Speech Steganography System Using Lifting Wavelet Transform
2016, Information (Koganei)
Sign up for access to the world's latest research
Abstract
This paper presents a new lossless speech steganography approach based on Integer-to-Integer Lifting Wavelet Transform (Int2Int LWT) and Least Significant Bits (LSBs) substitution. In order to increase the security level a simple encryption with chaotic key has been proposed. The proposed system has a high sensitivity in choosing keys because a small change in CKG causes a new secret key for transmitting. Speech steganography algorithm that based on (Int2IntLWT) can satisfy full recovery for the embedded secret messages in the receiver side.











Related papers
International Journal of Computer Applications, 2013
Security of data is very important in data communication. Everyday a lot of information is transferred form one user to another on internet and so the possibility of data theft also increases. Steganography provides a solution for the security of information during data transmission. Steganography is the science which makes the valuable information invisible to prevent it from unauthorized user. In this paper an audio message has been embedded in an image using the LSB (Least Significant Bit) technique and the wavelet transform. To hide a speech in an image is challenging as size of speech is larger than size of image. Number of bits in 1kb of speech is almost equal to an image. This paper describes how maximum speech can be embed in an image.
Rapid increase in data transmission over internet results in emphasis on information security. Audio steganography is used for secure transmission of secret data with audio signal as the carrier. In the proposed method, cover audio file is transformed from space domain to wavelet domain using lifting scheme, leading to secure data hiding. Text message is encrypted using dynamic encryption algorithm. Cipher text is then hidden in wavelet coefficients of cover audio signal. Signal to Noise Ratio (SNR) and Squared Pearson Correlation Coefficient (SPCC) values are computed to judge the quality of the stego audio signal. Results show that stego audio signal is perceptually indistinguishable from the cover audio signal. Stego audio signal is robust even in presence of external noise. Proposed method provides secure and least error data extraction.
Allied Journals, 2015
Information security is the basic requirement of today digital communication. Everything is going digital, so the protection of information is much more important. The information security can be classified in to Steganography, Watermarking and Cryptography. steganography is the art and science of hiding secret information into digital media, so that no one can identified the presence inside the media. There are different types of carriers (ie. Image , video etc) for cover media. Steganalysis is type of attack against the steganography technique. To make security in communication system, new steganography method based on Discrete wavelet Transform is proposed. The proposed method hides secret message bits inside the intensity matrix of secret image. Then the Inverse Discrete Wavelet Transformation (IDWT) is applied to obtain the stegoimage. The performance of proposed design is investigated by comparing cover and stego image in terms of Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE).
Data security is one of the most significant aspects to be deliberated when some specific secret data has to be interconnected amongst two different parties. Steganography and cryptography are the two methods utilized for this reason. In cryptography, they scrambles the secret data, however it discloses the actuality of the specific data. In steganography, it hides the authentic existence of the specific data so that anybody else other than the sender as well as the recipient couldn’t identify the actual transmission. In steganography, the top-secret data which has to be interconnected is concealed in some other form of carrier in such a manner so that the secret data is imperceptible. In this review paper, we discussed about steganography, specifically audio steganography and wavelet transformation of audio signal which is utilized to hide audio signal in image in the transform domain. Our main objective is to discover a technique which is robust and it can withstand the attacks.
In the current internet community, secure data transfer is limited due to its attack made on data communication. So more robust methods are chosen so that they ensure secured data transfer. One of the solutions which came to the rescue is the audio Steganography. But existing audio steganographic systems have poor interface, very low level implementation, difficult to understand and valid only for certain audio formats with restricted message size.
International Journal of Scientific Research in Science, Engineering and Technology, 2023
Steganography is the art of hiding information into a cover object. The cover object could be any media like an image, audio or human speech. The essence of steganography lies in the ability to hide information in the cover object without degrading its quality and hence giving away hints of tampering. This project involves a spread spectrum representation-based speech steganography using discrete wavelet transform (DWT), which decomposes the cover speech signal into approximated and detail coefficients i.e., low frequency and high frequency components. Our proposed speech steganography provides enhanced imperceptibility since DWT reconstructs the decomposed information without degrading the quality of speech thus staying true to the nature of steganography. Our proposed approach is an extended version of existing Fast fourier transform (FFT) based steganography, where there is a lack of imperceptibility. Compared to existing FFT and any other existing methods it has been observed that there is a lower bit error rate and greater discrepancy. Apart from this we have noticed reduced effects of noise attacks.
2012
The performance of audio steganography compression system using discrete wavelet transform (DWT) is investigated. Audio steganography coding is the technology of transforming stegospeech into efficiently encoded version that can be decoded in the receiver side to produce a close representation of the initial signal (non compressed). Experimental results prove the efficiency of the used compression technique since the compressed stego-speech are perceptually intelligible and indistinguishable from the equivalent initial signal, while being able to recover the initial stego-speech with slight degradation in the quality .
In information security, an image steganography technique uses one of the most popular transforms; either a spatial domain or the frequency domain to conceal the secret information. In this paper, an image steganography system using the spatial domain technique to conceal secret information in the frequency domain is proposed to conceal secret image information in another cover image. The Integer Wavelet Transform (IWT) used to obtain high scalable sub bands for each LL, LH, HL and HH of the cover image file. Then, the steganography approach is used to conceal the secret information in the wavelet coefficients for all sub bands. The results show high quality of stego image, and the stego image is analyzed for different attacks. It is found that the technique is robust, and it can withstand the attacks. The quality of the stego image is measured by Peak Signal to Noise Ratio (PSNR), Structural Similarity Index Metric (SSIM), and Universal Image Quality Index (UIQI). The quality of extracted secret image is measured by Signal to Noise Ratio (SNR) and Squared Pearson Correlation Coefficient (SPCC).
Baghdad Science Journal, 2015
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secret message in high frequency. The proposed approach tested in different sizes of audio file and showed the success of hiding according to (PSNR) equation.
Image steganography is applicable in department of defense, department of police, department of detective investigation and medical field. In image steganography, generally secret image is not hidden, instead of that a key is generated and that key is hidden in the cover image. By using that key the secret image can be extracted from the cover image. Wavelet Transform (WT) is used to hide the key. Wavelet Transform is very robust and secure because nobody can realize information which is hidden and hidden data cannot be lost because of noise or any signal processing operations. Experimental results show very good Peak Signal to Noise Ratio (PSNR), MSE and maximum error which is a measure of security. In this technique the secret image is hidden in the middle bit-planes of the integer wavelet coefficients in high frequency sub-bands.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
References (8)
- Sayed Ahmad Salehi, Rasoul Amirfattahi, "VLSI Architectures of Lifting-Based Discrete Wavelet Transform", Isfahan University of Technology, Iran 2011.
- Tinku Acharya, Chaitali Chakraabati, "A Survey on Lifting-based Discrete Wavelet Transform Architectures", Springer, Volume 42, Issue 3, pg. (321-339), March 2006
- Ingrid Daubechies, Wim Sweldens, "FACTORING WAVELET TRANSFORMS INTO LIFTING STEPS", NSF (grant DMS-9401785), AFOSR (grant F49620-95-1-0290), ONR (grant N00014-96-1-0367)Princeton University, Princeton, New Jersey, 1996.
- "Lifting Scheme of Wavelet Transform" http://shodhganga.inflibnet.ac.in/bitstream/10603/4341/7/07_chapter%203.
- Michel Misiti, Yves Misiti, Georges Oppenheim, Jean-Michel Poggi , "Wavelet Toolbox™ User's Guide", Book , COPYRIGHT 1997-2014 by The Math Works, Inc, 2014.
- GEERT UYTTERHOEVEN "Integer Wavelet Transforms using the Lifting Scheme", Katholieke Universiteit Leuven, IEEE, IMA CS, OTE, p(6253-6257), 1999.
- Eman Hato Hashim , "Speech Signal Encryption Using Chaotic Maps", M.Sc. Thesis, Al Mustansiriyah University, Computer Science department, September 2013.
- Jamal Nasir Hasoon, " Speech Hiding Using Vector Quantization", M.SC. Thesis, AL-Mustansiriyh University, January 2014.