Article Citation: Prof. Ziad Alqadi, and Holwa Fayeq Taha. (2020). SPEECH SIGNAL CRYPTOGRAPHY USING WPT (original) (raw)

Speech Signal Cryptography Using WPT

International Journal of Engineering Technologies and Management Research

Digital speech signal is one of the most important types of data used due to the large number of computerized applications that are needed for mankind. Some computerized applications that use digital signals need a high level of security to protect the signal, and to turn it into a vague and incomprehensible signal to any third party, and that is why we have to seek a secure method of cryptography to protect the speech signal. In this research paper we will introduce a method based wavelet packet tree decomposition and reconstruction to generate an encrypted speech, the method will reorder the original speech using a secret number of decomposition levels, the obtained wavelet decomposition sizes will be used to form a speech segments, which must be rearranged in a secret order to get the encrypted speech, the introduced method will be implemented and evaluated to prove the security issues.

Efficient WPT Based Speech Signal Protection

International Journal of Computer Science and Mobile Computing

Speech files are now widely circulated using various means of communication, and sometimes the speech file can be secret, which requires protecting it from any unauthorized person to hear and understand it. The methods which use DES standard for data encryption-decryption are considered ineffective because they need a long time to implement the protection of speech files due to their large size and containing double data with fractions. In this paper research a method which uses WPT decomposition will be proposed, tested and implemented. It will be shown how the new introduced method will increase the cryptography process efficiency by minimizing the encryption-decryption times keeping at the same time excellent values for quality parameters.

Hardware Implementation of Wavelet Based Speech Encryption for End-to-end Security in Mobile Communication System

Speech privacy techniques are used to scramble clear speech into an unintelligible signal in order to avoid eavesdropping. A5 is the encryption algorithm used in order to ensure privacy of conversations on GSM mobile phones. Four versions of the stream cipher are available. A5/3 and A5/4 is based on the Kasumi algorithm specified by 3GPP for use in 3G mobile systems. A new security algorithm, known as A5/4, will provide users of GSM mobile phones with an even higher level of protection using 128-bit key. Literature suggests a number of attacks had been publishing for A5/1 and A5/3. GSM suffers from various security weaknesses. The GSM voice traffic is secure outside the core network but it has no security over the core network. This paper resolves this weakness by adding another encryption level at the user end using Discrete Wavelet transform (DWT).

A Discrete Wavelet Transform based Cryptographic algorithm

2011

This paper presents a new and efficient algorithm for cryptographic purpose that considers the representation of the cipher text by using the Discrete Wavelet Transform to find the wavelet decomposition vector containing the approximation and the detail coefficients. The decryption is done by extracting the encrypted data from the wavelet decomposition vector using the inverse Discrete Wavelet Transform algorithm. The encrypted message consists of just the wavelet decomposition vector. The key consists of the code number of the wavelet used and the bookkeeping vector.

A Review on Cryptographic Algorithms for Speech Signal Security

The most common way of human communication is accomplished by speech. There are situations when secret messages have to be sent. Transmission of speech signals over internet encounters the risk of eavesdropping. Cryptographic algorithms support in securing the voice signals by scrambling techniques. Many scrambling techniques are available for securing the speech signal. The encryption / decryption technique should provide high level of security to the signal and recover the original signals quickly and efficiently yet maintaining excellent audio quality. Few methods to protect the signal from outsiders are discussed and their performances are analyzed. This review report is presented to provide aid for selecting the best cryptographic algorithm to ensure speech signal security during transmission.

DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY

Rapid increase in data transmission over internet results in emphasis on information security. Audio steganography is used for secure transmission of secret data with audio signal as the carrier. In the proposed method, cover audio file is transformed from space domain to wavelet domain using lifting scheme, leading to secure data hiding. Text message is encrypted using dynamic encryption algorithm. Cipher text is then hidden in wavelet coefficients of cover audio signal. Signal to Noise Ratio (SNR) and Squared Pearson Correlation Coefficient (SPCC) values are computed to judge the quality of the stego audio signal. Results show that stego audio signal is perceptually indistinguishable from the cover audio signal. Stego audio signal is robust even in presence of external noise. Proposed method provides secure and least error data extraction.

Saving Bandwidth and Supporting Cryptography in the Internet: An Application of Wavelet Filters

Compression and cryptography of digital data for network transmission using digi tal audio signals and its wavelet tranforms is described in this paper. Wavelts are mathematical functions which can amplify data intervals, splitting them into different segments off different frequencies. This treatment allows us to perfo rm data analysis and compression on each corresponding scale. A Wavelet transfor m in a space of some specific data function can sparsely represent each subspace of this function in the "time-frequency" domain. This property allows u s to use it for data compression, and once this compression is biorthogonally dependent of the filter coefficients it can be used as a cryptographic tool where those coefficients can represent pairs of public and pr ived keys. In this work we describe a new method to compress and encrypt digital data, simultaneously, for transmission over a network environment. Although results were yelded for digital audio data the method can ...

Encrypting an audio file based on integer wavelet transform and hand geometry

TELKOMNIKA Telecommunication Computing Electronics and Control, 2020

A new algorithm suggested for audio file encryption and decryption utilizing integer wavelet transform to take advantage of the property for adaptive context-based lossless audio coding. In addition, biometrics are used to give a significant level of classification and unwavering quality because the procedure has numerous qualities and points of interest. The offered algorithm utilized many properties of hand geometry estimations as keys to encode and decode the audio file. Many tests were carried out on a set of audio files and quality metrics such as mean square error and correlations were calculated which in turn confirmed the efficiency and quality of the work.

Discrete Wavelet Transform based Cryptosystem

International Journal on Recent and Innovation Trends in Computing and Communication

In this article, the authors proposed, implemented and analysed a symmetric key cryptographic algorithm that can be considered as a lossless encryption and decryption technique, advantageous especially in situations where, even a slight marginal distortion is not tolerable. In the proposed system, Haar wavelet is used initially, to transform the original target image into its frequency domain, followed by encrypting the resulting sub-bands, so as to obtain a secure and reliable encrypted image. The resulting coefficients after Haar decomposition is scattered using a reversible weighing factor, suitably reversed and swapped to get the secure encrypted image. The encrypted image is then correspondingly decrypted, by the reverse process to get back the original decrypted image. Statistical testing and security methods were used to evaluate and analyse the proposed cryptosystem and the results showed that the proposed system is cryptographically resistant to attacks and is also highly...