17,987 research outputs found

    Methods of covert communication of speech signals based on a bio-inspired principle

    Get PDF
    This work presents two speech hiding methods based on a bio-inspired concept known as the ability of adaptation of speech signals. A cryptographic model uses the adaptation to transform a secret message to a non-sensitive target speech signal, and then, the scrambled speech signal is an intelligible signal. The residual intelligibility is extremely low and it is appropriate to transmit secure speech signals. On the other hand, in a steganographic model, the adapted speech signal is hidden into a host signal by using indirect substitution or direct substitution. In the first case, the scheme is known as Efficient Wavelet Masking (EWM), and in the second case, it is known as improved-EWM (iEWM). While EWM demonstrated to be highly statistical transparent, the second one, iEWM, demonstrated to be highly robust against signal manipulations. Finally, with the purpose to transmit secure speech signals in real-time operation, a hardware-based scheme is proposedEsta tesis presenta dos mĂ©todos de comunicaciĂłn encubierta de señales de voz utilizando un concepto bio-inspirado, conocido como la “habilidad de adaptaciĂłn de señales de voz”. El modelo de criptografĂ­a utiliza la adaptaciĂłn para transformar un mensaje secreto a una señal de voz no confidencial, obteniendo una señal de voz encriptada legible. Este mĂ©todo es apropiado para transmitir señales de voz seguras porque en la señal encriptada no quedan rastros del mensaje secreto original. En el caso de esteganografĂ­a, la señal de voz adaptada se oculta en una señal de voz huĂ©sped, utilizando sustituciĂłn directa o indirecta. En el primer caso el esquema se denomina EWM y en el segundo caso iEWM. EWM demostrĂł ser altamente transparente, mientras que iEWM demostrĂł ser altamente robusto contra manipulaciones de señal. Finalmente, con el propĂłsito de transmitir señales de voz seguras en tiempo real, se propone un esquema para dispositivos hardware

    Watermarking for multimedia security using complex wavelets

    Get PDF
    This paper investigates the application of complex wavelet transforms to the field of digital data hiding. Complex wavelets offer improved directional selectivity and shift invariance over their discretely sampled counterparts allowing for better adaptation of watermark distortions to the host media. Two methods of deriving visual models for the watermarking system are adapted to the complex wavelet transforms and their performances are compared. To produce improved capacity a spread transform embedding algorithm is devised, this combines the robustness of spread spectrum methods with the high capacity of quantization based methods. Using established information theoretic methods, limits of watermark capacity are derived that demonstrate the superiority of complex wavelets over discretely sampled wavelets. Finally results for the algorithm against commonly used attacks demonstrate its robustness and the improved performance offered by complex wavelet transforms

    An SVD-based audio watermarking technique

    Full text link
    • 

    corecore