Two Level Security Implementation for Voice Data Transmission

被引:0
|
作者
Patel, Rupa [1 ]
Shrawankar, Urmila [1 ]
机构
[1] GH Raisoni Coll Engn, Dept Comp Sci & Engn, Nagpur, Maharashtra, India
来源
PROCEEDINGS OF THE 2012 FIFTH INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING AND TECHNOLOGY (ICETET 2012) | 2012年
关键词
Auditory masking; energy normalization; pitch normalization; secure data; security issue; speaker normalization; speech watermarking; VTLN;
D O I
10.1109/ICETET.2012.54
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper addresses two security challenges faced by many while transmitting confidential voice message. First, how to protect confidential message content against unauthorized access and second, how to protect information about the speakers personality. Presented work provides solution to these issues using hybrid approach. The former issue is handled by speech watermarking while speaker normalization deals with latter. The method initially normalizes speech signal containing secret information by modifying the speaker voice acoustic characteristics which is further processed to incorporate additional security measure and then it is embedded in high frequency components of the host signal using the human auditory system (HAS) properties and concept of blind, invisible watermarking approach. Reverse practice is followed to get the intended confidential message. This scheme has been evaluated and results of test shows that the approach does not degrade the quality of host signal and ensures reasonably excellent security. Technique can be used in any domain where secure transmission of the information is important.
引用
收藏
页码:243 / 247
页数:5
相关论文
共 50 条
  • [1] Data Transmission via GSM Voice Channel for End to End Security
    Ozkan, Mehmet Akif
    Ors, S. Berna
    2015 IEEE 5TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - BERLIN (ICCE-BERLIN), 2015, : 378 - 382
  • [2] Design and implementation of battlefield voice and data transmission module based on ZigBee
    School of Automation, Beijing Institute of Technology, Beijing
    100081, China
    Beijing Ligong Daxue Xuebao, 10 (1050-1055): : 1050 - 1055
  • [3] VOICE AND DATA TRANSMISSION.
    Abbiate, J.C.
    Montanari, G.
    Poulet, A.
    IBM technical disclosure bulletin, 1984, 27 (1 B): : 524 - 525
  • [4] VOICE AND DATA-TRANSMISSION
    ARREDONDO, GA
    FEGGELER, JC
    SMITH, JI
    BELL SYSTEM TECHNICAL JOURNAL, 1979, 58 (01): : 97 - 122
  • [5] SIMULTANEOUS TRANSMISSION OF VOICE AND DATA
    DURAND, A
    GALAND, C
    REVUE DE PHYSIQUE APPLIQUEE, 1984, 19 (02): : 121 - 126
  • [6] Security at the data level
    Caldwell, T., 1600, Elsevier Ltd (2013):
  • [7] IMPLEMENTATION OF MOVING TDM SLOTS FOR VOICE TRANSMISSION ON ETHERNET
    GIRMA, D
    DUNLOP, J
    MICROPROCESSORS AND MICROSYSTEMS, 1985, 9 (09) : 427 - 431
  • [8] Double security level in a telecommunication system based on phase coding and false data transmission
    Wacogne, B
    Jackson, MD
    Fisher, NE
    Podoleanu, A
    Jackson, DA
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 1996, 14 (05) : 665 - 670
  • [9] Voice over ATM: Integrating voice and data transmission in DSL.
    Langdon, G
    COMMUNICATIONS NEWS, 2000, 37 (04): : 50 - +
  • [10] Feature analysis of the transmission of voice/data in a frame
    Sun, XJ
    Gao, Y
    Meng, TG
    He, PL
    Gong, L
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1076 - 1078