scispace - formally typeset
Search or ask a question
Author

Beghdad Ayad

Bio: Beghdad Ayad is an academic researcher from Iran University of Science and Technology. The author has contributed to research in topics: Speech enhancement & Noise reduction. The author has an hindex of 8, co-authored 20 publications receiving 358 citations. Previous affiliations of Beghdad Ayad include Al Ain University of Science and Technology & University of Rennes 1.

Papers
More filters
Journal ArticleDOI
TL;DR: Current digital audio steganographic techniques are reviewed and evaluated based on robustness, security and hiding capacity indicators and a robustness-based classification of steganography models depending on their occurrence in the embedding process is provided.
Abstract: The rapid spread in digital data usage in many real life applications have urged new and effective ways to ensure their security. Efficient secrecy can be achieved, at least in part, by implementing steganograhy techniques. Novel and versatile audio steganographic methods have been proposed. The goal of steganographic systems is to obtain secure and robust way to conceal high rate of secret data. We focus in this paper on digital audio steganography, which has emerged as a prominent source of data hiding across novel telecommunication technologies such as covered voice-over-IP, audio conferencing, etc. The multitude of steganographic criteria has led to a great diversity in these system design techniques. In this paper, we review current digital audio steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators. Another contribution of this paper is the provision of a robustness-based classification of steganographic models depending on their occurrence in the embedding process. A survey of major trends of audio steganography applications is also discussed in this paper.

175 citations

Proceedings ArticleDOI
25 Apr 2011
TL;DR: A current state of art literature in digital audio steganographic techniques is presented and their potentials and limitations to ensure secure communication are explored.
Abstract: Steganography has been proposed as a new alternative technique to enforce data security. Lately, novel and versatile audio steganographic methods have been proposed. A perfect audio Steganographic technique aim at embedding data in an imperceptible, robust and secure way and then extracting it by authorized people. Hence, up to date the main challenge in digital audio steganography is to obtain robust high capacity steganographic systems. Leaning towards designing a system that ensures high capacity or robustness and security of embedded data has led to great diversity in the existing steganographic techniques. In this paper, we present a current state of art literature in digital audio steganographic techniques. We explore their potentials and limitations to ensure secure communication. A comparison and an evaluation for the reviewed techniques is also presented in this paper.

94 citations

Journal ArticleDOI
TL;DR: Objective results show that the presented algorithm secures hidden data and achieves interesting tradeoffs between the hiding capacity and the speech quality.
Abstract: In this paper, we present a unified algorithm for phase and magnitude speech spectra data hiding. The phase and the magnitude speech spectra are concurrently investigated to increase the capacity and the security of the embedded information. The proposed algorithm in this paper is based on finding secure spectral embedding areas in wideband magnitude speech spectrum. Our approach exploits these areas to hide data in both speech components (i.e., phase and magnitude). The embedding locations and hiding capacity are defined according to a controlled acceptable distortion in the magnitude spectrum. The latter is expressed as a set of parameters controlled by the sender. Consequently, the hiding capacity and the locations of concealed data change for each data communication instance to further prevent malicious intrusions. Objective results show that the presented algorithm in this paper secures hidden data and achieves interesting tradeoffs between the hiding capacity and the speech quality. Copyright © 2013 John Wiley & Sons, Ltd.

28 citations

Journal ArticleDOI
TL;DR: A new method for estimating noise CPSD based on the assumption of a diffuse noise field is proposed, which shows that the two-microphone speech enhancement scheme utilizing the proposed Noise CPSD estimation technique outperforms the enhancement system using the VAD-based noise CPSd estimation.

20 citations

Journal ArticleDOI
TL;DR: In this paper, the authors proposed an iterative approach for estimation of the cross power spectral density (CPSD) of noise to be employed in coherence-based methods for two-microphone speech enhancement.

17 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The evaluation of correlations of several objective measures with these three subjective rating scales is reported on and several new composite objective measures are also proposed by combining the individual objective measures using nonparametric and parametric regression analysis techniques.
Abstract: In this paper, we evaluate the performance of several objective measures in terms of predicting the quality of noisy speech enhanced by noise suppression algorithms. The objective measures considered a wide range of distortions introduced by four types of real-world noise at two signal-to-noise ratio levels by four classes of speech enhancement algorithms: spectral subtractive, subspace, statistical-model based, and Wiener algorithms. The subjective quality ratings were obtained using the ITU-T P.835 methodology designed to evaluate the quality of enhanced speech along three dimensions: signal distortion, noise distortion, and overall quality. This paper reports on the evaluation of correlations of several objective measures with these three subjective rating scales. Several new composite objective measures are also proposed by combining the individual objective measures using nonparametric and parametric regression analysis techniques.

1,655 citations

01 Jan 2001
TL;DR: A novel estimator of the non-stationary reverberationnoise power spectrum, based on a statistical model of late reverberation, brings about dramatic improvements in terms of automatic speech recognition scores in various reverberant environments.
Abstract: Summary A new monaural method for the suppression of late room reverberation from speech signals, based on spectral subtraction, is presented. The problem of reverberation suppression differs from classical speech de-noising in that the “reverberation noise” is non stationary. In this paper, the use of a novel estimator of the non-stationary reverberationnoise power spectrum, based on a statistical model of late reverberation, is presented. The algorithm is tested on real reverberated signals. The performances for different RIRs with ranging from 0.34 s to 1.7 s consistently show significant noise reduction with little signal distortion. Moreover, when used as a front end to an automatic speech recognition system, the algorithm brings about dramatic improvements in terms of automatic speech recognition scores in various reverberant environments.

330 citations

Journal ArticleDOI
TL;DR: The general structure of the steganographic system and classifications of image steganography techniques with its properties in spatial domain are exploited and different performance matrices and steganalysis detection attacks are discussed.
Abstract: This paper presents a literature review of image steganography techniques in the spatial domain for last 5 years. The research community has already done lots of noteworthy research in image steganography. Even though it is interesting to highlight that the existing embedding techniques may not be perfect, the objective of this paper is to provide a comprehensive survey and to highlight the pros and cons of existing up-to-date techniques for researchers that are involved in the designing of image steganographic system. In this article, the general structure of the steganographic system and classifications of image steganographic techniques with its properties in spatial domain are exploited. Furthermore, different performance matrices and steganalysis detection attacks are also discussed. The paper concludes with recommendations and good practices drawn from the reviewed techniques.

310 citations

Journal ArticleDOI
TL;DR: Current digital audio steganographic techniques are reviewed and evaluated based on robustness, security and hiding capacity indicators and a robustness-based classification of steganography models depending on their occurrence in the embedding process is provided.
Abstract: The rapid spread in digital data usage in many real life applications have urged new and effective ways to ensure their security. Efficient secrecy can be achieved, at least in part, by implementing steganograhy techniques. Novel and versatile audio steganographic methods have been proposed. The goal of steganographic systems is to obtain secure and robust way to conceal high rate of secret data. We focus in this paper on digital audio steganography, which has emerged as a prominent source of data hiding across novel telecommunication technologies such as covered voice-over-IP, audio conferencing, etc. The multitude of steganographic criteria has led to a great diversity in these system design techniques. In this paper, we review current digital audio steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators. Another contribution of this paper is the provision of a robustness-based classification of steganographic models depending on their occurrence in the embedding process. A survey of major trends of audio steganography applications is also discussed in this paper.

175 citations

Journal ArticleDOI
TL;DR: Algorithms for combined acoustic echo cancellation and noise reduction for hands-free telephones are presented and compared and a psychoacoustically motivated weighting rule is mostly preferred since it leads to more natural near end speech and to less annoying residual noise.
Abstract: This paper presents and compares algorithms for combined acoustic echo cancellation and noise reduction for hands-free telephones. A structure is proposed, consisting of a conventional acoustic echo canceler and a frequency domain postfilter in the sending path of the hands-free system. The postfilter applies the spectral weighting technique and attenuates both the background noise and the residual echo which remains after imperfect echo cancellation. Two weighting rules for the postfilter are discussed. The first is a conventional one, known from noise reduction, which is extended to attenuate residual echo as well as noise. The second is a psychoacoustically motivated weighting rule. Both rules are evaluated and compared by instrumental and auditive tests. They succeed about equally well in attenuating the noise and the residual echo. In listening tests, however, the psychoacoustically motivated weighting rule is mostly preferred since it leads to more natural near end speech and to less annoying residual noise.

146 citations