Information Hiding in Speech Signals for Secure Communication

Author: Wu   Zhijun  

Publisher: Elsevier Science‎

Publication year: 2014

E-ISBN: 9780128014813

P-ISBN(Paperback): 9780128013281

P-ISBN(Hardback):  9780128013281

Subject: TN918.6 保密通信:按结构原理分

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more.

This book shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN.

  • Presents information hiding theory and the mathematical model used for information hiding in speech.
  • Provides a number of

Chapter

Organization of the Book

Characteristics of the Book

New idea of speech secure communication

Newly proposed speech information hiding technology

Potential Readers of the Book

Acknowledgments

Overview

Chapter 1 - Introduction

1.1 - Background

1.1.1 - Progress in Secure Communication

1.1.2 - A New Technique for Secure Communication: Information Hiding

1.1.2.1 - Basic Concepts of Information Hiding

1.1.2.2 - Basic Principles and Classifications

Covert Channel

Steganography

Anonymity

Copyright Marking

Digital Watermarking

Data Hiding and Data Embedding

Fingerprinting and Labeling

Steganography

Copyright Protection for Digital Media

1.1.2.3 - Applications of Information Hiding

Data Confidentiality

Copyright Protection

Nonrepudiation

Antifake

Data Integrity

1.1.2.4 - Characteristics of Information Hiding

1.2 - Introduction to Speech Coding

1.2.1 - Basic Principles of Speech Coding

1.2.1.1 - Redundancy of Speech Signals

1.2.1.2 - Two Types of Coding Methods

1.2.2 - Speech Coding Standards

1.2.2.1 - Subjective Evaluation Method

1.2.2.2 - Objective Evaluation Method

1.3 - Related Work

1.4 - Analysis of Available Information Hiding Methods

1.4.1 - Least Significant Bit

1.4.2 - Phase Hiding Method

1.4.3 - Echo Hiding Method

1.4.4 - Hiding Method Based on Statistics

1.4.5 - Transform Domain Method

1.5 - Organization of This Book

Chapter 2 - The Information Hiding Model for Speech Secure Communication

2.1 - Introduction and Motivation

2.2 - Model of Information Hiding as a Communication Problem

2.3 - Speech Information Hiding Model

2.3.1 - Hiding Capacity

2.3.2 - Security

2.3.3 - Speech Quality

2.3.3.1 - Uniform correlation coefficient ρ

2.3.3.2 - Segment average SNR

2.3.3.3 - Speech energy variation d

2.3.3.4 - Segment average Itakura distance DM

2.4 - Experiments and Results Analysis

2.4.1 - Hiding Capacity

2.4.2 - Security

2.4.3 - Speech Quality

2.5 - Summary

Chapter 3 - The ABS Speech Information Hiding Algorithm Based on Filter Similarity

3.1 - Introduction and Motivation

3.1.1 - Brief Introduction to the ABS Scheme

3.1.1.1 - Basic Principles of LPC

3.1.1.2 - ABS Coding Based on LPC

3.1.2 - Analysis of the ABS Scheme

3.1.2.1 - Frame Similarity

3.1.2.2 - Vector Codebooks

3.2 - Filter Similarity

3.3 - LPC Coefficient Substitution Based on Filter Similarity

3.3.1 - LPC Substitution Algorithm

3.3.2 - Multicodebook

3.4 - Secret Speech Information Hiding and Extraction Algorithm

3.4.1 - Speech Information Hiding Algorithm

3.4.2 - Speech Information Extraction Algorithm

3.5 - Experimental Results and Analysis

3.5.1 - Selection of Test Parameters

3.5.2 - Experimental Results

3.5.3 - Calculation Complexity

3.5.4 - Speech Quality

3.6 - Summary

Chapter 4 - The G.721-Based Speech Information Hiding Approach

4.1 - Introduction to the G.721 Coding Standard

4.1.1 - Differential Pulse Code Modulation

4.1.2 - Adaptive Schemes

4.1.2.1 - Forward Gain-Adaptive Quantizer

4.1.2.2 - Backward Gain-Adaptive Quantizer

4.1.2.3 - Adaptive Differential Pulse Code Modulation

4.2 - The Approach to Hide Secret Speech in G.721

4.2.1 - Embedding Algorithm

4.2.2 - Extraction Algorithm

4.3 - Experimental Results and Analysis

4.3.1 - Hiding Capacity

4.3.2 - Speech Quality

4.4 - Summary

Chapter 5 - The G.728-Based Speech Information Hiding Approach

5.1 - Code Excited Linear Prediction

5.1.1 - The CELP Speech Production Model

5.1.2 - Coding Principles

5.1.3 - Encoder Operation

5.1.4 - Perceptual Weighting

5.1.5 - Vector Quantization

5.2 - Introduction to the G.728 Coding Standard

5.3 - The CELP-Based Scheme of Speech Information Hiding and Extraction

5.3.1 - Embedding Scheme

5.3.2 - Extraction Scheme

5.4 - Approach to Hide Secret Speech in G.728

5.4.1 - Embedding Algorithm

5.4.2 - Extraction Algorithm

5.5 - Experimental Results and Analysis

5.6 - Summary

Chapter 6 - The G.729-Based Speech Information Hiding Approach

6.1 - Introduction to the G.729 Coding Standard

6.1.1 - Algebraic Codebook Structure

6.1.2 - Adaptive Codebook

6.1.2.1 - Perceptual Weighting Filter

6.1.2.2 - Open-Loop Pitch Period Estimation

6.1.2.3 - Search Range for Pitch Period

6.1.2.4 - Finding Integer Lag

6.1.2.5 - Finding Fractional Lag

6.1.3 - G.729 Coding Scheme

6.1.3.1 - Encoding Operations

6.1.3.2 - Decoding Operation

6.2 - The ACELP-Based Scheme of Speech Information Hiding and Extraction

6.2.1 - Embedding Scheme

6.2.2 - Extraction Scheme

6.3 - Approach to Hide Secret Speech in G.729

6.3.1 - Embedding Algorithm

6.3.2 - Extraction Algorithm

6.4 - EXPERIMENTAL Results and Analysis

6.5 - Summary

Chapter 7 - The GSM (RPE-LTP)-Based Speech Information Hiding Approach

7.1 - Introduction to the GSM (RPE-LTP) Coding Standard

7.1.1 - RPE-LTP Coding Scheme

7.1.1.1 - Multipulse Excitation Model

Open-Loop Method

Closed-Loop Method

7.1.1.2 - Characteristics of GSM (RPE-LTP) Coding Scheme

7.1.2 - GSM Coding Scheme

7.1.2.1 - Preprocessing

7.1.2.2 - LP Analysis

7.1.2.3 - LPC Quantization and Interpolation

7.1.2.4 - Prediction-Error Filter

7.1.2.5 - Long-Term LP Analysis, Filtering, and Coding

7.1.2.6 - Weighting Filter

7.1.2.7 - Position Selection

7.1.2.8 - APCM

7.1.2.9 - Excitation Generator

7.2 - Approach to Hide Secret Speech in GSM (RPE-LTP)

7.2.1 - Embedding Algorithm

7.2.2 - Extraction Algorithm

7.3 - Experimental Results and Analysis

7.4 - Summary

Chapter 8 - Covert Communication Based on the VoIP System

8.1 - Introduction to the VoIP-Based Covert Communication System

8.1.1 - Introduction to the VoIP System

8.1.2 - An Outline for VoIP Steganography

8.1.3 - Classifications of the Embedding Method

8.2 - Modeling and Realization of VoIP-Based Covert Communication

8.3 - Embedding Secret Speech into VoIP G.729 Speech Flows

8.3.1 - The CNT of G.729 Parameters

8.3.2 - Embedding Approach Based on Matrix Coding

n = 2L + 1

1. Embedding process

2. Extraction process

n > 2L + 1

8.3.3 - Embedding Procedure

8.3.3.1 - Embedding process

8.3.3.2 - Extraction process

8.3.4 - EXPERIMENTAL Results and Analysis

8.3.4.1 - Objective Quality

8.3.4.2 - Subjective Quality

8.4 - Summary

Chapter 9 - Design of Real-Time Speech Secure Communication over PSTN

9.1 - Secure Communication Plan

9.1.1 - Introduction

9.1.2 - Requirements Analysis

9.2 - Design and Realization of a Secure Communication System Based on PC

9.2.1 - Framework for Design

9.2.2 - Coding Scheme Selection

9.2.3 - Multimedia Programming

9.2.3.1 - Implementation Levels

9.2.3.2 - Program Flow

9.2.4 - System Realization

9.2.4.1 - RCC Communication Module

9.2.4.2 - Speech Collecting/Playing Module

9.2.4.3 - Speech encoding/decoding module

9.2.4.4 - Data Embedding/Extraction Module

9.2.4.5 - Data Encryption/Decryption Module

9.3 - Speech Information Hiding Telephony (SIHT) Based on PSTN

9.3.1 - Introduction

9.3.2 - Description of the SIHT

9.3.2.1 - Robustness of Information Hiding

9.3.2.2 - Steganography

9.3.2.3 - Secure Encryption

9.3.2.4 - Speech Quality

9.3.2.5 - Real Time

9.3.3 - Speech Information Hiding Scheme

9.3.4 - SIHT Module

9.3.4.1 - Speech Coder and Speech Decoder

9.3.4.2 - Encryption and Decryption

9.3.4.3 - E.Modem

9.3.4.4 - Hider and Extractor

9.3.5 - SIHT Operating Modes

9.3.6 - Architecture of SIHT

9.3.6.1 - Computational Load Distribution

9.3.6.2 - Architecture Details

9.4 - Summary

References

Index

The users who browse this book also browse