Steganography of the Keys into an Encrypted Speech Signal using Matlab

被引:0
|
作者
Sharma, Divya [1 ]
Sharma, Deepshikha [2 ]
机构
[1] Panjab Univ, Swami Saravanad Giri Reg Ctr, Dept Informat Technol, Hoshiarpur, Punjab, India
[2] Accenture, Software Engn Team Lead, Gurgaon, India
关键词
steganography; cryptography; keys; hash; watermarking; multimedia data; crypto-stego signal;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper highlights the requirement for change in the security and privacy techniques available. In recent times, there have been advancements in the type of attacks possible to Computer systems. In order to meet these challenges, there has been a rise in the need to change the earlier used techniques for encrypting the speech signal. The paper proposes a secure and speedy technique for the cryptography of the speech signal and also performs steganography of the key pairs generate while encryption of the speech signal which is then sent to the receiver. This paper also includes experimental results for the proposed system.
引用
收藏
页码:721 / 724
页数:4
相关论文
共 50 条
  • [1] Hiding encrypted speech using steganography
    Al-Najjar, Atef J.
    Alvi, Aleem K.
    Idrees, Syed U.
    Al-Manea, Abdul-Rahman M.
    [J]. LECTURE NOTES IN SIGNAL SCIENCE, INTERNET AND EDUCATION (SSIP'07/MIV'07/DIWEB'07), 2007, : 275 - +
  • [2] Analysis of Encrypted ECG Signal in Steganography Using Wavelet Transforms
    Awasthi, Deepali
    Madhe, Swati
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 718 - 723
  • [3] Steganography of Speech Signal into an Image
    Sharma, Divya
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN ENGINEERING & COMPUTATIONAL SCIENCES (RAECS), 2015,
  • [4] Speech signal analysis, synthesis and recognition exercises using MATLAB
    King, RW
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL ENGINEERING EDUCATION, 1997, 34 (02) : 161 - 172
  • [5] Implementation of Speech Signal for Promoting Global Cyber Security using Steganography Technique
    Sinha, Tilendra Shishir
    Sanyal, Gautam
    [J]. IETE TECHNICAL REVIEW, 2007, 24 (05) : 413 - 419
  • [6] Implementation of speech signal for promoting global cyber security using steganography technique
    NIT, Durgapur, India
    不详
    不详
    [J]. IETE Tech Rev, 2007, 5 (413-419):
  • [7] Encryption of speech signal with multiple secret keys
    Slimani, Dalila
    Merazka, Fatiha
    [J]. 1ST INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE AND SPEECH PROCESSING, 2018, 128 : 79 - 88
  • [8] Video Steganography Using Encrypted Payload for Satellite Communication
    Thakkar, Swadhin
    Shivdikar, Kaustubh
    Warty, Chirag
    [J]. 2017 IEEE AEROSPACE CONFERENCE, 2017,
  • [9] Advanced Steganography Algorithm using Encrypted secret message
    Nath, Joyshree
    Nath, Asoke
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2011, 2 (03) : 19 - 24
  • [10] Highly Randomized Image Steganography using Secret Keys
    Dagar, Sunny
    [J]. 2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,