Hiding encrypted speech using steganography

被引:0
|
作者
Al-Najjar, Atef J. [1 ]
Alvi, Aleem K. [1 ]
Idrees, Syed U. [1 ]
Al-Manea, Abdul-Rahman M. [1 ]
机构
[1] King Fahd Univ Petr & Minerals, Dept Comp Engn, KFUPM Box 1727, Dhahran 31261, Saudi Arabia
关键词
speech compression; symmetric and asymmetric encryption; steganography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we have proposed a cryptosystem using state of the art technology. We used the minimum possible compressed speech file for encryption. Additionally we applied data compression to speech files and added further compression. Then we applied data encryption techniques to minimize security threats. We applied the symmetric and asymmetric encryption algorithms to the compressed speech files. This was followed by hiding these files into cover images using steganography. This camouflages the secret data and reduces chances of eavesdropping. By using compression, the capacity has been increased. However, after applying encryption, the size of the encrypted data becomes much greater than the input file size, therefore hiding it in a cover demands more capacity. We have analyzed the size of the cipher texts of the compressed speech data for further enhancement of the capacity.
引用
收藏
页码:275 / +
页数:3
相关论文
共 50 条
  • [1] Steganography of the Keys into an Encrypted Speech Signal using Matlab
    Sharma, Divya
    Sharma, Deepshikha
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 721 - 724
  • [2] Steganography with High Reconstruction Robustness: Hiding of Encrypted Secret Images
    Zhu, Xishun
    Lai, Zhengliang
    Zhou, Nanrun
    Wu, Jianhua
    [J]. MATHEMATICS, 2022, 10 (16)
  • [3] Information hiding using steganography
    Amin, MM
    Salleh, M
    Ibrahim, S
    Katmin, MR
    Shamsuddin, MZI
    [J]. 4TH NATIONAL CONFERENCE ON TELECOMMUNICATION TECHNOLOGY, PROCEEDINGS, 2003, : 21 - 25
  • [4] AES-Based Steganography Using Blockchain: A Novel Approach for Secure Text Hiding in Encrypted Images
    Salim, Batool Arif
    Aljabery, Maalim A.
    Younis, Hameed Abdulkareem
    [J]. Informatica (Slovenia), 2024, 48 (21): : 67 - 78
  • [5] Reversible data hiding in encrypted images for coding channel based on adaptive steganography
    Yu, Kunliang
    Chen, Liquan
    Wang, Yu
    Han, Jinguang
    Zhang, Lejun
    [J]. IET IMAGE PROCESSING, 2020, 14 (16) : 4229 - 4239
  • [6] Information Hiding using Bucket Steganography
    Koptyra, Katarzyna
    Ogiela, Marek R.
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2021), 2021, : 292 - 293
  • [7] Data hiding using video steganography
    Ravichandran, C.
    Vajravelu, Ashok
    Panda, Sankarsan
    Degadwala, Sheshang Dipakkumar
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (01) : 112 - 123
  • [8] Advanced Algorithms in Audio Steganography for Hiding Human Speech Signal
    Skopin, Dmitriy E.
    El-Emary, Ibrahim M. M.
    Rasras, Rashad J.
    Diab, Ruba S.
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 3, 2010, : 29 - 32
  • [9] A survey on information hiding using video steganography
    Mukesh Dalal
    Mamta Juneja
    [J]. Artificial Intelligence Review, 2021, 54 : 5831 - 5895
  • [10] A survey on information hiding using video steganography
    Dalal, Mukesh
    Juneja, Mamta
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2021, 54 (08) : 5831 - 5895