You are previewing Information Hiding in Speech Signals for Secure Communication.
O'Reilly logo
Information Hiding in Speech Signals for Secure Communication

Book Description

In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more.

Table of Contents

  1. Cover
  2. Title page
  3. Table of Contents
  4. Copyright Page
  5. Preface
  6. Acknowledgments
  7. Overview
  8. Chapter 1: Introduction
    1. Abstract
    2. 1.1. Background
    3. 1.2. Introduction to Speech Coding
    4. 1.3. Related Work
    5. 1.4. Analysis of Available Information Hiding Methods
    6. 1.5. Organization of This Book
  9. Chapter 2: The Information Hiding Model for Speech Secure Communication
    1. Abstract
    2. 2.1. Introduction and Motivation
    3. 2.2. Model of Information Hiding as a Communication Problem
    4. 2.3. Speech Information Hiding Model
    5. 2.4. Experiments and Results Analysis
    6. 2.5. Summary
  10. Chapter 3: The ABS Speech Information Hiding Algorithm Based on Filter Similarity
    1. Abstract
    2. 3.1. Introduction and Motivation
    3. 3.2. Filter Similarity
    4. 3.3. LPC Coefficient Substitution Based on Filter Similarity
    5. 3.4. Secret Speech Information Hiding and Extraction Algorithm
    6. 3.5. Experimental Results and Analysis
    7. 3.6. Summary
  11. Chapter 4: The G.721-Based Speech Information Hiding Approach
    1. Abstract
    2. 4.1. Introduction to the G.721 Coding Standard
    3. 4.2. The Approach to Hide Secret Speech in G.721
    4. 4.3. Experimental Results and Analysis
    5. 4.4. Summary
  12. Chapter 5: The G.728-Based Speech Information Hiding Approach
    1. Abstract
    2. 5.1. Code Excited Linear Prediction
    3. 5.2. Introduction to the G.728 Coding Standard
    4. 5.3. The CELP-Based Scheme of Speech Information Hiding and Extraction
    5. 5.4. Approach to Hide Secret Speech in G.728
    6. 5.5. Experimental Results and Analysis
    7. 5.6. Summary
  13. Chapter 6: The G.729-Based Speech Information Hiding Approach
    1. Abstract
    2. 6.1. Introduction to the G.729 Coding Standard
    3. 6.2. The ACELP-Based Scheme of Speech Information Hiding and Extraction
    4. 6.3. Approach to Hide Secret Speech in G.729
    5. 6.4. Experimental Results and Analysis
    6. 6.5. Summary
  14. Chapter 7: The GSM (RPE-LTP)-Based Speech Information Hiding Approach
    1. Abstract
    2. 7.1. Introduction to the GSM (RPE-LTP) Coding Standard
    3. 7.2. Approach to Hide Secret Speech in GSM (RPE-LTP)
    4. 7.3. Experimental Results and Analysis
    5. 7.4. Summary
  15. Chapter 8: Covert Communication Based on the VoIP System
    1. Abstract
    2. 8.1. Introduction to the VoIP-Based Covert Communication System
    3. 8.2. Modeling and Realization of VoIP-Based Covert Communication
    4. 8.3. Embedding Secret Speech into VoIP G.729 Speech Flows
    5. 8.4. Summary
  16. Chapter 9: Design of Real-Time Speech Secure Communication over PSTN
    1. Abstract
    2. 9.1. Secure Communication Plan
    3. 9.2. Design and Realization of a Secure Communication System Based on PC
    4. 9.3. Speech Information Hiding Telephony (SIHT) Based on PSTN
    5. 9.4. Summary
  17. References
  18. Index