Data hiding in speech signal using steganography and encryption

01/13/2020
by   Hanisha Chowdary N, et al.
0

Data privacy and data security are always on highest priority in the world. We need a reliable method to encrypt the data so that it reaches the destination safely. Encryption is a simple yet effective way to protect our data while transmitting it to a destination. The proposed method has state of art technology of steganography and encryption. This paper puts forward a different approach for data hiding in speech signals. A ten-digit number within speech signal using audio steganography and encrypting it with a unique key for better security. At the receiver end the same unique key is used to decrypt the received signal and then hidden numbers are extracted. The proposed approach performance can be evaluated by PSNR, MSE, SSIM and bit-error rate. The simulation results give better performance compared to existing approach.

READ FULL TEXT
research
02/16/2020

Bit Error Rate Analysis of M-ARY PSK and M-ARY QAM Over Rician Fading Channel

This paper mainly illustrates the Bit error rate performance of M-ary QA...
research
08/16/2022

An Adaptive Image Encryption Scheme Guided by Fuzzy Models

A new image encryption scheme using the advanced encryption standard (AE...
research
02/11/2022

A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids

Multimodal hearing aids (HAs) aim to deliver more intelligible audio in ...
research
12/09/2020

Semantic Communications for Speech Signals

We consider a semantic communication system for speech signals, named SC...
research
02/19/2021

Introducing an experimental distortion-tolerant speech encryption scheme for secure voice communication

The current increasing need for privacy-preserving voice communications ...
research
10/11/2018

A Novel Chaotic Uniform Quantizer for Speech Coding

Quantization is an essential step in the analog-to-digital conversion pr...
research
12/21/2020

A Secured Protocol for IoT Networks

Researchers in the past have shown that Symmetric key cryptography is ge...

Please sign up or login with your details

Forgot password? Click here to reset