Skip to main content

G.711-Based Adaptive Speech Information Hiding Approach

  • Conference paper
Intelligent Computing (ICIC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4113))

Included in the following conference series:

Abstract

This paper presents an adaptive LSB (Least Significant Bit) algorithm to embed dynamic secret speech information data bits into public speech of G.711-PCM (Pulse Code Modulation) for the purpose of secure communication according to energy distribution, with high efficiency in steganography and good quality in output speech. It is superior to available classical algorithms, LSB. Experiments show that the proposed approach is capable of embedding up to 20 Kbps information data of secret speech into G.711 speech at an average embedded error rate of 10− 5. It meets the requirements of information hiding, and satisfies the secure communication speech quality constraints with an excellent speech quality and complicating speakers’ recognition.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding—A Survey. IEEE Trans. Proc. Thy. 87, 1062–1078 (1999)

    Google Scholar 

  2. Voloshynovskiy, S., Deguillaume, F., Kovall, O., Pun, T.: Information-Theoretic Data-Hiding for Public Network Security, Services Control and Secure Communications. In: Proc. of TELSIKS 2003, Serbia and Montenegro, NIS, pp. 3–17 (2003)

    Google Scholar 

  3. Moulin, P., O’Sullivan, J.A.: Information-theoretic analysis of watermarking. In: ICASSP 2000 Proc. of 2000 IEEE International Conference on Acoustics, Speech, and Signal, Istanbul, Turkey, vol. 6, pp. 3630–3633 (2000)

    Google Scholar 

  4. Chen, L., Zhang, X.: Speech Hiding Algorithm Based on Speech Parameter Model. Chinese Journal of Computers 26, 954–981 (2003)

    Google Scholar 

  5. Chen, L., Zhang, X.: Study of Information Hiding in Security Speech Communication. Journal of PLA University of Science and Technology 3, 1–5 (2002)

    MATH  Google Scholar 

  6. Gibson, J.D., Kokes, M.G.: Data embedding for secure communications. In: Proceedings MILCOM 2002, vol. 1, pp. 406–410 (2002)

    Google Scholar 

  7. Moulin, P., Joseph, A.: O’Sullivan: Information-theoretic analysis of information hiding. IEEE Trans. on Information Theory 49, 563–593 (2003)

    Article  MATH  Google Scholar 

  8. Wu, Z., Hu, Y., Niu, X., et al.: Information Hiding Technique Based Speech Secure Communication over PSTN. The Chinese Journal of Electronics 15, 108–112 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wu, Z., Yang, W. (2006). G.711-Based Adaptive Speech Information Hiding Approach. In: Huang, DS., Li, K., Irwin, G.W. (eds) Intelligent Computing. ICIC 2006. Lecture Notes in Computer Science, vol 4113. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11816157_141

Download citation

  • DOI: https://doi.org/10.1007/11816157_141

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37271-4

  • Online ISBN: 978-3-540-37273-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics