Transactions on Machine Intelligence

Transactions on Machine Intelligence

Concealment of Speech Signals within Speech by Combining Cryptography and Steganography

Document Type : Original Article

Author
Assistant Professor, Department of Electrical Engineering, Gonabad Branch, Islamic Azad University, Razavi Khorasan, Gonabad, Iran
Abstract
The concealment of speech signals, particularly within other speech signals, encompasses the integration of cryptographic techniques and steganographic methods. This literature review synthesizes current research findings and identifies existing gaps in knowledge, while also suggesting potential future research directions. In this paper, to enhance data security in speech transmission, a combination of steganography and cryptography is utilized. In the encryption phase, the Discrete Cosine Transform (DCT) is applied to frames of the speech signal. This phase involves scrambling time-domain samples, transform coefficients, and time-domain samples obtained from the inverse transform of the signal using a chaotic function that generates random numbers. In the steganography phase, the encrypted data replaces the low-value coefficients of the Discrete Wavelet Transform (DWT) of the host speech signal. To evaluate the proposed hybrid method, both qualitative and quantitative metrics were used. The results indicate a high level of various metric measures for the method.
Keywords

  • Yin, Juan., Li, Yuhuai., Liao, Shengkai., Yang, Meng., Cao, Yuan., Zhang, Liang., Ren, Ji-Gang., Cai, Wenqi., Liu, Weiyue., Li, Shuang-Lin., Shu, R.., Huang, Yongmei., Deng, Lei., Li, Li., Zhang, Qiang., Liu, Nai-Le., Chen, Yu-Ao., Lu, Chaoyang., Wang, Xiang-Bin., Xu, Feihu., Wang, Jian-Yu., Peng, Cheng-Zhi., Ekert, A.., & Pan, Jian-Wei. (2020). Entanglement-based secure quantum cryptography over 1,120 kilometres. Nature , 582 , 501 - 505 . http://doi.org/10.1038/s41586-020-2401-y
  • Yesina, M.V.., Ostrianska, Ye.V.., & Gorbenko, I.. (2022). Status report on the third round of the NIST post-quantum cryptography standardization process. Radiotekhnika . http://doi.org/10.30837/rt.2022.3.210.05
  • Kumari, S.., Karuppiah, Marimuthu., Das, A.., Li, Xiong., Wu, Fan., & Kumar, Neeraj. (2017). A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. The Journal of Supercomputing , 74 , 6428 - 6453 . http://doi.org/10.1007/s11227-017-2048-0
  • Memon, I.., Hussain, Ibrar., Akhtar, Rizwan., & Chen, Gencai. (2015). Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme. Wireless Personal Communications , 84 , 1487 - 1508 . http://doi.org/10.1007/s11277-015-2699-1
  • Haeb-Umbach, R.., Watanabe, Shinji., Nakatani, T.., Bacchiani, M.., Hoffmeister, Björn., Seltzer, M.., Zen, H.., & Souden, M.. (2019). Speech Processing for Digital Home Assistants: Combining signal processing with deep-learning techniques. IEEE Signal Processing Magazine , 36 , 111-124 . http://doi.org/10.1109/MSP.2019.2918706
  • Chowdhary, C. L.., Patel, Pushpam Virenbhai., Kathrotia, Krupal Jaysukhbhai., Attique, M.., P, Kumaresan., & Ijaz, M.. (2020). Analytical Study of Hybrid Techniques for Image Encryption and Decryption. Sensors (Basel, Switzerland) , 20 . http://doi.org/10.3390/s20185162
  • Lee, Bong-Ki., & Chang, Joon‐Hyuk. (2016). Packet Loss Concealment Based on Deep Neural Networks for Digital Speech Transmission. IEEE/ACM Transactions on Audio, Speech, and Language Processing , 24 , 378-387 . http://doi.org/10.1109/TASLP.2015.2509780
  • Sathiyamurthi, Dr.., & Ramakrishnan, S.. (2017). Speech encryption using chaotic shift keying for secured speech communication. EURASIP Journal on Audio, Speech, and Music Processing , 2017 . http://doi.org/10.1186/s13636-017-0118-0
  • Zhou, Xinyi., Gong, Wei., Fu, W.., & Jin, L.. (2016). An improved method for LSB based color image steganography combined with cryptography. 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS) , 1-4 . http://doi.org/10.1109/ICIS.2016.7550955
  • Sadhukhan, Dipanwita., Ray, Sangram., Biswas, Gautam., Khan, M.., & Dasgupta, Mou. (2020). A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. The Journal of Supercomputing , 77 , 1114 - 1151 . http://doi.org/10.1007/s11227-020-03318-7
  • Saadi, S., Merrad, A., & Benzian, A. (2019). Novel secured scheme for blind audio/speech norm-space watermarking by Arnold algorithm. Signal Processing, 154, 74-96. https://doi.org/10.1016/j.sigpro.2018.08.011
  • Al-Najjar, A. J., Alvi, A., Idrees, S. U., & Al-Manea, A. (2007). Hiding encrypted speech using steganography. In Proceedings of the 7th WSEAS International Conference on Multimedia, Internet & Video Technologies (pp. 275-281). Beijing, China.
  • Peyvandi, H., & Park, S. J. (2011). Security in data communication and privacy in conversations for underwater wireless networks using scrambled speech scheme. In IEEE OCEANS 2011 (pp. 19-22). Waikoloa, HI. https://doi.org/10.23919/OCEANS.2011.6106900
  • Zghair, H. K., Mehdi, S. A., & Sadkhan, S. B. (2021). Speech scrambler based on discrete cosine transform and novel seven-dimension hyper chaotic system. Journal of Physics: Conference Series, 1804(1), 012048. https://doi.org/10.1088/1742-6596/1804/1/012048
  • Habib, Z., Khan, J. S., Ahmad, J., Muazzam, A. K., & Khan, A. F. (2017). Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In 4th International Conference on Electrical and Electronics Engineering (ICEEE). https://doi.org/10.1109/ICEEE2.2017.7935827
  • Enayatifar, R., Abdullah, A. H., & Isnin, I. F. (2014). Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics and Lasers in Engineering, 56, 83-93. https://doi.org/10.1016/j.optlaseng.2013.12.003
Volume 4, Issue 3
Summer 2021
Pages 109-117

  • Receive Date 04 June 2021
  • Revise Date 16 July 2021
  • Accept Date 05 September 2021