Skip to main content

2018 | OriginalPaper | Buchkapitel

13. Steganography, Forensics, and Security of Speech Signal

verfasst von : Mohamed Hesham Farouk

Erschienen in: Application of Wavelets in Speech Processing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wavelet filter banks for perfect reconstruction can help in retrieving a hidden signal. In the wavelet domain, different techniques are applied on the wavelet coefficients to increase the hiding capacity and perceptual transparency. In general, steganography in wavelet domain shows high hiding capacity and transparency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat D.M. Ballesteros, J.M. Moreno, Real-time, speech-in-speech hiding scheme based on least significant bit substitution and adaptive key. Comput. Electr. Eng. 39(4). Available online 5 March (2013) D.M. Ballesteros, J.M. Moreno, Real-time, speech-in-speech hiding scheme based on least significant bit substitution and adaptive key. Comput. Electr. Eng. 39(4). Available online 5 March (2013)
2.
Zurück zum Zitat J. Antony, C. Sobin, A. Sherly, Audio steganography in wavelet domain – A survey. Int. J. Comput. Appl. 52(13), 33–37 (2012) J. Antony, C. Sobin, A. Sherly, Audio steganography in wavelet domain – A survey. Int. J. Comput. Appl. 52(13), 33–37 (2012)
3.
Zurück zum Zitat N. Cvejic, T. Seppanen, A wavelet domain LSB insertion algorithm for high capacity audio steganography, in Proceedings of 2002 IEEE 10th Digital Signal Processing Workshop, 2002 and the IEEE 2nd Signal Processing Education Workshop, 2002 N. Cvejic, T. Seppanen, A wavelet domain LSB insertion algorithm for high capacity audio steganography, in Proceedings of 2002 IEEE 10th Digital Signal Processing Workshop, 2002 and the IEEE 2nd Signal Processing Education Workshop, 2002
4.
Zurück zum Zitat D.M. Ballesteros, J.M. Moreno, Highly transparent steganography model of speech signals using efficient wavelet masking. Expert Syst. Appl. 39(10), 9141–9149 (2012)CrossRef D.M. Ballesteros, J.M. Moreno, Highly transparent steganography model of speech signals using efficient wavelet masking. Expert Syst. Appl. 39(10), 9141–9149 (2012)CrossRef
5.
Zurück zum Zitat L. Shen, X. Li, H. Wang, R. Zhang, Speech hiding based on auditory wavelet, in Proceedings of International Conference on Computational Science and Its Applications – ICCSA 2004, Part IV, Assisi, Italy, 2004, pp. 414–420 L. Shen, X. Li, H. Wang, R. Zhang, Speech hiding based on auditory wavelet, in Proceedings of International Conference on Computational Science and Its Applications – ICCSA 2004, Part IV, Assisi, Italy, 2004, pp. 414–420
6.
Zurück zum Zitat R. Siwar, G. Driss, S. Sid-Ahmed, H. Habib, Speech Steganography using wavelet and Fourier transforms. EURASIP J. Audio Speech Music Process. 2012(20), 1–14 (2012) R. Siwar, G. Driss, S. Sid-Ahmed, H. Habib, Speech Steganography using wavelet and Fourier transforms. EURASIP J. Audio Speech Music Process. 2012(20), 1–14 (2012)
7.
Zurück zum Zitat D. Que, L. Lu, H. Wang, Y. Ding, A digital voice secure communication system based on logistic-mapping in wavelet domain chaotic modulation. 7th Int. Conf Signal Process. 2004, ICSP '04 3, 2397–2400 (2004) D. Que, L. Lu, H. Wang, Y. Ding, A digital voice secure communication system based on logistic-mapping in wavelet domain chaotic modulation. 7th Int. Conf Signal Process. 2004, ICSP '04 3, 2397–2400 (2004)
8.
Zurück zum Zitat A. Azzazi, A real time secured voice framework using the totally reconstructed discrete wavelet transformation. Br. J. Math. Comput. Sci. 5(2), 190–203 (2014)CrossRef A. Azzazi, A real time secured voice framework using the totally reconstructed discrete wavelet transformation. Br. J. Math. Comput. Sci. 5(2), 190–203 (2014)CrossRef
9.
Zurück zum Zitat A. Al-Haj, An imperceptible and robust audio watermarking algorithm. EURASIP J. Audio Speech Music Process. 2014(1), 37 (2014)CrossRef A. Al-Haj, An imperceptible and robust audio watermarking algorithm. EURASIP J. Audio Speech Music Process. 2014(1), 37 (2014)CrossRef
10.
Zurück zum Zitat V. Balakrishnan, N. Borges, L. Parchment, Wavelet Denoising and Speech Enhancement (Department of Electrical and Computer Engineering, The Johns Hopkins University, Baltimore, Spring 2006) V. Balakrishnan, N. Borges, L. Parchment, Wavelet Denoising and Speech Enhancement (Department of Electrical and Computer Engineering, The Johns Hopkins University, Baltimore, Spring 2006)
11.
Zurück zum Zitat S.A.R. Mohammad Ali Nematollahi, F.Z. Al-Haddad, Blind digital speech watermarking based on Eigen-value quantization in DWT. J. King Saud University – Comput. Inf. Sci. 27(1), (2015) S.A.R. Mohammad Ali Nematollahi, F.Z. Al-Haddad, Blind digital speech watermarking based on Eigen-value quantization in DWT. J. King Saud University – Comput. Inf. Sci. 27(1), (2015)
12.
Zurück zum Zitat S. Ahani, S. Ghaemmaghami, Z.J. Wang, A sparse representation-based wavelet domain speech Steganography method. IEEE/ACM Trans Audio Speech Lang. Process. 23(1), 80–91 (2015) S. Ahani, S. Ghaemmaghami, Z.J. Wang, A sparse representation-based wavelet domain speech Steganography method. IEEE/ACM Trans Audio Speech Lang. Process. 23(1), 80–91 (2015)
13.
Zurück zum Zitat H. Hollien, R.H. Bahr, J.D. Harnsberger, Issues in forensic voice. J. Voice 28(2), 170–184 (2014)CrossRef H. Hollien, R.H. Bahr, J.D. Harnsberger, Issues in forensic voice. J. Voice 28(2), 170–184 (2014)CrossRef
14.
Zurück zum Zitat L.A. Khan, F. Iqbal, M.S. Baig, Speaker verification from partially encrypted compressed speech for forensic investigation. Digit. Investig. 7(1–2), 74–80 (2010)CrossRef L.A. Khan, F. Iqbal, M.S. Baig, Speaker verification from partially encrypted compressed speech for forensic investigation. Digit. Investig. 7(1–2), 74–80 (2010)CrossRef
15.
Zurück zum Zitat P. Kenny, G. Boulianne, P. Ouellet, P. Dumouchel, Speaker and session variability in GMM-based speaker verification. IEEE Trans Audio Speech Signal Process. 15(4), 1448–1460 (2007)CrossRef P. Kenny, G. Boulianne, P. Ouellet, P. Dumouchel, Speaker and session variability in GMM-based speaker verification. IEEE Trans Audio Speech Signal Process. 15(4), 1448–1460 (2007)CrossRef
16.
Zurück zum Zitat R. Vogt, S. Sridharan, Explicit modelling of session variability for speaker verification. Comput. Speech Lang. 22(1), 17–38 (2007)CrossRef R. Vogt, S. Sridharan, Explicit modelling of session variability for speaker verification. Comput. Speech Lang. 22(1), 17–38 (2007)CrossRef
17.
Zurück zum Zitat R.S. Holambe, M.S. Deshpande, Noise robust speaker identification: using nonlinear modeling techniques, in Forensic speaker recognition: law enforcement and counter-terrorism, ed. by H. Patil, A. Neustein, (Springer, New York, 2012), pp. 153–182 R.S. Holambe, M.S. Deshpande, Noise robust speaker identification: using nonlinear modeling techniques, in Forensic speaker recognition: law enforcement and counter-terrorism, ed. by H. Patil, A. Neustein, (Springer, New York, 2012), pp. 153–182
18.
Zurück zum Zitat L. Lei, S. Kun, Speaker recognition using wavelet cepstral coefficient, i-vector, and cosine distance scoring and its application for forensics. J. Electr. Comput. Eng. 2016, 11 (2016)CrossRef L. Lei, S. Kun, Speaker recognition using wavelet cepstral coefficient, i-vector, and cosine distance scoring and its application for forensics. J. Electr. Comput. Eng. 2016, 11 (2016)CrossRef
19.
Zurück zum Zitat Ömer Eskidere, Source digital voice recorder identification by wavelet analysis. Int. J Artif. Intell. Tools 25(3), 1–19 (2016) Ömer Eskidere, Source digital voice recorder identification by wavelet analysis. Int. J Artif. Intell. Tools 25(3), 1–19 (2016)
Metadaten
Titel
Steganography, Forensics, and Security of Speech Signal
verfasst von
Mohamed Hesham Farouk
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-69002-5_13

Neuer Inhalt