Please use this identifier to cite or link to this item:
http://hdl.handle.net/11452/23141
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yürüklü, Emrah | - |
dc.contributor.author | Avcıbaş, İsmail | - |
dc.date.accessioned | 2021-12-09T12:21:38Z | - |
dc.date.available | 2021-12-09T12:21:38Z | - |
dc.date.issued | 2008-12 | - |
dc.identifier.citation | Koçal, O. H. vd. (2008). ''Chaotic-type features for speech steganalysis''. IEEE Transactions on Information Forensics and Security, 3(4), 651-661. | en_US |
dc.identifier.issn | 1556-6021 | - |
dc.identifier.issn | 1556-6013 | - |
dc.identifier.uri | https://doi.org/10.1109/TIFS.2008.2004289 | - |
dc.identifier.uri | https://ieeexplore.ieee.org/document/4668369 | - |
dc.identifier.uri | http://hdl.handle.net/11452/23141 | - |
dc.description.abstract | We investigate the use of chaotic-type features for recorded speech steganalysis. Considering that data hiding within a speech signal distorts the chaotic properties of the original speech signal, we design a steganalyzer that uses Lyapunov exponents and a fraction of false neighbors as chaotic features to detect the existence of a stegosignal. We also discuss the applicability of the proposed method to general audio. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Differential equations | en_US |
dc.subject | Lyapunov methods | en_US |
dc.subject | Telecommunication networks | en_US |
dc.subject | Chaos | en_US |
dc.subject | False neighbors | en_US |
dc.subject | Lyapunov exponent | en_US |
dc.subject | Steganalysis | en_US |
dc.subject | Steganography | en_US |
dc.subject | Speech | en_US |
dc.subject | Computer science | en_US |
dc.subject | Engineering | en_US |
dc.title | Chaotic-type features for speech steganalysis | en_US |
dc.type | Article | en_US |
dc.identifier.wos | 000261310400007 | tr_TR |
dc.identifier.scopus | 2-s2.0-56849089842 | tr_TR |
dc.relation.tubitak | 104E056 | tr_TR |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi | tr_TR |
dc.contributor.department | Uludağ Üniversitesi/Mühendislik Fakültesi/Elektrik-Elektronik Mühendisliği Bölümü. | tr_TR |
dc.identifier.startpage | 651 | tr_TR |
dc.identifier.endpage | 661 | tr_TR |
dc.identifier.volume | 3 | tr_TR |
dc.identifier.issue | 4 | tr_TR |
dc.relation.journal | IEEE Transactions on Information Forensics and Security | en_US |
dc.contributor.buuauthor | Koçal, Osman Hilmi | - |
dc.contributor.buuauthor | Avcıbaş | - |
dc.contributor.researcherid | H-9089-2018 | tr_TR |
dc.relation.collaboration | Yurt içi | tr_TR |
dc.relation.collaboration | Sanayi | tr_TR |
dc.subject.wos | Computer science, theory & methods | en_US |
dc.subject.wos | Engineering, electrical & electronic | en_US |
dc.indexed.wos | SCIE | en_US |
dc.indexed.scopus | Scopus | en_US |
dc.wos.quartile | Q1 | en_US |
dc.contributor.scopusid | 6506118364 | tr_TR |
dc.subject.scopus | Steganalysis; Distortion Function; Data Hiding | en_US |
Appears in Collections: | Scopus Web of Science |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.