Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "9b1a5973-f1a6-4b04-b15d-a465f02e119f"}, "_deposit": {"id": "4756", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4756"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4756", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Robust Audio Data Hiding based Probabilistic Global Search in MDCT Domain", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "This paper managed to proposerobust audio data hiding throughoptimization-based problem transformationmethod, Probabilistic Global SearchLausanne Algorithm (PGSL) in modifieddiscrete cosine transform (MDCT) domain.We manipulate the MDCT coefficients in theselected frames with the stego key and, thenimplement the optimal best points searchingprocess through PGSL Algorithm to obtain thebest secret audio message embeddingpositions. The Lowest Bit Error Rate value aredefined the optimal best coefficients. Theinverse modified discrete cosine transform(IMDCT) is applied to form stego audio. Inour audio data hiding scheme, the results ofimperceptible (audible difference) between thestego and cover audio will be evaluated usingSpectrogram and Informal Listening Tests.The robustness will be tested with standarddigital signal manipulation attacks as Noiseaddition, MPEG compression andResampling. The goal of proposed data hidingis to protect the privacy of secret audiomessage from unauthorized accesses, and tosatisfy audio steganography issues asimperceptible, embedding capacity and robustness"}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Audio Data Hiding"}, {"interim": "Audio Steganography"}, {"interim": "Modified Discrete Cosine Transform"}, {"interim": "PGSL Algorithm"}, {"interim": "optimal best points searching process"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-02"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "9005.pdf", "filesize": [{"value": "81 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 81000.0, "url": {"url": "https://meral.edu.mm/record/4756/files/9005.pdf"}, "version_id": "d24b5e9e-8c4a-4378-83ff-313a354c5691"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Ninth International Conference On Computer Applications (ICCA 2011)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Su, Ei Thin"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2011-05-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/52"}, "item_title": "Robust Audio Data Hiding based Probabilistic Global Search in MDCT Domain", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004756", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-02"}, "publish_date": "2019-07-02", "publish_status": "0", "recid": "4756", "relation": {}, "relation_version_is_last": true, "title": ["Robust Audio Data Hiding based Probabilistic Global Search in MDCT Domain"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Robust Audio Data Hiding based Probabilistic Global Search in MDCT Domain

http://hdl.handle.net/20.500.12678/0000004756
http://hdl.handle.net/20.500.12678/0000004756
cd68b569-0d72-44c5-8e02-1de4c78a0e2c
9b1a5973-f1a6-4b04-b15d-a465f02e119f
None
Preview
Name / File License Actions
9005.pdf 9005.pdf (81 Kb)
Publication type
Article
Upload type
Publication
Title
Title Robust Audio Data Hiding based Probabilistic Global Search in MDCT Domain
Language en
Publication date 2011-05-05
Authors
Su, Ei Thin
Description
This paper managed to proposerobust audio data hiding throughoptimization-based problem transformationmethod, Probabilistic Global SearchLausanne Algorithm (PGSL) in modifieddiscrete cosine transform (MDCT) domain.We manipulate the MDCT coefficients in theselected frames with the stego key and, thenimplement the optimal best points searchingprocess through PGSL Algorithm to obtain thebest secret audio message embeddingpositions. The Lowest Bit Error Rate value aredefined the optimal best coefficients. Theinverse modified discrete cosine transform(IMDCT) is applied to form stego audio. Inour audio data hiding scheme, the results ofimperceptible (audible difference) between thestego and cover audio will be evaluated usingSpectrogram and Informal Listening Tests.The robustness will be tested with standarddigital signal manipulation attacks as Noiseaddition, MPEG compression andResampling. The goal of proposed data hidingis to protect the privacy of secret audiomessage from unauthorized accesses, and tosatisfy audio steganography issues asimperceptible, embedding capacity and robustness
Keywords
Audio Data Hiding, Audio Steganography, Modified Discrete Cosine Transform, PGSL Algorithm, optimal best points searching process
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/52
Journal articles
Ninth International Conference On Computer Applications (ICCA 2011)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:19:39.511370
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL