ambika vijayakumar - Academia.edu (original) (raw)
Uploads
Papers by ambika vijayakumar
Pre-Processing of Speech Signal is very crucial in the applications where silence or background n... more Pre-Processing of Speech Signal is very crucial in the applications where silence or
background noise is completely undesirable. The degradation of speech due to the presence of noise
causes severe difficulties in various communication environments. Therefore, in this paper it is needed to
first apply a noise removal and silence removal methods, in order to detect” clean” speech segments.
Then using that clean speech the compression process was performed using the most powerful
compression technique such as Linear Predictive Coding (LPC). Here different samples of spoken words
are collected from different speakers and are used for implementation. The samples which is denoised,
silence removed and compressed were compared with the samples which is not denoised but silence
removed and compressed using LPC. Finally the results were evaluated in terms of compressed ratio
(CR), Peak signal-to-noise ratio (PSNR) and Normalized root-mean square error (NRMSE).Finally the
result show that the samples which is denoised, silence removed and compressed gives better result than
the other samples.
Speech has been considered to be a most important component for human to convey information to on... more Speech has been considered to be a most important component for human to convey information to one another. Today, speech communications are available for a number of applications. In applications like military, net centric communications are accessed by large number of users so it has to be given more protection and security against attacks. This paper deals with the most promising research in the integrating of speech coding, speaker authentication and strong encryption. The special features such as encryption provide more confidentiality and authentication to guard against masquerade and error tolerance to operate under acoustic environment in battlefield. This paper gives an overview of the concepts and techniques available in speech coding, speaker Identification, Encryption and Decryption.
Secure speech communication has been of great importance in civil, commercial and military comm... more Secure speech communication has been of
great importance in civil, commercial and military
communication systems. As speech
communication becomes widely used and even
more vulnerable, the importance of providing a
high level of security becomes a major issue. The
main objective of this paper is to increase the
security, and to remove the redundancy for speech
communication system under the global context of
secure communication. So it deals with the
integrating of speech coding, with speaker
authentication and strong encryption. This paper
also gives an overview and techniques available in
speech coding, speaker Identification, Encryption
and Decryption. The primary objective of this
paper is to summarize some of the well known
methods used in various stages for secure speech
communication system.
Signal Processing, IEEE Transactions on, Jan 1, 2000
The increased popularity of multimedia applications places a great demand on e cient data storage... more The increased popularity of multimedia applications places a great demand on e cient data storage and transmission techniques. Network communication, especially over a wireless network, can easily be intercepted and must be protected from eavesdroppers. Unfortunately, encryption and decryption are slow and it is often di cult, if not impossible, to carry out real-time secure image and video communication and processing. Methods have been proposed to combine compression and encryption together to reduce the overall processing time 3, 4, 12, 18, 20], but they are either insecure or too computationally intensive.
This paper proposes a novel scheme for speech secure communication based on information hiding an... more This paper proposes a novel scheme for speech secure communication based on information hiding and Compressed Sensing (CS). The scheme first uses CS technology to compress the secret speech and reduce the information bit rate to be embedded, which is significantly different from state-of-art secret speech processing methods. Secret bit stream is then embedded into cover speech based on SCS (Scalar Costa Scheme) quantization strategy. Two levels of transform: DCT and LWT are employed to enhance the performance of the system. Simulation results show that the scheme has good imperceptibility and is robust against various common channel interferences. The low computational complexity and blind-extraction characteristic of the scheme make it easy to be realized and can effectively guarantee information security in the private speech communication and military secure communication system.
Pre-Processing of Speech Signal is very crucial in the applications where silence or background n... more Pre-Processing of Speech Signal is very crucial in the applications where silence or
background noise is completely undesirable. The degradation of speech due to the presence of noise
causes severe difficulties in various communication environments. Therefore, in this paper it is needed to
first apply a noise removal and silence removal methods, in order to detect” clean” speech segments.
Then using that clean speech the compression process was performed using the most powerful
compression technique such as Linear Predictive Coding (LPC). Here different samples of spoken words
are collected from different speakers and are used for implementation. The samples which is denoised,
silence removed and compressed were compared with the samples which is not denoised but silence
removed and compressed using LPC. Finally the results were evaluated in terms of compressed ratio
(CR), Peak signal-to-noise ratio (PSNR) and Normalized root-mean square error (NRMSE).Finally the
result show that the samples which is denoised, silence removed and compressed gives better result than
the other samples.
Speech has been considered to be a most important component for human to convey information to on... more Speech has been considered to be a most important component for human to convey information to one another. Today, speech communications are available for a number of applications. In applications like military, net centric communications are accessed by large number of users so it has to be given more protection and security against attacks. This paper deals with the most promising research in the integrating of speech coding, speaker authentication and strong encryption. The special features such as encryption provide more confidentiality and authentication to guard against masquerade and error tolerance to operate under acoustic environment in battlefield. This paper gives an overview of the concepts and techniques available in speech coding, speaker Identification, Encryption and Decryption.
Secure speech communication has been of great importance in civil, commercial and military comm... more Secure speech communication has been of
great importance in civil, commercial and military
communication systems. As speech
communication becomes widely used and even
more vulnerable, the importance of providing a
high level of security becomes a major issue. The
main objective of this paper is to increase the
security, and to remove the redundancy for speech
communication system under the global context of
secure communication. So it deals with the
integrating of speech coding, with speaker
authentication and strong encryption. This paper
also gives an overview and techniques available in
speech coding, speaker Identification, Encryption
and Decryption. The primary objective of this
paper is to summarize some of the well known
methods used in various stages for secure speech
communication system.
Signal Processing, IEEE Transactions on, Jan 1, 2000
The increased popularity of multimedia applications places a great demand on e cient data storage... more The increased popularity of multimedia applications places a great demand on e cient data storage and transmission techniques. Network communication, especially over a wireless network, can easily be intercepted and must be protected from eavesdroppers. Unfortunately, encryption and decryption are slow and it is often di cult, if not impossible, to carry out real-time secure image and video communication and processing. Methods have been proposed to combine compression and encryption together to reduce the overall processing time 3, 4, 12, 18, 20], but they are either insecure or too computationally intensive.
This paper proposes a novel scheme for speech secure communication based on information hiding an... more This paper proposes a novel scheme for speech secure communication based on information hiding and Compressed Sensing (CS). The scheme first uses CS technology to compress the secret speech and reduce the information bit rate to be embedded, which is significantly different from state-of-art secret speech processing methods. Secret bit stream is then embedded into cover speech based on SCS (Scalar Costa Scheme) quantization strategy. Two levels of transform: DCT and LWT are employed to enhance the performance of the system. Simulation results show that the scheme has good imperceptibility and is robust against various common channel interferences. The low computational complexity and blind-extraction characteristic of the scheme make it easy to be realized and can effectively guarantee information security in the private speech communication and military secure communication system.