Information hiding in speech signal for secure communication

In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret...

Descripción completa

Detalles Bibliográficos
Otros Autores: Zhijun, Wu, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Oxford, [England] ; Waltham, Massachusetts : Syngress 2015.
Edición:First edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628216306719
Tabla de Contenidos:
  • Cover; Title Page; Copyright Page; Contents; Preface; Objectives; Organization of the Book; Characteristics of the Book; New idea of speech secure communication; Newly proposed speech information hiding technology; Potential Readers of the Book; Acknowledgments; Overview; Chapter 1 - Introduction; 1.1 - Background; 1.1.1 - Progress in Secure Communication; 1.1.2 - A New Technique for Secure Communication: Information Hiding; 1.1.2.1 - Basic Concepts of Information Hiding; 1.1.2.2 - Basic Principles and Classifications; Covert Channel; Steganography; Anonymity; Copyright Marking
  • Digital WatermarkingData Hiding and Data Embedding; Fingerprinting and Labeling; Steganography; Copyright Protection for Digital Media; 1.1.2.3 - Applications of Information Hiding; Data Confidentiality; Copyright Protection; Nonrepudiation; Antifake; Data Integrity; 1.1.2.4 - Characteristics of Information Hiding; 1.2 - Introduction to Speech Coding; 1.2.1 - Basic Principles of Speech Coding; 1.2.1.1 - Redundancy of Speech Signals; 1.2.1.2 - Two Types of Coding Methods; 1.2.2 - Speech Coding Standards; 1.2.2.1 - Subjective Evaluation Method; 1.2.2.2 - Objective Evaluation Method
  • 1.3 - Related Work1.4 - Analysis of Available Information Hiding Methods; 1.4.1 - Least Significant Bit; 1.4.2 - Phase Hiding Method; 1.4.3 - Echo Hiding Method; 1.4.4 - Hiding Method Based on Statistics; 1.4.5 - Transform Domain Method; 1.5 - Organization of This Book; Chapter 2 - The Information Hiding Model for Speech Secure Communication; 2.1 - Introduction and Motivation; 2.2 - Model of Information Hiding as a Communication Problem; 2.3 - Speech Information Hiding Model; 2.3.1 - Hiding Capacity; 2.3.2 - Security; 2.3.3 - Speech Quality; 2.3.3.1 - Uniform correlation coefficient ρ
  • 2.3.3.2 - Segment average SNR2.3.3.3 - Speech energy variation d; 2.3.3.4 - Segment average Itakura distance DM; 2.4 - Experiments and Results Analysis; 2.4.1 - Hiding Capacity; 2.4.2 - Security; 2.4.3 - Speech Quality; 2.5 - Summary; Chapter 3 - The ABS Speech Information Hiding Algorithm Based on Filter Similarity; 3.1 - Introduction and Motivation; 3.1.1 - Brief Introduction to the ABS Scheme; 3.1.1.1 - Basic Principles of LPC; 3.1.1.2 - ABS Coding Based on LPC; 3.1.2 - Analysis of the ABS Scheme; 3.1.2.1 - Frame Similarity; 3.1.2.2 - Vector Codebooks; 3.2 - Filter Similarity
  • 3.3 - LPC Coefficient Substitution Based on Filter Similarity3.3.1 - LPC Substitution Algorithm; 3.3.2 - Multicodebook; 3.4 - Secret Speech Information Hiding and Extraction Algorithm; 3.4.1 - Speech Information Hiding Algorithm; 3.4.2 - Speech Information Extraction Algorithm; 3.5 - Experimental Results and Analysis; 3.5.1 - Selection of Test Parameters; 3.5.2 - Experimental Results; 3.5.3 - Calculation Complexity; 3.5.4 - Speech Quality; 3.6 - Summary; Chapter 4 - The G.721-Based Speech Information Hiding Approach; 4.1 - Introduction to the G.721 Coding Standard
  • 4.1.1 - Differential Pulse Code Modulation