TITLE

Real-time and MPEG-1 layer III compression resistant steganography in speech

AUTHOR(S)
Shirali-Shahreza, M. H.; Shirali-Shahreza, S.
PUB. DATE
March 2010
SOURCE
IET Information Security;Mar2010, Vol. 4 Issue 1, p1
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Embedding a secret message into a cover media without attracting any attention, known as steganography, is one of the methods used for hidden communication purposes. One of the cover media that can be used for steganography is speech. In this study, the authors propose a new steganography method in speech signals. In this method, the silence intervals of speech are found and the length (number of samples) of these intervals is changed to hide information. The main feature of our method is robustness to MPEG-1 layer III (MP3) compression. This method can hide information in a speech stream with very low processing time which makes it a real-time steganography method. The hiding capacity of our method is comparable with other MP3 resistance methods and the listening tests show that the degradation in speech quality is not annoying. Additionally, the effect of our method on chaotic features is negligible, so it is difficult to detect our method with chaotic-based steganalysis methods.
ACCESSION #
47321999

 

Related Articles

  • Efficient Isogeny Computations on Twisted Edwards Curves. Kim, Suhri; Yoon, Kisoon; Kwon, Jihoon; Hong, Seokhie; Park, Young-Ho // Security & Communication Networks;7/15/2018, p1 

    The isogeny-based cryptosystem is the most recent category in the field of postquantum cryptography. However, it is widely studied due to short key sizes and compatibility with the current elliptic curve primitives. The main building blocks when implementing the isogeny-based cryptosystem are...

  • Modification Detection Code.  // Network Dictionary;2007, p316 

    An encyclopedia entry for "Modification Detection Code" (MDC) is presented. MDC is synonym for manipulation detection code that is a bit string, in cryptosystems, that is a function of data to which it is attached for the purpose of manipulation detection. It is important that the function used...

  • Modification Detection Code.  // Network Dictionary;2007, p316 

    A definition of the term "Modification Detection Code" is presented. This refers to a short piece of cryptographic checksums used to authenticate a message. It is also considered integrity check-values, message integrity code, or message authentication code.

  • A variant of Baptista's encryption scheme. Kanso, Ali; Ghebleh, M.; Noura, Hassan // Security & Communication Networks;Dec2015, Vol. 8 Issue 18, p3701 

    The idea of employing chaotic maps in building encryption schemes has attracted the attention of many researchers since the late 1980s. In 1998, M.S. Baptista proposed an elegant encryption scheme based on a one-dimensional chaotic map. Many variants of this scheme have been proposed. Baptista's...

  • Tightly Secure Lossy Trapdoor Functions: Constructions and Applications. Qin, Baodong // Security & Communication Networks;1/16/2019, p1 

    Lossy trapdoor functions (LTFs), introduced by Peiker and Waters in STOC'08, are functions that may be working in another injective mode or a lossy mode. Given such a function key, it is impossible to distinguish an injective key from a lossy key for any (probabilistic) polynomial-time...

  • ElGamal Cryptosystem with Embedded Compression-Crypto Technique. Mandangan, Arif; Lee Souk Yin; Chang Ee Hung; Che Haziqah Che Hussin // AIP Conference Proceedings;2014, Vol. 1635, p455 

    Key distribution problem in symmetric cryptography has been solved by the emergence of asymmetric cryptosystem. Due to its mathematical complexity, computation efficiency becomes a major problem in the real life application of asymmetric cryptosystem. This scenario encourage various researches...

  • An Approach of Quantum Steganography through Special SSCE Code. Banerjee, Indradip; Bhattacharyya, Souvik; Sanyal, Gautam // World Academy of Science, Engineering & Technology;Aug2011, Issue 56, p939 

    Encrypted messages sending frequently draws the attention of third parties, perhaps causing attempts to break and reveal the original messages. Steganography is introduced to hide the existence of the communication by concealing a secret message in an appropriate carrier like text, image, audio...

  • Linear cryptanalysis for a chaos-based stream cipher. Ruming Yin; Jian Yuan; Qiuhua Yang; Xiuming Shan; Xiqin Wang1 // World Academy of Science, Engineering & Technology;Dec2009, Issue 36, p799 

    Linear cryptanalysis methods are rarely used to improve the security of chaotic stream ciphers. In this paper, we apply linear cryptanalysis to a chaotic stream cipher which was designed by strictly using the basic design criterion of cryptosystem - confusion and diffusion. We show that this...

  • Digital Files' Quality Suffers. Saxe, Frank // Billboard;05/26/2001, Vol. 113 Issue 21, p77 

    Discusses the sound quality of digital music files. View that the convenience of digital music files often comes at the expense of sound quality; How the trend towards subscription-based digital music services may increase the pressure to improve quality; Compression of transmission content in...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics