Javascript must be enabled to continue!
Methods of covert communication of speech signals based on a bio-inspired principle
View through CrossRef
This work presents two speech hiding methods based on a bio-inspired concept known as the ability of adaptation of speech signals. A cryptographic model uses the adaptation to transform a secret message to a non-sensitive target speech signal, and then, the scrambled speech signal is an intelligible signal. The residual intelligibility is extremely low and it is appropriate to transmit secure speech signals. On the other hand, in a steganographic model, the adapted speech signal is hidden into a host signal by using indirect substitution or direct substitution. In the first case, the scheme is known as Efficient Wavelet Masking (EWM), and in the second case, it is known as improved-EWM (iEWM). While EWM demonstrated to be highly statistical transparent, the second one, iEWM, demonstrated to be highly robust against signal manipulations. Finally, with the purpose to transmit secure speech signals in real-time operation, a hardware-based scheme is proposed
Esta tesis presenta dos métodos de comunicación encubierta de señales de voz utilizando un concepto bio-inspirado, conocido como la “habilidad de adaptación de señales de voz”. El modelo de criptografía utiliza la adaptación para transformar un mensaje secreto a una señal de voz no confidencial, obteniendo una señal de voz encriptada legible. Este método es apropiado para transmitir señales de voz seguras porque en la señal encriptada no quedan rastros del mensaje secreto original. En el caso de esteganografía, la señal de voz adaptada se oculta en una señal de voz huésped, utilizando sustitución directa o indirecta. En el primer caso el esquema se denomina EWM y en el segundo caso iEWM. EWM demostró ser altamente transparente, mientras que iEWM demostró ser altamente robusto contra manipulaciones de señal. Finalmente, con el propósito de transmitir señales de voz seguras en tiempo real, se propone un esquema para dispositivos hardware.
Title: Methods of covert communication of speech signals based on a bio-inspired principle
Description:
This work presents two speech hiding methods based on a bio-inspired concept known as the ability of adaptation of speech signals.
A cryptographic model uses the adaptation to transform a secret message to a non-sensitive target speech signal, and then, the scrambled speech signal is an intelligible signal.
The residual intelligibility is extremely low and it is appropriate to transmit secure speech signals.
On the other hand, in a steganographic model, the adapted speech signal is hidden into a host signal by using indirect substitution or direct substitution.
In the first case, the scheme is known as Efficient Wavelet Masking (EWM), and in the second case, it is known as improved-EWM (iEWM).
While EWM demonstrated to be highly statistical transparent, the second one, iEWM, demonstrated to be highly robust against signal manipulations.
Finally, with the purpose to transmit secure speech signals in real-time operation, a hardware-based scheme is proposed
Esta tesis presenta dos métodos de comunicación encubierta de señales de voz utilizando un concepto bio-inspirado, conocido como la “habilidad de adaptación de señales de voz”.
El modelo de criptografía utiliza la adaptación para transformar un mensaje secreto a una señal de voz no confidencial, obteniendo una señal de voz encriptada legible.
Este método es apropiado para transmitir señales de voz seguras porque en la señal encriptada no quedan rastros del mensaje secreto original.
En el caso de esteganografía, la señal de voz adaptada se oculta en una señal de voz huésped, utilizando sustitución directa o indirecta.
En el primer caso el esquema se denomina EWM y en el segundo caso iEWM.
EWM demostró ser altamente transparente, mientras que iEWM demostró ser altamente robusto contra manipulaciones de señal.
Finalmente, con el propósito de transmitir señales de voz seguras en tiempo real, se propone un esquema para dispositivos hardware.
Related Results
Evaluation of the timing covert channel capacity considering packet transfer time distribution
Evaluation of the timing covert channel capacity considering packet transfer time distribution
Lampson was the first to introduce a covert channel as a channel that was not designed for information transmission. The problem of information leakage via network covert channels ...
A Covert Timing Channels Data Encryption Sceme In Cloud Simulation
A Covert Timing Channels Data Encryption Sceme In Cloud Simulation
Covert Timing Channels (CTC) have become an impending network security problem as the sophistication and use of data exfiltration carried out by cyber-attacks has increased. Inter-...
Cortisol and Oxytocin Could Predict Covert Aggression in Some Psychotic Patients
Cortisol and Oxytocin Could Predict Covert Aggression in Some Psychotic Patients
Background: The covert or indirect type of aggression has a risk of converting in violent acts and, considering that, it is very important to identify it in order to apply effectiv...
Network Covert Channels
Network Covert Channels
With the rapid advancement of communication and computer network technologies, covert channels are now more secure, quicker to set up, harder to detect, and easier to design than e...
Assessment of the physical characteristics and fishing performance of gillnets using biodegradable resin (PBS/PBAT and PBSAT) to reduce ghost fishing
Assessment of the physical characteristics and fishing performance of gillnets using biodegradable resin (PBS/PBAT and PBSAT) to reduce ghost fishing
Abstract
Ghost fishing is caused by derelict synthetic‐fibre nets that have been lost at sea. Thus, biodegradable nets have been developed with the aim of protecting marine ecosy...
ANALISIS TUTURAN TRADISI UPACARA LADUNG BIO’ SUKU DAYAK KENYAH LEPO’ TAU DI DESA NAWANG BARU KECAMATAN KAYAN HULU KABUPATEN MALINAU: KAJIAN FOLKLOR
ANALISIS TUTURAN TRADISI UPACARA LADUNG BIO’ SUKU DAYAK KENYAH LEPO’ TAU DI DESA NAWANG BARU KECAMATAN KAYAN HULU KABUPATEN MALINAU: KAJIAN FOLKLOR
ABSTRAK Penulis tertarik mengajikan Tuturan Tradisi Upacara Ladung Bio’ Suku Dayak Kenyah Lepo’ Tau karena Upacara Ladung Bio’ adalah upcara Adat Dayak Kenyah yang sangat penting. ...
Speech, communication, and neuroimaging in Parkinson's disease : characterisation and intervention outcomes
Speech, communication, and neuroimaging in Parkinson's disease : characterisation and intervention outcomes
<p dir="ltr">Most individuals with Parkinson's disease (PD) experience changes in speech, voice or communication. Speech changes often manifest as hypokinetic dysarthria, a m...
Speech, communication, and neuroimaging in Parkinson's disease : characterisation and intervention outcomes
Speech, communication, and neuroimaging in Parkinson's disease : characterisation and intervention outcomes
<p dir="ltr">Most individuals with Parkinson's disease (PD) experience changes in speech, voice or communication. Speech changes often manifest as hypokinetic dysarthria, a m...

