Y. Yang, "ABS-based speech information hiding approach," Electron. Lett. , vol. 39, no. 22, pp. 1617–1619, Oct. 2003.
  14. Petrus Mursanto," GENERIC REED SOLOMON ENCODER", Fakultas Ilmu Komputer, Universitas Indonesia, Depok 16424, Indonesia.
  15. VENKATESAN GURUSWAMI," Linear-algebraic list decoding of folded Reed-Solomon codes", Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213,2011.
  16. Voice Activity Detection for VoIP—An Information Theoretic Approach. R. V. Prasad¤, R. Muralishankary, Vijay S. z, H. N. Shankary, Przemys?aw Pawe?czak¤ and Ignas Niemegeers, PES Institute of Technology.
  17. C. Krätzer, J. Dittmann, T. Vogel, and R. Hillert, "Design and evaluation of steganography for voice-over-ip," in Proc. IEEE Int. Symp. Circuits Syst. , May 2006, pp. 2397–3234.
  18. C. Bao, Y. F. Huang, and C. Zhu, "Steganalysis of compressed speech," in Proc. IMACS Multiconf. Computational Eng. Syst. Applicat. (CESA), Oct. 2006, pp. 5–10.
  19. "Coding of speech at 8 kbit/s using conjugate-structure algebraic-codeexcitedlinear-prediction (CS-ACELP)," International Telecommunication Union, Recommendation G. 729, 1996.
  20. P. Pollak, P. Sovka, and J. Uhlir, "The noise suppression system for a car," in Proc. EUROSPEECH, vol. 5, Sept. 1993, pp. 1073–1076.
  21. K. Waheed, K. Weaver, and F. M. Salam, "A robust algorithm for detecting speech segments using an entropic contrast," in Proc. 45th IEEE International Midwest Symposium on Circuits and Systems, vol. 3, Aug. 2002, pp. 328–331.
Index Terms

Computer Science
Information Sciences

Keywords

Audio streams Inactive frames Entropy Steganography Voice over Internet Protocol (VoIP) Reed-Solomon