Information Hiding in Speech Signals for Secure Communication

Information Hiding in Speech Signals for Secure Communication
Author: Zhijun Wu
Publisher: Syngress
Total Pages: 200
Release: 2014-08-27
Genre: Computers
ISBN: 0128014814

Download Information Hiding in Speech Signals for Secure Communication Book in PDF, Epub and Kindle

In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more. This book shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN. Presents information hiding theory and the mathematical model used for information hiding in speech. Provides a number of methods to hide secret speech information using the most common digital speech coding standards. A combination of practice and theory enables programmers and system designers not only to implement tried and true encryption procedures, but also to consider probable future developments in their designs.

Methods of Covert Communication of Speech Signals Based on a Bio-inspired Principle

Methods of Covert Communication of Speech Signals Based on a Bio-inspired Principle
Author: Dora María Ballesteros Larrota
Publisher:
Total Pages: 186
Release: 2014
Genre:
ISBN:

Download Methods of Covert Communication of Speech Signals Based on a Bio-inspired Principle Book in PDF, Epub and Kindle

This work presents two speech hiding methods based on a bio-inspired concept known as the ability of adaptation of speech signals. A cryptographic model uses the adaptation to transform a secret message to a non-sensitive target speech signal, and then, the scrambled speech signal is an intelligible signal. The residual intelligibility is extremely low and it is appropriate to transmit secure speech signals. On the other hand, in a steganographic model, the adapted speech signal is hidden into a host signal by using indirect substitution or direct substitution. In the first case, the scheme is known as Efficient Wavelet Masking (EWM), and in the second case, it is known as improved-EWM (iEWM). While EWM demonstrated to be highly statistical transparent, the second one, iEWM, demonstrated to be highly robust against signal manipulations. Finally, with the purpose to transmit secure speech signals in real-time operation, a hardware-based scheme is proposed.

Digital Speech Transmission

Digital Speech Transmission
Author: Peter Vary
Publisher: John Wiley & Sons
Total Pages: 644
Release: 2006-08-04
Genre: Science
ISBN: 0470031751

Download Digital Speech Transmission Book in PDF, Epub and Kindle

The enormous advances in digital signal processing (DSP) technology have contributed to the wide dissemination and success of speech communication devices – be it GSM and UMTS mobile telephones, digital hearing aids, or human-machine interfaces. Digital speech transmission techniques play an important role in these applications, all the more because high quality speech transmission remains essential in all current and next generation communication networks. Enhancement, coding and error concealment techniques improve the transmitted speech signal at all stages of the transmission chain, from the acoustic front-end to the sound reproduction at the receiver. Advanced speech processing algorithms help to mitigate a number of physical and technological limitations such as background noise, bandwidth restrictions, shortage of radio frequencies, and transmission errors. Digital Speech Transmission provides a single-source, comprehensive guide to the fundamental issues, algorithms, standards, and trends in speech signal processing and speech communication technology. The authors give a solid, accessible overview of fundamentals of speech signal processing speech coding, including new speech coders for GSM and UMTS error concealment by soft decoding artificial bandwidth extension of speech signals single and multi-channel noise reduction acoustic echo cancellation This text is an invaluable resource for engineers, researchers, academics, and graduate students in the areas of communications, electrical engineering, and information technology.

Transform-Domain and Dsp Based Secure Speech Communication

Transform-Domain and Dsp Based Secure Speech Communication
Author: Jameel Ahmed
Publisher: LAP Lambert Academic Publishing
Total Pages: 252
Release: 2011-09
Genre:
ISBN: 9783845442549

Download Transform-Domain and Dsp Based Secure Speech Communication Book in PDF, Epub and Kindle

Secure speech communication has been of great significance in civil, commercial and particularly in military communication systems. Speech scramblers play a major role in these systems. Transform-domain, specially, DCT (Discrete Cosine Transform) based encryption of speech signals has often been a preferable choice for researchers. In such systems, besides security, removal of redundant information and execution speed of the algorithms have also been main focus of research and exploration. In this book, these three attributes, redundancy, speed and security are envisaged by exploiting ITU-T G.723.1 speech codec, Texas Instruments' 32-bit floating-point DSP TMS320C6711 and a newly developed DCT based algorithm using sub-framing and lookup table respectively. The vigorous results show that the original signal is compressed more than 90%, which helps in the removal of redundant information. To enhance the execution speed, G.723.1 codec is optimized on advanced level thereby reducing execution time from 299 msec to 140 msec. In respect of security, the newly introduced scheme yielded 0% residual intelligibility of the encrypted signal thereby rendering highest level of security.

Frontiers in Cyber Security

Frontiers in Cyber Security
Author: Guangquan Xu
Publisher: Springer Nature
Total Pages: 680
Release: 2020-11-05
Genre: Computers
ISBN: 9811597391

Download Frontiers in Cyber Security Book in PDF, Epub and Kindle

This book constitutes the proceedings of the Third International Conference on Frontiers in Cyber Security, FCS 2020, held in Tianjin, China*, in November 2020. The 39 full papers along with the 10 short papers presented were carefully reviewed and selected from 143 submissions. The papers are organized in topical sections on: IoT security; artificial intelligence; blockchain; cyber-physical systems security; cryptography; database security; depth estimation; mobile security; network security; privacy; program analysis; quantum cryptography; steganography; web security. *The conference was held virtually due to the COVID-19 pandemic.

Advanced Intelligent Computing Theories and Applications - With Aspects of Theoretical and Methodological Issues

Advanced Intelligent Computing Theories and Applications - With Aspects of Theoretical and Methodological Issues
Author: De-Shuang Huang
Publisher: Springer
Total Pages: 1402
Release: 2007-07-31
Genre: Computers
ISBN: 3540741712

Download Advanced Intelligent Computing Theories and Applications - With Aspects of Theoretical and Methodological Issues Book in PDF, Epub and Kindle

This volume, in conjunction with the two volumes CICS 0002 and LNAI 4682, constitutes the refereed proceedings of the Third International Conference on Intelligent Computing held in Qingdao, China, in August 2007. The 139 full papers published here were carefully reviewed and selected from among 2,875 submissions. Collectively, these papers represent some of the most important findings and insights into the field of intelligent computing.

Information Hiding

Information Hiding
Author: Fabien A. P. Petitcolas
Publisher: Springer Science & Business Media
Total Pages: 438
Release: 2003-01-21
Genre: Business & Economics
ISBN: 3540004211

Download Information Hiding Book in PDF, Epub and Kindle

This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Information Hiding, IH 2002, held in Noordwijkerhout, The Netherlands, in October 2002. The 27 revised full papers presented were carefully selected during two rounds of reviewing and revision from 78 submissions. The papers are organized in topical sections on information hiding and networking, anonymity, fundamentals of watermarking, watermarking algorithms, attacks on watermarking algorithms, steganography algorithms, steganalysis, and hiding information in unusual content.

Data Hiding

Data Hiding
Author: Michael T. Raggo
Publisher: Newnes
Total Pages: 269
Release: 2012-12-31
Genre: Computers
ISBN: 159749741X

Download Data Hiding Book in PDF, Epub and Kindle

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention. Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7 Dives deep into the less known approaches to data hiding, covert communications, and advanced malware Includes never before published information about next generation methods of data hiding Outlines a well-defined methodology for countering threats Looks ahead at future predictions for data hiding

Computer Vision: Concepts, Methodologies, Tools, and Applications

Computer Vision: Concepts, Methodologies, Tools, and Applications
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 2494
Release: 2018-02-02
Genre: Computers
ISBN: 1522552057

Download Computer Vision: Concepts, Methodologies, Tools, and Applications Book in PDF, Epub and Kindle

The fields of computer vision and image processing are constantly evolving as new research and applications in these areas emerge. Staying abreast of the most up-to-date developments in this field is necessary in order to promote further research and apply these developments in real-world settings. Computer Vision: Concepts, Methodologies, Tools, and Applications is an innovative reference source for the latest academic material on development of computers for gaining understanding about videos and digital images. Highlighting a range of topics, such as computational models, machine learning, and image processing, this multi-volume book is ideally designed for academicians, technology professionals, students, and researchers interested in uncovering the latest innovations in the field.

Intelligent Multidimensional Data Clustering and Analysis

Intelligent Multidimensional Data Clustering and Analysis
Author: Bhattacharyya, Siddhartha
Publisher: IGI Global
Total Pages: 471
Release: 2016-11-29
Genre: Computers
ISBN: 1522517774

Download Intelligent Multidimensional Data Clustering and Analysis Book in PDF, Epub and Kindle

Data mining analysis techniques have undergone significant developments in recent years. This has led to improved uses throughout numerous functions and applications. Intelligent Multidimensional Data Clustering and Analysis is an authoritative reference source for the latest scholarly research on the advantages and challenges presented by the use of cluster analysis techniques. Highlighting theoretical foundations, computing paradigms, and real-world applications, this book is ideally designed for researchers, practitioners, upper-level students, and professionals interested in the latest developments in cluster analysis for large data sets.