The concealment of speech signals, particularly within other speech signals, encompasses the integration of cryptographic techniques and steganographic methods. This literature review synthesizes current research findings and identifies existing gaps in knowledge, while also suggesting potential future research directions. In this paper, to enhance data security in speech transmission, a combination of steganography and cryptography is utilized. In the encryption phase, the Discrete Cosine Transform (DCT) is applied to frames of the speech signal. This phase involves scrambling time-domain samples, transform coefficients, and time-domain samples obtained from the inverse transform of the signal using a chaotic function that generates random numbers. In the steganography phase, the encrypted data replaces the low-value coefficients of the Discrete Wavelet Transform (DWT) of the host speech signal. To evaluate the proposed hybrid method, both qualitative and quantitative metrics were used. The results indicate a high level of various metric measures for the method.
Yesina, M.V.., Ostrianska, Ye.V.., & Gorbenko, I.. (2022). Status report on the third round of the NIST post-quantum cryptography standardization process. Radiotekhnika . http://doi.org/10.30837/rt.2022.3.210.05
Kumari, S.., Karuppiah, Marimuthu., Das, A.., Li, Xiong., Wu, Fan., & Kumar, Neeraj. (2017). A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. The Journal of Supercomputing , 74 , 6428 - 6453 . http://doi.org/10.1007/s11227-017-2048-0
Memon, I.., Hussain, Ibrar., Akhtar, Rizwan., & Chen, Gencai. (2015). Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme. Wireless Personal Communications , 84 , 1487 - 1508 . http://doi.org/10.1007/s11277-015-2699-1
Haeb-Umbach, R.., Watanabe, Shinji., Nakatani, T.., Bacchiani, M.., Hoffmeister, Björn., Seltzer, M.., Zen, H.., & Souden, M.. (2019). Speech Processing for Digital Home Assistants: Combining signal processing with deep-learning techniques. IEEE Signal Processing Magazine , 36 , 111-124 . http://doi.org/10.1109/MSP.2019.2918706
Chowdhary, C. L.., Patel, Pushpam Virenbhai., Kathrotia, Krupal Jaysukhbhai., Attique, M.., P, Kumaresan., & Ijaz, M.. (2020). Analytical Study of Hybrid Techniques for Image Encryption and Decryption. Sensors (Basel, Switzerland) , 20 . http://doi.org/10.3390/s20185162
Lee, Bong-Ki., & Chang, Joon‐Hyuk. (2016). Packet Loss Concealment Based on Deep Neural Networks for Digital Speech Transmission. IEEE/ACM Transactions on Audio, Speech, and Language Processing , 24 , 378-387 . http://doi.org/10.1109/TASLP.2015.2509780
Sathiyamurthi, Dr.., & Ramakrishnan, S.. (2017). Speech encryption using chaotic shift keying for secured speech communication. EURASIP Journal on Audio, Speech, and Music Processing , 2017 . http://doi.org/10.1186/s13636-017-0118-0
Zhou, Xinyi., Gong, Wei., Fu, W.., & Jin, L.. (2016). An improved method for LSB based color image steganography combined with cryptography. 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS) , 1-4 . http://doi.org/10.1109/ICIS.2016.7550955
Sadhukhan, Dipanwita., Ray, Sangram., Biswas, Gautam., Khan, M.., & Dasgupta, Mou. (2020). A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. The Journal of Supercomputing , 77 , 1114 - 1151 . http://doi.org/10.1007/s11227-020-03318-7
Saadi, S., Merrad, A., & Benzian, A. (2019). Novel secured scheme for blind audio/speech norm-space watermarking by Arnold algorithm. Signal Processing, 154, 74-96. https://doi.org/10.1016/j.sigpro.2018.08.011
Al-Najjar, A. J., Alvi, A., Idrees, S. U., & Al-Manea, A. (2007). Hiding encrypted speech using steganography. In Proceedings of the 7th WSEAS International Conference on Multimedia, Internet & Video Technologies (pp. 275-281). Beijing, China.
Peyvandi, H., & Park, S. J. (2011). Security in data communication and privacy in conversations for underwater wireless networks using scrambled speech scheme. In IEEE OCEANS 2011 (pp. 19-22). Waikoloa, HI. https://doi.org/10.23919/OCEANS.2011.6106900
Zghair, H. K., Mehdi, S. A., & Sadkhan, S. B. (2021). Speech scrambler based on discrete cosine transform and novel seven-dimension hyper chaotic system. Journal of Physics: Conference Series, 1804(1), 012048. https://doi.org/10.1088/1742-6596/1804/1/012048
Habib, Z., Khan, J. S., Ahmad, J., Muazzam, A. K., & Khan, A. F. (2017). Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In 4th International Conference on Electrical and Electronics Engineering (ICEEE). https://doi.org/10.1109/ICEEE2.2017.7935827
Enayatifar, R., Abdullah, A. H., & Isnin, I. F. (2014). Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics and Lasers in Engineering, 56, 83-93. https://doi.org/10.1016/j.optlaseng.2013.12.003
Shirazi,J. (2021). Concealment of Speech Signals within Speech by Combining Cryptography and Steganography. Transactions on Machine Intelligence, 4(3), 109-117. doi: 10.47176/TMI.2021.109
MLA
Shirazi,J. . "Concealment of Speech Signals within Speech by Combining Cryptography and Steganography", Transactions on Machine Intelligence, 4, 3, 2021, 109-117. doi: 10.47176/TMI.2021.109
HARVARD
Shirazi J. (2021). 'Concealment of Speech Signals within Speech by Combining Cryptography and Steganography', Transactions on Machine Intelligence, 4(3), pp. 109-117. doi: 10.47176/TMI.2021.109
CHICAGO
J. Shirazi, "Concealment of Speech Signals within Speech by Combining Cryptography and Steganography," Transactions on Machine Intelligence, 4 3 (2021): 109-117, doi: 10.47176/TMI.2021.109
VANCOUVER
Shirazi J. Concealment of Speech Signals within Speech by Combining Cryptography and Steganography. Trans. Mach. Intell., 2021; 4(3): 109-117. doi: 10.47176/TMI.2021.109