Semantic Scholar uses AI to extract papers important to this topic.
An adversarial attack is an exploitative process in which minute alterations are made to natural inputs, causing the inputs to be… Expand The last few years have witnessed an explosive growth in the research of information hiding in multimedia objects, but few… Expand This paper presents an improved version of a steganographic algorithm for IP telephony called HideF0. It is based on… Expand We present and evaluate an algorithm that performs in-call selection of the most appropriate audio codec given prevailing… Expand Perceived speech quality, or Quality of Experience (QoE), is the key criteria for evaluating VoIP service. Most of the existing… Expand We proposed to use support vector machines (SVMs) to recognize speakers from signal transcoded with different speech codecs… Expand This paper presents a novel mechanism for dynamically adapting the quality of congestion controlled voice over IP (VoIP… Expand A congestion avoidance strategy based on the concept of predictive path switching control (PPSC) is proposed for improving the… Expand The real-time speech hiding is to hide the secret speech into a cover speech in real-time communication systems. By hiding one… Expand In recent years wideband speech coding has attracted quite a lot research. However, there have been only a few papers describing… Expand