Skip to main content

Steganography and Security of Speech Signal

  • Chapter
  • First Online:
Application of Wavelets in Speech Processing

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSSPEECHTECH))

  • 1361 Accesses

Abstract

Perfect reconstruction of wavelet filter banks helps in retrieving a hidden signal. In wavelet domain different techniques are applied on the wavelet coefficients to increase the hiding capacity and perceptual transparency. In general, steganography in wavelet domain shows high hiding capacity and transparency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. D.M. Ballesteros, J.M. Moreno (2013) Real-time, speech-in-speech hiding scheme based on least significant bit substitution and adaptive key. Comput. Electr. Eng. 39(4), 1192–1203 (2013)

    Google Scholar 

  2. J. Antony, C. Sobin, A. Sherly, Audio steganography in wavelet domain—a survey. Int. J. Comput. Appl. 52(13), 33–37 (2012)

    Google Scholar 

  3. N. Cvejic, T. Seppanen, A wavelet domain LSB insertion algorithm for high capacity audio steganography, in Proceedings of 2002 IEEE 10th Digital Signal Processing Workshop, 2002 and the IEEE 2nd Signal Processing Education Workshop (2002)

    Google Scholar 

  4. L. Shen, X. Li, H. Wang, R. Zhang, in Speech hiding based on auditory wavelet, in Proceedings of International Conference on Computational Science and Its Applications—ICCSA 2004, Part IV (Assisi, 2004), pp. 414–420

    Google Scholar 

  5. D.M. Ballesteros, J.M. Moreno, Highly transparent steganography model of speech signals using efficient wavelet masking. Expert Syst. Appl. 39(10), 9141–9149 (2012)

    Article  Google Scholar 

  6. R. Siwar, G. Driss, S. Sid-Ahmed, H. Habib, Speech steganography using wavelet and fourier transforms. EURASIP J. Audio Speech Music Process. 2012(20), 1–14 (2012)

    Google Scholar 

  7. D. Que, L. Lu, H. Wang, Y. Ding, A digital voice secure communication system based on logistic-mapping in wavelet domain chaotic modulation. in 7th International Conference on Signal Processing, 2004, ICSP ‘04, vol. 3 (2004), pp. 2397–2400

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Hesham Farouk .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Farouk, M.H. (2014). Steganography and Security of Speech Signal. In: Application of Wavelets in Speech Processing. SpringerBriefs in Electrical and Computer Engineering(). Springer, Cham. https://doi.org/10.1007/978-3-319-02732-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-02732-6_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-02731-9

  • Online ISBN: 978-3-319-02732-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics