Showing 1 - 6 results of 6 for search 'collected speech decoding', query time: 0.05s Refine Results
  1. 1
  2. 2

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  3. 3
  4. 4

    COMMUNICATIVE AND PRAGMATIC PARAMETERS OF THE BLOG AS A GENRE OF PERSONAL INTERNET COMMUNICATION (BASED ON TEXTS BY LYUDMILA LINNYK ON THE WEBSITE “GALICIAN CORRESPONDENT”) by Nataliia Ya. Ivanyshyn

    Published 2021-06-01
    “…They can acquire additional meanings in the process of unfolding the text, form an evaluative frame of the message, and facilitate the decoding of blog posts in the manner defined by the author mainstream. …”
    Get full text
    Article
  5. 5
  6. 6

    Toxicity on Social Media During the 2022 Mpox Public Health Emergency: Quantitative Study of Topical and Network Dynamics by Lizhou Fan, Lingyao Li, Libby Hemphill

    Published 2024-12-01
    “… BackgroundToxicity on social media, encompassing behaviors such as harassment, bullying, hate speech, and the dissemination of misinformation, has become a pressing social concern in the digital age. …”
    Get full text
    Article