This paper presented an approach to hide secret speech information in code excited linear prediction(CELP)-based speech coding scheme by adopting the analysis-by-synthesis (ABS)-based algorithm of speech information h...
详细信息
This paper presented an approach to hide secret speech information in code excited linear prediction(CELP)-based speech coding scheme by adopting the analysis-by-synthesis (ABS)-based algorithm of speech information hiding and extracting for the purpose of secure speech communication. The secret speech is coded in 2.4Kb/s mixed excitation linear prediction (MELP), which is embedded in CELP type public speech. The ABS algorithm adopts speech synthesizer in speech coder. Speech embedding and coding are synchronous, i.e. a fusion of speech information data of public and secret. The experiment of embedding 2.4 Kb/s MELP secret speech in G.728 scheme coded public speech transmitted via public switched telephone network (PSTN) shows that the proposed approach satisfies the requirements of information hiding, meets the secure communication speech quality constraints, and achieves high hiding capacity of average 3.2 Kb/s with an excellent speech quality and complicating speakers' recognition.
作者:
吴志军段海新李星Network Research Center
Tsinghua Univ. Beijing 100084 ChinaTianjin Key Lab. for Advanced Signal Processing Civil Aviation Univ. of China Tianjin 300300 Network Research Center
Tsinghua Univ. Beijing 100084 China
This paper presented an approach to hide secret speech information in code excited linear prediction (CELP)-based speech coding scheme by adopting the analysis-by-synthesis (ABS)-based algorithm of speech information ...
详细信息
This paper presented an approach to hide secret speech information in code excited linear prediction (CELP)-based speech coding scheme by adopting the analysis-by-synthesis (ABS)-based algorithm of speech information hiding and extracting for the purpose of secure speech communication. The secret speech is coded in 2.4 Kb/s mixed excitation linear prediction (MELP), which is embedded in CELP type public speech. The ABS algorithm adopts speech synthesizer in speech coder. Speech embedding and coding are synchronous, i.e. a fusion of speech information data of public and secret. The experiment of embedding 2.4 Kb/s MELP secret speech in G.728 scheme coded public speech transmitted via public switched telephone network (PSTN) shows that the proposed approach satisfies the requirements of information hiding, meets the secure communication speech quality constraints, and achieves high hiding capacity of average 3.2 Kb/s with an excellent speech quality and complicating speakers’ recognition.
The efficiently calculate of the attitude matrix is an important subject in the Strap-down Inertial Navigation System (SINS), because the precision of its solution directly effects on the system performance. A new met...
详细信息
ISBN:
(纸本)0819460079
The efficiently calculate of the attitude matrix is an important subject in the Strap-down Inertial Navigation System (SINS), because the precision of its solution directly effects on the system performance. A new method of 3 rd order minimal parameter solution for the orthogonal matrix differential equation is used to solve the quaternion differential equation of SINS in this paper, and the numerical simulation is done as well. From the simulation result, we can see that when the new algorithm is used, the precision of the solved attitude angles is two orders higher than the classical method, and the floating-point operations is only abort half of the old one.
A new filtering scheme using generalized morphological operators and fuzzy logic is proposed for suppressing speckle noise in images. The algorithm employs generalized morphological close-open and open-close operation...
详细信息
Landmines and unexploded ordnances are causing tremendous problems in a large number of areas throughout the world today. The ultra wideband GPR Ground Penetrating Radar is a useful tool for plastic landmine detection...
详细信息
Landmines and unexploded ordnances are causing tremendous problems in a large number of areas throughout the world today. The ultra wideband GPR Ground Penetrating Radar is a useful tool for plastic landmine detection. For shallowly buried plastic mine, removing the ground bounce with much more energy than useful signal and with the same arrival time as useful signal is very important to following detection, SAR imaging and target recognition. This paper presents an adaptive ground bounce removal method based on Kernel ICA (KICA) algorithm and adaptive ICs selection. Experimental results based on field-test data show that the proposed method is performing very well.
Downward looking ground penetrating radar (GPR) has been considered a viable technology for landmine detection. For such a GPR with the antennas positioned very close to the ground surface, the reflections from the gr...
详细信息
Downward looking ground penetrating radar (GPR) has been considered a viable technology for landmine detection. For such a GPR with the antennas positioned very close to the ground surface, the reflections from the ground surface, i.e., the ground bounce, are very strong and can completely dominate the weak returns from shallowly buried non-metallic mines. Hence, one of the key challenges of using GPRs for landmine detection is to remove the ground bounce as completely as possible without altering the landmine return. The ground bounce varies with surface roughness and soil conditions and lead to performance degradation for many ground bounce removal algorithms without reference data selection. In this paper we introduce NHD-based reference data selection methods for ground bounce removal. Experimental results are provided to illustrate the performance of the proposed method.
Recognition of the interesting targets is the key techniques of precise guided weapon systems. Because fractal dimension is an interesting textual feature of an image, it has been used in many pattern recognition appl...
详细信息
ISBN:
(纸本)0819460079
Recognition of the interesting targets is the key techniques of precise guided weapon systems. Because fractal dimension is an interesting textual feature of an image, it has been used in many pattern recognition applications including classification and segmentation. According to the fractal feature of man-made objects in infrared images, a new algorithm is presented to detect the airplanes in this paper. And then we can partition and identify the potential targets using this fractal algorithm. Simulations illustrate that the airplane is successfully identified with the algorithm. The algorithm only requires moderate operations, so it is easy to be implemented for automatic target detection in real-time systems. The results of the experiments show that the fractal dimension can efficiently reflect the object surface complexity or irregularity in images. The algorithm is a powerful tool in identifying airplanes from infrared images.
In this paper, we study about the electronic transport in carbon nanotube field-effect transistors. Intrinsic properties like electron mobility, band structure and interconnections of semiconducting carbon nanotubes a...
详细信息
In this paper, we study about the electronic transport in carbon nanotube field-effect transistors. Intrinsic properties like electron mobility, band structure and interconnections of semiconducting carbon nanotubes are compared with other semiconductors.
暂无评论