Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8652037
Abdelaziz Ouadah, A. Hadjali, Fahima Nader
With the rapid development of Cloud Computing and Service Oriented Computing, the processes of selecting web services which gives the same functionality with different quality of service (QoS) become an important issue. To deal with the large number of candidates, Skyline method is used frequently to find the most pertinent Web services that are not dominated by any other service; whenever, i) the number of Skyline Web Services cannot be controlled. ii) Skyline doesn’t allow assigning importance weights to QoS attributes. In this paper we propose an efficient framework to handle the above drawbacks. K-representative Skyline is used to reduce the research space giving users a summary about the full Skyline Web Services. For weighting QoS attributes we propose an enhanced version of Fuzzy AHP method based on natural language and asking fewer efforts to users. To Rank-order pertinent Skyline Web Services we adapt an improved version of Promethee leveraging the outranking relationships between every Skyline Web services. The experimental evaluation performed on QWS dataset illustrates that our framework can better elicitate the user preferences and retrieve the best ranked K-Representative Skyline Web Services.
随着云计算和面向服务计算的快速发展,如何选择具有不同服务质量(QoS)却具有相同功能的web服务成为一个重要问题。为了处理大量的候选服务,经常使用Skyline方法来查找不受任何其他服务支配的最相关的Web服务;无论何时,i) Skyline Web服务的数量无法控制。ii) Skyline不允许为QoS属性分配重要性权重。在本文中,我们提出了一个有效的框架来处理上述缺陷。以k为代表的Skyline用于减少研究空间,为用户提供有关完整Skyline Web服务的摘要。对于QoS属性的权重,提出了一种基于自然语言的改进模糊层次分析法,减少了用户的工作量。为了对相关的Skyline Web服务进行排序,我们采用了Promethee的改进版本,利用每个Skyline Web服务之间的优先排序关系。在QWS数据集上进行的实验评估表明,我们的框架可以更好地激发用户偏好并检索排名最高的K-Representative Skyline Web Services。
{"title":"A Hybrid MCDM Framework for Efficient Web Services Selection Based on QoS","authors":"Abdelaziz Ouadah, A. Hadjali, Fahima Nader","doi":"10.1109/ICASS.2018.8652037","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8652037","url":null,"abstract":"With the rapid development of Cloud Computing and Service Oriented Computing, the processes of selecting web services which gives the same functionality with different quality of service (QoS) become an important issue. To deal with the large number of candidates, Skyline method is used frequently to find the most pertinent Web services that are not dominated by any other service; whenever, i) the number of Skyline Web Services cannot be controlled. ii) Skyline doesn’t allow assigning importance weights to QoS attributes. In this paper we propose an efficient framework to handle the above drawbacks. K-representative Skyline is used to reduce the research space giving users a summary about the full Skyline Web Services. For weighting QoS attributes we propose an enhanced version of Fuzzy AHP method based on natural language and asking fewer efforts to users. To Rank-order pertinent Skyline Web Services we adapt an improved version of Promethee leveraging the outranking relationships between every Skyline Web services. The experimental evaluation performed on QWS dataset illustrates that our framework can better elicitate the user preferences and retrieve the best ranked K-Representative Skyline Web Services.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134522159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8651972
A. Yahiou, A. Bayadi, B. Babes
The present work has the purpose of eliminating these transient inrush currents. So this paper presents a data acquisition system based on dSPACE board 1104, and a laboratory setup experiment to measure the sympathetic inrush current. Moreover, a control switching to mitigate the sympathetic inrush current in a 2 kVA transformer will be developed and applied experimentally in the laboratory and also in the simulations. This control strategy is performed by considering the residual flux at the opening instant of related circuit-breaker. A comparative study is carried out showing the validity of the mitigation technique.
{"title":"Point on Voltage Wave Switching for Sympathetic Inrush Current Reduction.","authors":"A. Yahiou, A. Bayadi, B. Babes","doi":"10.1109/ICASS.2018.8651972","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8651972","url":null,"abstract":"The present work has the purpose of eliminating these transient inrush currents. So this paper presents a data acquisition system based on dSPACE board 1104, and a laboratory setup experiment to measure the sympathetic inrush current. Moreover, a control switching to mitigate the sympathetic inrush current in a 2 kVA transformer will be developed and applied experimentally in the laboratory and also in the simulations. This control strategy is performed by considering the residual flux at the opening instant of related circuit-breaker. A comparative study is carried out showing the validity of the mitigation technique.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131846044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8652023
Zeghdi Zoubir, B. Linda, Abdelmalek Samir, Larabi Abdelkader, Khechiba Kamel
The present paper deals with the introduction of Artificial Intelligent Systems “Neural Networks (ANNs)” in a new power control scheme of wind turbine associated with Doubly Fed Induction Machine. These Neural Networks will be replacing the four fuzzy logic controllers that exist in the process and trained by using the database of this latter. So, the conceived neural network controllers are used to regulate the power flowing between the stator of the DFIG and the power network. The performances of the proposed ANNs controllers added to our system were tested and compared with two other previously proposed techniques based on Proportional-Integral (PI) and Fuzzy Logic (FL) controllers. The simulation test was carried out by means of computational simulations in Matlab/Simulink environment. The obtained results show that the proposed controller exhibits better behavior in terms of settling time, overshoot, robustness with respect to machine parameters variation, and good tracking references.
{"title":"Artificial Neural Networks (ANNs) - Based Robust Tracking Control for DFIG integrated in WECS","authors":"Zeghdi Zoubir, B. Linda, Abdelmalek Samir, Larabi Abdelkader, Khechiba Kamel","doi":"10.1109/ICASS.2018.8652023","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8652023","url":null,"abstract":"The present paper deals with the introduction of Artificial Intelligent Systems “Neural Networks (ANNs)” in a new power control scheme of wind turbine associated with Doubly Fed Induction Machine. These Neural Networks will be replacing the four fuzzy logic controllers that exist in the process and trained by using the database of this latter. So, the conceived neural network controllers are used to regulate the power flowing between the stator of the DFIG and the power network. The performances of the proposed ANNs controllers added to our system were tested and compared with two other previously proposed techniques based on Proportional-Integral (PI) and Fuzzy Logic (FL) controllers. The simulation test was carried out by means of computational simulations in Matlab/Simulink environment. The obtained results show that the proposed controller exhibits better behavior in terms of settling time, overshoot, robustness with respect to machine parameters variation, and good tracking references.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133867578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8652007
Omar Benmiloud, S. Arif
Even with today's technologies, transient stability studies of large power systems present a computational burden. In this paper, a reduced order model of multi-machine power systems is addressed. The methodology is based on information collected from Phasor Measurement Units (PMUs) at boundary buses. The Grey Wolf Optimizer (GWO) is employed then to estimate parameters of the fictitious generator, expressed by the fourth order model with an equivalent exciter. The proposed methodology is tested on 10-machine New England system. Simulation results show the feasibility of the methodology, and the ability to retain the original system behavior for various contingencies.
{"title":"Model Order Reduction of Power Systems Preserving Tie Line Flows","authors":"Omar Benmiloud, S. Arif","doi":"10.1109/ICASS.2018.8652007","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8652007","url":null,"abstract":"Even with today's technologies, transient stability studies of large power systems present a computational burden. In this paper, a reduced order model of multi-machine power systems is addressed. The methodology is based on information collected from Phasor Measurement Units (PMUs) at boundary buses. The Grey Wolf Optimizer (GWO) is employed then to estimate parameters of the fictitious generator, expressed by the fourth order model with an equivalent exciter. The proposed methodology is tested on 10-machine New England system. Simulation results show the feasibility of the methodology, and the ability to retain the original system behavior for various contingencies.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114730431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8652035
B. Benaissa, Kaori Yoshida, M. Köppen, Filip Hendrichovsky
The need for a robust indoor localization solution is mounting in the recent few year, as the IoT technology is growing fast. In this paper, we discuss existing indoor localization approaches, focusing on the signal strength fingerprint approaches, to which belongs the presented study and based on Bluetooth Low Energy signal. The proposed approach employs the Radial Basis Functions (RBF) to create model that describe the real signal strength-position relationship. The present method is fully implemented on a smart phone, namely, offline data collection, model computation and online position estimation. This allow updating the model by collecting more signal data, therefore improving the localization accuracy with small efforts. The presented results shows that updating the model effectively improves the accuracy of estimation.
{"title":"Updatable indoor localization based on BLE signal fingerprint","authors":"B. Benaissa, Kaori Yoshida, M. Köppen, Filip Hendrichovsky","doi":"10.1109/ICASS.2018.8652035","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8652035","url":null,"abstract":"The need for a robust indoor localization solution is mounting in the recent few year, as the IoT technology is growing fast. In this paper, we discuss existing indoor localization approaches, focusing on the signal strength fingerprint approaches, to which belongs the presented study and based on Bluetooth Low Energy signal. The proposed approach employs the Radial Basis Functions (RBF) to create model that describe the real signal strength-position relationship. The present method is fully implemented on a smart phone, namely, offline data collection, model computation and online position estimation. This allow updating the model by collecting more signal data, therefore improving the localization accuracy with small efforts. The presented results shows that updating the model effectively improves the accuracy of estimation.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123321485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8651973
M. Bencheikh, S. Boukhenous
The foot pressure measurement is important in gait and posture research for diagnosis of pressure of the feet for the athletes, back injuries, adaptation of insoles for orthopaedic applications and prevention of diabetic foot ulceration. There are several methods to measure the distribution of foot pressure. However, traditional systems have the disadvantage of being no flexible and thus influencing the measurement. In this work we present a low cost smart insole for diagnosis and prevention of plantar perforating disease in diabetic patients. The system consists of an instrumented insole that contains innovative sensors witch allow the quantification of plantar pressure at critical points that have a high risk of ulceration, it also contains a temperature / humidity sensors. A high rate of temperature and humidity allows faster formation of the ulcer, especially in the high friction points. All sensors for both feet communicate wirelessly and in real time with a mobile application through Bluetooth.
{"title":"A low Cost Smart Insole for Diabetic Foot Prevention","authors":"M. Bencheikh, S. Boukhenous","doi":"10.1109/ICASS.2018.8651973","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8651973","url":null,"abstract":"The foot pressure measurement is important in gait and posture research for diagnosis of pressure of the feet for the athletes, back injuries, adaptation of insoles for orthopaedic applications and prevention of diabetic foot ulceration. There are several methods to measure the distribution of foot pressure. However, traditional systems have the disadvantage of being no flexible and thus influencing the measurement. In this work we present a low cost smart insole for diagnosis and prevention of plantar perforating disease in diabetic patients. The system consists of an instrumented insole that contains innovative sensors witch allow the quantification of plantar pressure at critical points that have a high risk of ulceration, it also contains a temperature / humidity sensors. A high rate of temperature and humidity allows faster formation of the ulcer, especially in the high friction points. All sensors for both feet communicate wirelessly and in real time with a mobile application through Bluetooth.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128908180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8651997
F. Benzerafa, A. Tlemçani, N. Henini
Nowadays, the improvement of power factor has becoming increasingly concerned by the electric power utilities. There are many problems that affect the power quality and the performance of the equipment at consumer such as voltage sags or voltage dips, voltage imbalance, waveform distortion, voltage fluctuations and frequency. The improvement of power quality and the control of networks can be obtained by the implementation of the new devices technologies naming FACTS. Thus, the uses of device such as Distribution Static Compensator (DSTATCOM) can solve many problems in the electrical networks. The DSTATCOM is a source based on semiconductor capable of supplying or absorbing of reactive power in network. It used for correcting power quality problems in distribution systems. Because of limitation of use of conventional two-level inverter based DSTATCOM in the field of high power applications, we used the multilevel inverter. In this paper we will develop the space vector modulation algorith me technique in the case of the three level inverter. To validate the theory and models presented in this paper a structured simulation is executed in the simPowerSystems of MATLAB/Simulink.
{"title":"A Fuzzy Controller Using Three Level-inverter based DSTATCOM","authors":"F. Benzerafa, A. Tlemçani, N. Henini","doi":"10.1109/ICASS.2018.8651997","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8651997","url":null,"abstract":"Nowadays, the improvement of power factor has becoming increasingly concerned by the electric power utilities. There are many problems that affect the power quality and the performance of the equipment at consumer such as voltage sags or voltage dips, voltage imbalance, waveform distortion, voltage fluctuations and frequency. The improvement of power quality and the control of networks can be obtained by the implementation of the new devices technologies naming FACTS. Thus, the uses of device such as Distribution Static Compensator (DSTATCOM) can solve many problems in the electrical networks. The DSTATCOM is a source based on semiconductor capable of supplying or absorbing of reactive power in network. It used for correcting power quality problems in distribution systems. Because of limitation of use of conventional two-level inverter based DSTATCOM in the field of high power applications, we used the multilevel inverter. In this paper we will develop the space vector modulation algorith me technique in the case of the three level inverter. To validate the theory and models presented in this paper a structured simulation is executed in the simPowerSystems of MATLAB/Simulink.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128031003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8652008
Benamar Bouyeddou, F. Harrou, Ying Sun, B. Kadri
This paper proposes an intrusion detection scheme for Denial Of Service (DOS) and Distributed DOS (DDOS) attacks detection. We used Hellinger distance (HD), which is an effective measure to quantify the similarity between two distributions, to detect the presence of potential malicious attackers. Specifically, we applied HD-based anomaly detection mechanism to detect SYN and ICMPv6-based DOS/DDOS attacks. Here, Shewhart chart is applied to HD to set up a detection threshold. The proposed mechanism is evaluated using DARPA99 and ICMPv6 traffic datasets. Results indicate that our mechanism accomplished reliable detection of DOS/DDOS flooding attacks.
{"title":"An Effective Network Intrusion Detection Using Hellinger Distance-Based Monitoring Mechanism","authors":"Benamar Bouyeddou, F. Harrou, Ying Sun, B. Kadri","doi":"10.1109/ICASS.2018.8652008","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8652008","url":null,"abstract":"This paper proposes an intrusion detection scheme for Denial Of Service (DOS) and Distributed DOS (DDOS) attacks detection. We used Hellinger distance (HD), which is an effective measure to quantify the similarity between two distributions, to detect the presence of potential malicious attackers. Specifically, we applied HD-based anomaly detection mechanism to detect SYN and ICMPv6-based DOS/DDOS attacks. Here, Shewhart chart is applied to HD to set up a detection threshold. The proposed mechanism is evaluated using DARPA99 and ICMPv6 traffic datasets. Results indicate that our mechanism accomplished reliable detection of DOS/DDOS flooding attacks.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128002228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8651950
N. Sabri, A. Tlemçani, A. Chouder
Fault supervision in stand-alone photovoltaic system is one of the most important task to increase the reliability, efficiencies and safety. This paper proposes a fault detection and identification of a stand-alone photovoltaic system based on feed forward Artificial Neural Network (ANN). The input network consist simply of current and voltage for PV, Battery and load. Two consequent ANN are developed respectively, for detection and diagnosis using a real data issued from experimental stand-alone photovoltaic system installed at LREA in the University of Médéa, Algeria. The results show a high rate of good classification for both detection and diagnosis network, which reveals the effectiveness of the proposed method.
{"title":"Intelligent fault supervisory system applied on stand-alone photovoltaic system","authors":"N. Sabri, A. Tlemçani, A. Chouder","doi":"10.1109/ICASS.2018.8651950","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8651950","url":null,"abstract":"Fault supervision in stand-alone photovoltaic system is one of the most important task to increase the reliability, efficiencies and safety. This paper proposes a fault detection and identification of a stand-alone photovoltaic system based on feed forward Artificial Neural Network (ANN). The input network consist simply of current and voltage for PV, Battery and load. Two consequent ANN are developed respectively, for detection and diagnosis using a real data issued from experimental stand-alone photovoltaic system installed at LREA in the University of Médéa, Algeria. The results show a high rate of good classification for both detection and diagnosis network, which reveals the effectiveness of the proposed method.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128804238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICASS.2018.8652057
Hamza Kheddar, D. Megías, M. Bouzid
In this paper, a novel steganographic technique based on hiding a secret speech, coded with a 2.4 kbps Mixed Excitation Linear Prediction (MELP) speech coder, in another (cover) speech bitstream, also coded with the MELP coder, is presented. First, the secret speech is embedded in the Fourier magnitude (FM) MELP parameter using an LSB method. Second, a necessary parameter for message extraction, the amount of embedded bits (AEB), is also transmitted in the stego speech using some of the fields of MELP frame. In addition, we provide a mechanism for re-synchronization in case of packet loss. The performance of the method is shown experimentally against a Support Vector Machine (steganalyzer). The accuracy of such steganalyzer is around 50%, i.e. equivalent to random guessing. Finally, we also provide transparency results for the stego speech. Although transparency is not usually a requirement in steganographic applications, the proposed method may also be used for other data hiding applications that require good fidelity.
{"title":"Fourier magnitude-based steganography for hiding 2.4 kbpsMELP secret speech","authors":"Hamza Kheddar, D. Megías, M. Bouzid","doi":"10.1109/ICASS.2018.8652057","DOIUrl":"https://doi.org/10.1109/ICASS.2018.8652057","url":null,"abstract":"In this paper, a novel steganographic technique based on hiding a secret speech, coded with a 2.4 kbps Mixed Excitation Linear Prediction (MELP) speech coder, in another (cover) speech bitstream, also coded with the MELP coder, is presented. First, the secret speech is embedded in the Fourier magnitude (FM) MELP parameter using an LSB method. Second, a necessary parameter for message extraction, the amount of embedded bits (AEB), is also transmitted in the stego speech using some of the fields of MELP frame. In addition, we provide a mechanism for re-synchronization in case of packet loss. The performance of the method is shown experimentally against a Support Vector Machine (steganalyzer). The accuracy of such steganalyzer is around 50%, i.e. equivalent to random guessing. Finally, we also provide transparency results for the stego speech. Although transparency is not usually a requirement in steganographic applications, the proposed method may also be used for other data hiding applications that require good fidelity.","PeriodicalId":358814,"journal":{"name":"2018 International Conference on Applied Smart Systems (ICASS)","volume":"383 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124763222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}