183 research outputs found

    High Security and Capacity of Image Steganography for Hiding Human Speech Based on Spatial and Cepstral Domains

    Get PDF
    A new technique of hiding a speech signal clip inside a digital color image is proposed in this paper to improve steganography security and loading capacity. The suggested technique of image steganography is achieved using both spatial and cepstral domains, where the Mel-frequency cepstral coefficients (MFCCs) are adopted, as very efficient features of the speech signal. The presented technique in this paper contributes to improving the image steganography features through two approaches. First is to support the hiding capacity by the usage of the extracted MFCCs features and pitches extracted from the speech signal and embed them inside the cover color image rather than directly hiding the whole samples of the digitized speech signal. Second is to improve the data security by hiding the secret data (MFCCs features) anywhere in the host image rather than directly using the least significant bits substitution of the cover image. At the recovering side, the proposed approach recovers these hidden features and using them to reconstruct the speech waveform again by inverting the steps of MFCCs extraction to recover an approximated vocal tract response and combine it with recovered pitch based excitation signal. The results show a peak signal to noise ratio of 52.4 dB of the stego-image, which reflect a very good quality and a reduction ratio of embedded data to about (6%–25%). In addition, the results show a speech reconstruction degree of about 94.24% correlation with the original speech signal

    DWT-SMM-based audio steganography with RSA encryption and compressive sampling

    Get PDF
    Problems related to confidentiality in information exchange are very important in the digital computer era. Audio steganography is a form of a solution that infuses information into digital audio, and utilizes the limitations of the human hearing system in understanding and detecting sound waves. The steganography system applies compressive sampling (CS) to the process of acquisition and compression of bits in binary images. Rivest, Shamir, and Adleman (RSA) algorithms are used as a system for securing binary image information by generating encryption and decryption key pairs before the process is embedded. The insertion method uses statistical mean manipulation (SMM) in the wavelet domain and low frequency sub-band by dividing the audio frequency sub-band using discrete wavelet transform (DWT) first. The optimal results by using our system are the signal-to-noise ratio (SNR) above 45 decibel (dB) and 5.3833 bit per second (bps) of capacity also our system has resistant to attack filtering, noise, resampling and compression attacks

    Security of Electronic Patient Record using Imperceptible DCT-SVD based Audio Watermarking Technique

    Get PDF
    Abstract—A robust and highly imperceptible audio watermarkingtechnique is presented to secure the electronic patientrecord of Parkinson’s Disease (PD) affected patient. The proposedDCT-SVD based watermarking technique introduces minimalchanges in speech such that the accuracy in classification of PDaffected person’s speech and healthy person’s speech is retained.To achieve high imperceptibility the voiced part of the speech isconsidered for embedding the watermark. It is shown that theproposed watermarking technique is robust to common signalprocessing attacks. The practicability of the proposed technique istested: by creating an android application to record & watermarkthe speech signal. The classification of PD affected speech is doneusing Support Vector Machine (SVM) classifier in cloud server

    High Capacity Audio Steganography Based on Contourlet Transform

    Get PDF
    The science of hiding information behind other cover media file is known steganography. Audio steganography means that a secret message is hidden by embedding it in an audio file. This paper presents a new audio steganography approach that is used the contourlet transform to hide a speech and image in an audio signal. The cover audio signal is modified to be suitable as input to contourlet transform and then secret data embed to the subbands of contourlet transform. The results showed high hiding capacity of data up to 90% of cover audio file size. In addition, performance analysis by measures factors: Normalized Correlation (NC), Signal to Noise Ratio (SNR) and Peak Signal to Noise Ratio (PSNR) appears good quality results for both stego and secret data

    Single image super resolution technique: An extension to true color images

    Get PDF
    The super-resolution (SR) technique reconstructs a high-resolution image from single or multiple low-resolution images. SR has gained much attention over the past decade, as it has significant applications in our daily life. This paper provides a new technique of a single image super-resolution on true colored images. The key idea is to obtain the super-resolved image from observed low-resolution images. A proposed technique is based on both the wavelet and spatial domain-based algorithms by exploiting the advantages of both of the algorithms. A back projection with an iterative method is implemented to minimize the reconstruction error and for noise removal wavelet-based de-noising method is used. Previously, this technique has been followed for the grayscale images. In this proposed algorithm, the colored images are taken into account for super-resolution. The results of the proposed method have been examined both subjectively by observation of the results visually and objectively by considering the peak signal-to-noise ratio (PSNR) and mean squared error (MSE), which gives significant results and visually better in quality from the bi-cubic interpolation technique

    Enhancement of speech scrambles using DNA technique and chaotic maps over transformation domain

    Get PDF
    This work presents and describes a new method for speech scrambles in light of chaotic maps and DNA coding. Both a wavelet transform (DWT) and Discrete cosine transform (DCT) are used to change the speech signal into another format for processing. The chaotic maps are represented by Logistic-Chebyshev map (LCH) and Random Logistic map (RLM) which are employed for generating sequences of keys that are used in the proposed system, hence the use of DNA encoding technology as an emerging technology for enhancing the security of speech. The proposed system is illustrated explicitly and tested with various security speech signals metrics, such as the coefficient, signal to noise ratio and peak signal to noise ratio. All tests of the proposed system concluded that the speech signal is reliably secure and undetectable, and hence the proposed system provides a sufficient security level

    Compressive sensing based secret signals recovery for effective image steganalysis in secure communications

    Get PDF
    Conventional image steganalysis mainly focus on presence detection rather than the recovery of the original secret messages that were embedded in the host image. To address this issue, we propose an image steganalysis method featured in the compressive sensing (CS) domain, where block CS measurement matrix senses the transform coefficients of stego-image to reflect the statistical differences between the cover and stego- images. With multi-hypothesis prediction in the CS domain, the reconstruction of hidden signals is achieved efficiently. Extensive experiments have been carried out on five diverse image databases and benchmarked with four typical stegographic algorithms. The comprehensive results have demonstrated the efficacy of the proposed approach as a universal scheme for effective detection of stegography in secure communications whilst it has greatly reduced the numbers of features requested for secret signal reconstruction
    • …
    corecore