Research algorithm of hide the speech messaging based on the spread spectrum method
Keywords:
speech signals, steganography, spread spectrum, measures the differences, the correlation coefficient, the mean square error, relative error, the signal-to-noise ratio
Abstract
In the work the approach, which makes it possible to modify the method of expanding the spectrum for the realization of the reserved coding of voice communication in vocal data, is proposed. The results of investigating the dependence of different estimations on the values of the assigned parameters are represented. The development algorithm can make it possible to increase the effectiveness of the reserved exchange of voice communications, due to the more effective use of reticence and capacity of vocal material. The use of the orthonormalized basis instead of pseudorandom sequence, allows more effectively from the position of the volume of the coded information to use vocal material for the reserved transfer of communication.Downloads
Download data is not yet available.
References
Gribunin V.G. Digital steganography. Protection Aspects / V.G. Gribunin, I.N. Wintergrasp, I.V. Turintsev. – Moscow: Solon-Press, 2002. – 261 p.
Zharkikh A.A. The method of steganography based on the direct spread spectrum signal / A.A. Hot, A.V. Gurin, V.Y. Plast // Proceedings of the VII International Scientific and Technical Conference INTERMATIC, 7 11 December 2009. Part 4. – Moscow: MIREA, 2009. – P. 78 – 83.
Zhilyakov E.G. On the Steganography in Voice Data / E.G. Zhilyakov et al. // Asian J. Inf. Technol. – 2016. – Vol. 15. – № 12. – P. 1949–1952.
Konahovich G.F. Computer steganography. Theory and practice / G.F. Konahovich, A.Y. Puzyrenko. – Kiev: MK – Press, 2006. –288 p.
Fridrich J. Steganography in digital media: Principles, algorithms, and applications / Jessica Fridrich. – Cambridge University Press, 2012. – 441 p.
Furui S. Digital Speech Processing, Synthesis, and Recognition / Sadaoki Furui. – Marcel Dekker, 2001. – 477 p.
Cvejic N. Spread spectrum audio watermarking using frequency hopping and attack characterization / Nedeljko Cvejic, Tapio Seppanen// Signal Processing. – 2004. – Vol. 84. – №11. – P. 207 – 213.
Stanković S. Multimedia signals and systems / S. Stanković, I. Orović, E. Sejdić. – Springer, 2012. – 373 p.
Thierry Dutoit, Ferran Marques. Applied Signal Processing A MATLAB TM- Based Proof of Concept. – Springer, 2009. – 456 p.
Vercoe B.L. Csound: A Manual for the Audio-Processing System / Barry L. Vercoe. – Cambridge: MIT Media Lab, 1995.
Zharkikh A.A. The method of steganography based on the direct spread spectrum signal / A.A. Hot, A.V. Gurin, V.Y. Plast // Proceedings of the VII International Scientific and Technical Conference INTERMATIC, 7 11 December 2009. Part 4. – Moscow: MIREA, 2009. – P. 78 – 83.
Zhilyakov E.G. On the Steganography in Voice Data / E.G. Zhilyakov et al. // Asian J. Inf. Technol. – 2016. – Vol. 15. – № 12. – P. 1949–1952.
Konahovich G.F. Computer steganography. Theory and practice / G.F. Konahovich, A.Y. Puzyrenko. – Kiev: MK – Press, 2006. –288 p.
Fridrich J. Steganography in digital media: Principles, algorithms, and applications / Jessica Fridrich. – Cambridge University Press, 2012. – 441 p.
Furui S. Digital Speech Processing, Synthesis, and Recognition / Sadaoki Furui. – Marcel Dekker, 2001. – 477 p.
Cvejic N. Spread spectrum audio watermarking using frequency hopping and attack characterization / Nedeljko Cvejic, Tapio Seppanen// Signal Processing. – 2004. – Vol. 84. – №11. – P. 207 – 213.
Stanković S. Multimedia signals and systems / S. Stanković, I. Orović, E. Sejdić. – Springer, 2012. – 373 p.
Thierry Dutoit, Ferran Marques. Applied Signal Processing A MATLAB TM- Based Proof of Concept. – Springer, 2009. – 456 p.
Vercoe B.L. Csound: A Manual for the Audio-Processing System / Barry L. Vercoe. – Cambridge: MIT Media Lab, 1995.
Published
2017-04-24
Cited
How to Cite
Лихолоб, П., Буханцов, А., Водуну, А., & Бака, Я. (2017). Research algorithm of hide the speech messaging based on the spread spectrum method. Computer Science and Cybersecurity, (1), 22-27. Retrieved from https://periodicals.karazin.ua/cscs/article/view/8303
Issue
Section
Статті