Learn More
Perceptual audio hashing has been applied in audio content identification, retrieval and indexing for its accuracy and perceptual robustness. Security issue becomes important when perceptual hashing is applied in audio content authentication. A key-dependent compressed domain perceptual audio hashing algorithm for audio content authentication is proposed. A(More)
In this paper a information hiding algorithm applied to compressed speech bitstream is proposed. Covering codes are used to hide information in the least important bits in G.729 frames. The embedding rate is fairly high compared with the state of art algorithms, while the experiment results show that the distortion of the speech signal is imperceptible.
In this paper, a perceptual audio hashing method in compressed domain is proposed for content identification, in which MDCT coefficients as the intermediate decoding result are selected for perceptual feature extraction and hash generation. The perceptual feature extraction is based on psychoacoustic model and exhibits good discrimination ability for(More)
The Neural Network (NN) based models are commonly used in power amplifier modeling and predistorter design, and seen as a potential alternative to model and compensate broadband power amplifiers (PAs) having medium- to-strong memory effects along with high-order nonlinearity. In this paper, we propose a novel computationally efficient behavior model based(More)
As CMOS scaling options are exhausted by fundamental limitations, device and circuit integration in the third-dimension could provide a possible pathway without extensively relying on ultra-scaled transistors. So far, however, the migration of CMOS to 3-D has been unattainable. The CMOS fabric architecture uses complementary MOSFETs in an inverted logic,(More)
Reversible watermarking for compressed speech is proposed. Two properties of parameter-based speech coding bitstream are pointed out. Based on the properties, unimportant parameters are further compressed by entropy coding and concatenated with the watermark payload. The proposed scheme is demonstrated with G.729 speech coding and can be applied to other(More)
At the port-of-entry, containers are inspected through a specific sequence of sensor stations to detect the presence of radioactive materials, biological and chemical agents, and other illegal cargo. The inspection policy, which includes the sequence in which sensors are applied and the threshold levels used at the inspection stations, affects the(More)
—At Sub-20nm technologies CMOS scaling faces severe challenges primarily due to fundamental device scaling limitations, interconnection overhead and complex manufacturing. Migration to 3-D has been long sought as a possible pathway to continue scaling; however, CMOS's intrinsic requirements are not compatible for fine-grained 3-D integration. In [1], we(More)