Hybridization of speech information hiding and encryption for double-layer security in speech communication

被引:0
|
作者
Galajit, Kasorn [1 ,2 ,3 ]
Karnjana, Jessada [2 ]
Aimmanee, Pakinee [3 ]
Unoki, Masashi [1 ]
机构
[1] Japan Adv Inst Sci & Technol, Nomi, Ishikawa, Japan
[2] Natl Sci & Technol Dev Agcy, NECTEC, Pathum Thani, Thailand
[3] Thammasat Univ, Sirindhorn Int Inst Technol, Pathum Thani, Thailand
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Speech transmitted over communication systems must be highly secured since they are vulnerable to attacks. In this study, we use the singular spectrum analysis (SSA)-based information hiding method with the transformation method to boost security for speech communication. Arnold transformation is performed on watermark signals to provide secured watermarks. The secured watermarks are then embedded into the host signal using SSA-based information hiding to obtain a watermarked signal. The watermarked signal is encrypted before being sent through a communication channel. The experimental results show that effective encryption and information hiding are feasible. The key sensitivity and the discrepancy between the watermarked speech signal and its encrypted version measured using the correlation coefficient and the signal-to-noise ratio suggest that only the authorized person who has the encryption key will be able to access the speech's contents. A secured watermark signal's imperceptibility and a high bit error rate without a watermark key indicate hidden information is limited in access. This hybridized system provides speech security and selectively grants access to data at varying levels.
引用
收藏
页码:1634 / 1639
页数:6
相关论文
共 50 条
  • [1] A Robust Encryption Method for Speech Data Hiding in Digital Images for Optimized Security
    Kulkarni, Sheetal A.
    Patil, Shubhangi B.
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [2] Information hiding technique based speech secure communication over PSTN
    Wu, ZJ
    Hu, Y
    Niu, XX
    Duan, HX
    Li, X
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (01): : 108 - 112
  • [3] A NOVEL APPROACH OF SECURE COMMUNICATION BASED ON THE TECHNIQUE OF SPEECH INFORMATION HIDING
    Wu Zhijun Duan Haixin Li Xing Network Research Center Tsinghua University Beijing China Tianjin Key Lab for Advanced Signal Processing Civil Aviation University of China Tianjin Chinaz
    JournalofElectronics, 2006, (02) : 304 - 309
  • [4] A NOVEL APPROACH OF SECURE COMMUNICATION BASED ON THE TECHNIQUE OF SPEECH INFORMATION HIDING
    Wu Zhijun Duan Haixin Li Xing (Network Research Center
    Journal of Electronics(China), 2006, (02) : 304 - 309
  • [5] Design of speech information hiding telephone
    Wu, ZJ
    Niu, XX
    Yang, YX
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 113 - 116
  • [6] The concept of hate speech as a threat to the information security of Internet communication
    Galyashina, E., I
    Nikishin, V. D.
    VESTNIK OF SAINT PETERSBURG UNIVERSITY-LAW-VESTNIK SANKT-PETERBURGSKOGO UNIVERSITETA-PRAVO, 2021, 12 (03): : 555 - 573
  • [7] Novel Speech Secure Communication System Based on Information Hiding and Compressed Sensing
    Xu, Tingting
    Yang, Zhen
    Shao, Xi
    2009 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND NETWORKS COMMUNICATIONS (ICSNC 2009), 2009, : 201 - 206
  • [8] Speech encryption using chaotic shift keying for secured speech communication
    P. Sathiyamurthi
    S. Ramakrishnan
    EURASIP Journal on Audio, Speech, and Music Processing, 2017
  • [9] Speech encryption using chaotic shift keying for secured speech communication
    Sathiyamurthi, P.
    Ramakrishnan, S.
    EURASIP JOURNAL ON AUDIO SPEECH AND MUSIC PROCESSING, 2017,
  • [10] Speech information hiding in G.729
    Wu Zhijun
    Yang Wei
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (03): : 545 - 549