An Audio Information Hide Algorithm Based on Error Correcting Code

Article Preview

Abstract:

This paper presents a method of error correcting code to improve the performance of audio information hiding. To use hadamard as error correcting code, not only makes audio information more secret, but also has higher correct error capacity to noise, compression and filter.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

4144-4147

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Z. J. Wu, H. X. Duan, and X. Li. An approach to hide secret speech information, Journal of Shanghai Jiaotong University(Science), vol. 11, pp.134-139. (2012).

Google Scholar

[2] Y. Chen, F. Qu, J. B. Hu and Z. Chen Density adjustable pseudorandom sequence and its applications in information hiding, " Multimedia Information Networking and Security, MINES , 09. International Conference on, p.91 – 94. (2009).

DOI: 10.1109/mines.2009.94

Google Scholar

[3] Z. X. Yin, C. C. Chang and Y. P. Zhang. A high embedding efficiency steganography scheme for wet paper codes, 2009 Fifth International Conference on Information Assurance and Security, pp.611-614, (2009).

DOI: 10.1109/ias.2009.93

Google Scholar

[4] Y. K. Chan, W. T. Chen, and S. S. Yu, A HDWT-based reversible data hiding method , Journal of Systems and Software, vol. 82, p.411–421, March (2009).

DOI: 10.1016/j.jss.2008.07.008

Google Scholar

[5] C. C. Chang. T. D. Kieu and Y. C. Chou. A high payload steganographic scheme based on (7, 4) hamming code for digital images, Electronic Commerce and Security, International Symposium on, pp.16-20 . (2008).

DOI: 10.1109/isecs.2008.222

Google Scholar

[6] S. G. Yang and C. X. Li. Text information hiding method based on chaotic map and bch code in dwt domain of a carrier image", Wavelet Analysis and Pattern Recognition, ICWAPR , 07. International Conference on, pp.4-6 . (2011).

DOI: 10.1109/icwapr.2007.4421737

Google Scholar

[7] J. R. Chen, L. C. Jiao, and J. S. Wu, Projective synchronization with different scale factors in a driven–response complex network and its application in image encryption, Nonlinear Analysis: Real World A-pplications, vol. 11 p.3045–3058, August (2010).

DOI: 10.1016/j.nonrwa.2009.11.003

Google Scholar