{"title":"Steganalysis of the MELP quantization index modulation data hiding methods by using chaotic type features","authors":"A. Yargiçoglu, H. Ilk","doi":"10.1109/SIU.2009.5136334","DOIUrl":null,"url":null,"abstract":"The success of data hiding methods, which hide data to media like speech signal, is primarily determined by their strength aganist to the steganalysis methods. In this paper, some data hiding methods, which embed secret data during MELP analysis of speech signal using quantization index modulation are introduced. These methods in question are examined by a steganalysis method which takes advantage of chaotic-type features of speech signal. Thus, by evaluating the steganalysis results, the practical usage limitations of data hiding methods can be exposed.","PeriodicalId":219938,"journal":{"name":"2009 IEEE 17th Signal Processing and Communications Applications Conference","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE 17th Signal Processing and Communications Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIU.2009.5136334","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The success of data hiding methods, which hide data to media like speech signal, is primarily determined by their strength aganist to the steganalysis methods. In this paper, some data hiding methods, which embed secret data during MELP analysis of speech signal using quantization index modulation are introduced. These methods in question are examined by a steganalysis method which takes advantage of chaotic-type features of speech signal. Thus, by evaluating the steganalysis results, the practical usage limitations of data hiding methods can be exposed.