The document discusses a new method for encrypting speech signals using noise signals and a partition mapping table (PMT). The method adds a noise signal segment to the original speech signal and reorders partitions of the signal according to the PMT, generating an encrypted signal. It was implemented on various speech files and evaluated based on encryption time, decryption time, throughput, and peak signal-to-noise ratio (PSNR) between original and encrypted/decrypted signals. Results showed low encryption times, high throughput, and low PSNR between original and encrypted signals, indicating a high level of encryption. This new method provides an effective way to encrypt speech signals for secure transmission.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Analysis review on spatial and transform domain technique in digital steganog...journalBEEI
This paper presents several techniques used in digital steganography in term of spatial and transform domain. Additionally, it analyses the performance and the metric evaluation of the techniques used in digital steganography based on spatial and transform domain. This paper aims to identify the main mediums of digital steganography, which are image-based, video-based and audio-based, in order to recognize the various techniques used with them. As a result, the primary technique used in the digital medium was LSB technique in the spatial domain, while in the transform domain, the main technique used was differentiated between DTC and DWT. Meanwhile, the common domain utilized in digital steganography was the spatial domain due to its simplicity and high embedding capacity. The future efforts for this paper will be considering the feature based in text steganography.
Evaluation of the quality of an image encrytion schemeTELKOMNIKA JOURNAL
Encryption systems have been developed for image viewing applications using the Hill Cipher
algorithm. This study aims to evaluate the image encryption quality of the Hill Cipher algorithm. Several
traditional metrics are used to evaluate the quality of the encryption scheme. Three of such metrics have
been selected for this study. These include, the Colour Histogram, the Maximum Deviation (comparing
the original image) and the Entropy Analysis of the encrypted image. Encryption quality results from all three
schemes using a variety of images show that a plain Hill Cipher approach gives a good result for all kinds of
images but is more suited for colour dense images.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Speech compression analysis using matlabeSAT Journals
Abstract The growth of the cellular technology and wireless networks all over the world has increased the demand for digital information by manifold. This massive demand poses difficulties for handling huge amounts of data that need to be stored and transferred. To overcome this problem we can compress the information by removing the redundancies present in it. Redundancies are the major source of generating errors and noisy signals. Coding in MATLAB helps in analyzing compression of speech signals with varying bit rate and remove errors and noisy signals from the speech signals. Speech signal’s bit rate can also be reduced to remove error and noisy signals which is suitable for remote broadcast lines, studio links, satellite transmission of high quality audio and voice over internet This paper focuses on speech compression process and its analysis through MATLAB by which processed speech signal can be heard with clarity and in noiseless mode at the receiver end . Keywords: Speech compression, bit rate, filter, MPEG, DCT.
A Critical Review of Well Known Method For Image CompressionEditor IJMTER
The increasing attractiveness and trust in a digital photography will rise its use for
visual communication. But it requires storage of large quantities of data. For that Image compression
is a key technology in transmission and storage of digital images. Compression of an image is
significantly different then compression of binary raw data. Many techniques are available for
compression of the images. But in some cases these techniques will reduce the quality and originality
of image. For this purpose there are basically two types are introduced namely lossless and lossy
image compression techniques. This paper gives intro to various compression techniques which is
applicable to various fields of image processing.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Analysis review on spatial and transform domain technique in digital steganog...journalBEEI
This paper presents several techniques used in digital steganography in term of spatial and transform domain. Additionally, it analyses the performance and the metric evaluation of the techniques used in digital steganography based on spatial and transform domain. This paper aims to identify the main mediums of digital steganography, which are image-based, video-based and audio-based, in order to recognize the various techniques used with them. As a result, the primary technique used in the digital medium was LSB technique in the spatial domain, while in the transform domain, the main technique used was differentiated between DTC and DWT. Meanwhile, the common domain utilized in digital steganography was the spatial domain due to its simplicity and high embedding capacity. The future efforts for this paper will be considering the feature based in text steganography.
Evaluation of the quality of an image encrytion schemeTELKOMNIKA JOURNAL
Encryption systems have been developed for image viewing applications using the Hill Cipher
algorithm. This study aims to evaluate the image encryption quality of the Hill Cipher algorithm. Several
traditional metrics are used to evaluate the quality of the encryption scheme. Three of such metrics have
been selected for this study. These include, the Colour Histogram, the Maximum Deviation (comparing
the original image) and the Entropy Analysis of the encrypted image. Encryption quality results from all three
schemes using a variety of images show that a plain Hill Cipher approach gives a good result for all kinds of
images but is more suited for colour dense images.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Speech compression analysis using matlabeSAT Journals
Abstract The growth of the cellular technology and wireless networks all over the world has increased the demand for digital information by manifold. This massive demand poses difficulties for handling huge amounts of data that need to be stored and transferred. To overcome this problem we can compress the information by removing the redundancies present in it. Redundancies are the major source of generating errors and noisy signals. Coding in MATLAB helps in analyzing compression of speech signals with varying bit rate and remove errors and noisy signals from the speech signals. Speech signal’s bit rate can also be reduced to remove error and noisy signals which is suitable for remote broadcast lines, studio links, satellite transmission of high quality audio and voice over internet This paper focuses on speech compression process and its analysis through MATLAB by which processed speech signal can be heard with clarity and in noiseless mode at the receiver end . Keywords: Speech compression, bit rate, filter, MPEG, DCT.
A Critical Review of Well Known Method For Image CompressionEditor IJMTER
The increasing attractiveness and trust in a digital photography will rise its use for
visual communication. But it requires storage of large quantities of data. For that Image compression
is a key technology in transmission and storage of digital images. Compression of an image is
significantly different then compression of binary raw data. Many techniques are available for
compression of the images. But in some cases these techniques will reduce the quality and originality
of image. For this purpose there are basically two types are introduced namely lossless and lossy
image compression techniques. This paper gives intro to various compression techniques which is
applicable to various fields of image processing.
Imperceptible and secure image watermarking using DCT and random spread techn...TELKOMNIKA JOURNAL
Watermarking is a copyright protection technique, while cryptography is a message encoding
technique. Imperceptibility, robustness, and safety are aspects that are often investigated in watermarking.
Cryptography can be implemented to increase watermark security. Beaufort cipher is the algorithm
proposed in this research to encrypt watermark. The new idea proposed in this research is the utilization of
Beaufort key for watermark encryption process as well as for spread watermark when inserted as PN
Sequence substitute with the aim to improve imperceptibility and security aspects. Where PN Sequence is
widely used in spread spectrum watermarking technique. Based on the experimental results and testing of
the proposed method proved that imperceptibility and watermark security are increased. Improved
imperceptibility measured by PSNR rose by about 5dB and so did the MSE score better. Robustness
aspect is also maintained which has been proven by the excellent value of NCC.
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
Steganography is the art and science of hiding the actual important information under graphics, text, cover file etc. These techniques may be applied without fear of image destruction because they are more integrated into the image. Information can be in the form of text, audio, video. The purpose of steganography is to covert communication and to hide a message from a third party or intruder. Steganography is often confused with cryptography because the two are similar in the way that both are used to protect confidential information. Though there are many types of steganography, video Steganography is more reliable due to high capacity image, more data embedment, perceptual redundancy etc. This research paper deals with various Video Steganography techniques and algorithms including Spatial Domain, Pseudorandom permutations, TPVD (Tri-way pixel value differencing), Motion Vector Technique, Video Compression, and Motion Vector Technique. The Video compression which uses modern coding techniques to reduce redundancy in video data has been also studied and analyzed. In fact, Video compression operates on square-shaped groups or blocks of neighboring pixels, often called macro blocks. These pixel groups or blocks of pixels are compared from one frame to the next and the video compression code sends only the differences within those blocks. Generally, the motion field in video compression is assumed to be translational with horizontal component and vertical component and denoted in vector form for the spatial variables in the underlying image, such as three steps search, etc. The study also discusses and focusses on the evolution of the Video Steganography techniques and algorithms over the years based on its application and subsequent merits and demerits. Further, Advanced Video Steganography Algorithm/Bit Exchange Method based on the bit shifting and XOR operation in the secret message file has been studied and implemented. The encrypted secret message is embed in the cover file in alternate byte. The bits are substituted in LSB & LSB+3 bits in the cover file. Finally, the simulation and evaluation of the above mentioned approach is performed using MATLAB tools.
Securing Image Transmission Using in- Compression Encryption TechniqueCSCJournals
Multimedia is one of the most popular data shared in the Web, and the protection of it via encryption techniques is of vast interest. In this paper, an Optimized Multiple Huffman Tables (OMHT) technique is proposed to face some compression and security problems found in Multiple Huffman Tables (MHT) technique. OMHT depends on using statistical-model-based compression method to generate different tables from the same data type of images or videos to be encrypted leading to increase compression efficiency and security of the used tables. A systematic study on how to strategically integrate different atomic operations to build a multimedia encryption system is presented. The resulting system can provide superior performance over both generic encryption and its simple adaptation to multimedia in terms of a joint consideration of security, bitrate overhead. The effectiveness of this scheme is verified through a series of experiments, and the robustness of our approach is demonstrated by comparing it against a standard compression technique, JPEG.
DIGITAL VIDEO SOURCE IDENTIFICATION BASED ON GREEN-CHANNEL PHOTO RESPONSE NON...csandit
This paper proposes a simple but yet an effective new method for the problem of digital video camera identification. It is known that after an exposure time of 0.15 seconds, the green
channel is the noisiest of the three RGB colour channels [5]. Based on this observation, the digital camera pattern noise reference, which is extracted using only the green channel of the frames and is called Green-channel Photo Response Non-Uniformity (G-PRNU), is exploited as
a fingerprint of the camera. The green channels are first resized to a standard frame size (512x512) using bilinear interpolation. Then the camera fingerprint is obtained by a wavelet
based denoising filter described in [4] and averaged over the frames. 2-D correlation coefficient is used in the detection test. This method has been evaluated using 290 video sequences taken by four consumer digital video cameras and two mobile phones. The results
show G-PRNU has potential to be a reliable technique in digital video camera identification,and gives better results than PRNU.
An improved security and message capacity using AES and Huffman coding on ima...TELKOMNIKA JOURNAL
Information security is very important and has been widely implemented. Cryptography and steganography are two common methods that can be implemented to secure and conceal the information. In this research, the proposed AES algorithm for cryptography and DWT for steganography. However, in case of implementing DWT as steganography, there is a weakness which is a lower capacity. Based on DWT’s problem, proposed Huffman Coding to reduce the total of the message’s bit and increase the capacity. In the implementation, a message will be processed by using AES and compressed by using Huffman Coding then conceal in a cover using DWT. After doing several experiments using a 128x128 pixel message image and a 512x512 pixel of the cover image, achieved the average of MSE is 1.5676 and the average of PSNR result is above 40 db which is 46.1878.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An LSB Method Of Image Steganographic TechniquesIJERA Editor
The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. As sharing of sensitive information via a common communication channel has become inevitable. Steganography means hiding a secret message (the embedded message) within a larger one (source cover) in such a way that an observer cannot detect the presence of contents of the hidden message [1]. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet [2]. This paper intends to give an overview of image Steganography, its uses and techniques. It also attempts to identify the requirements of a good Steganography algorithm and briefly reflects on which Steganography techniques are more suitable for which applications.
Noise reduction in speech processing using improved active noise control (anc...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Noise reduction in speech processing using improved active noise control (anc...eSAT Journals
Abstract An improved feed forward adaptive Active Noise Control (ANC) scheme is proposed by using Voice Activity Detector (VAD) and wiener filtering method. The ‘speech-plus-noise’ periods and ‘noise-only’ periods are separated using VAD and the unwanted noise is removed by adaptive filtering method. By using Speech Distortion Weighted- Multichannel Wiener Filtering (SDW-MWF) algorithm the noise periods which is present along with the speech signal, is processed and filtered out. The background noise along with the speech samples are removed by the iterative procedure of filtering process. Feed forward based ANC is used to achieve a system with a better noise reduction in speech processing. Adaptive filtering process is carried out and the speech signal without the background noise can be achieved. Key Words: Active Noise Control (ANC), Noise reduction, Adaptive filtering, Feed forward ANC
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYcsandit
Rapid increase in data transmission over internet results in emphasis on information security.
Audio steganography is used for secure transmission of secret data with audio signal as the
carrier. In the proposed method, cover audio file is transformed from space domain to wavelet
domain using lifting scheme, leading to secure data hiding. Text message is encrypted using
dynamic encryption algorithm. Cipher text is then hidden in wavelet coefficients of cover audio
signal. Signal to Noise Ratio (SNR) and Squared Pearson Correlation Coefficient (SPCC)
values are computed to judge the quality of the stego audio signal. Results show that stego
audio signal is perceptually indistinguishable from the cover audio signal. Stego audio signal is
robust even in presence of external noise. Proposed method provides secure and least error
data extraction.
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
Internet which is ever more accessible to interference by not with authority people over the World. It is important to bring down a chance of Information being sensed while Transmitting is the major issue these days. To overcome these problems one of the solution is cryptography. There will be no solitude once it is decoded. So hiding data to make it confidential. Copyright is one of the ways for hiding data and it is security for digital media. Its significance and techniques used in executing hiding of data let us see in brief. The existing LSB modification technique as in this approach the bits are randomly distributes the bits of message in image so which will becomes complex for anonymous persons to extract original message information, it opens the gates for loosing important hidden information. Here hiding and extraction method is used for AVI (Audio Video Interleave). As Higher order coefficients maintains Secret message bits. The hidden information will be in the form of gray scale image pixel values. Grayscale value then converted into binary values .The resultant binary values will be assigned to the higher order coefficient values of DCT of AVI video frames. These experiments were successful. We can analyze the results using Mat lab simulation software.
In this study, we present how digital steganography can be analyzed in computer forensic. Computer forensics is a scientific study of computers in a manner consistent with the principles of the rules of evidence and court rules of procedure.
Steganography is a state of art that is used for hiding information within different media. In this paper, we will discuss how the criminal can use steganography to hide evidence and tracks, and how the steganalysis for computer forensic can be done. There are different types of steganography, such as image, text, video, and audio steganography, all will be discussed in detail. The paper will focus on how the investigator can detect the steganography in all its forms using several techniques. The main goal of this paper is to assist computer forensics investigators in knowing how the criminals can conduct their crimes and obscure evidence from computer systems using steganography techniques.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
The combination of steganography and
cryptography is considered as one of the best security methods
used for message protection, due to this reason, in this paper, a
data hiding system that is based on image steganography and
cryptography is proposed to secure data transfer between the
source and destination. Animated GIF image is chosen as a
carrier file format for the steganography due to a wide use in web
pages and a LSB (Least Significant Bits) algorithm is employed to
hide the message inside the colors of the pixels of an animated
GIF image frames. To increase the security of hiding, each frame
of GIF image is converted to 256 color BMP image and the
palette of them is sorted and reassign each pixels to its new index,
furthermore, the message is encrypted by LZW ( Lempel _
Ziv_Welch) compression algorithm before being hidden in the
image frames. The proposed system was evaluated for
effectiveness and the result shows that, the encryption and
decryption methods used for developing the system make the
security of the proposed system more efficient in securing data
from unauthorized users. The system is therefore, recommended
to be used by the Internet users for establishing a more secure
communication
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...IJECEIAES
Compression and encryption of speech signals are essential multimedia technologies. In the field of speech, these technologies are needed to meet the security and confidentiality of information requirements for transferring huge speech signals via a network, and for decreasing storage space for rapid retrieval. In this paper, we propose an algorithm that includes hybrid transformation in order to analyses the speech signal frequencies. The speech signal is then compressed, after removing low and less intense frequencies, to produce a well compressed speech signal and ensure the quality of the speech. The resulting compressed speech is then used as an input in a scrambling algorithm that was proposed on two levels. One of these is an external scramble that works on mixing up the segments of speech that were divided using Fuzzy C-Means and changing their locations. The internal scramble scatters the values of each block internally based on the pattern of a Sudoku puzzle and quadratic map so that the resulting speech is an input to a proposed encryption algorithm using the threefish algorithm. The proposed algorithm proved to be highly efficient in the compression and encryption of the speech signal based on approved statistical measures.
Imperceptible and secure image watermarking using DCT and random spread techn...TELKOMNIKA JOURNAL
Watermarking is a copyright protection technique, while cryptography is a message encoding
technique. Imperceptibility, robustness, and safety are aspects that are often investigated in watermarking.
Cryptography can be implemented to increase watermark security. Beaufort cipher is the algorithm
proposed in this research to encrypt watermark. The new idea proposed in this research is the utilization of
Beaufort key for watermark encryption process as well as for spread watermark when inserted as PN
Sequence substitute with the aim to improve imperceptibility and security aspects. Where PN Sequence is
widely used in spread spectrum watermarking technique. Based on the experimental results and testing of
the proposed method proved that imperceptibility and watermark security are increased. Improved
imperceptibility measured by PSNR rose by about 5dB and so did the MSE score better. Robustness
aspect is also maintained which has been proven by the excellent value of NCC.
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
Steganography is the art and science of hiding the actual important information under graphics, text, cover file etc. These techniques may be applied without fear of image destruction because they are more integrated into the image. Information can be in the form of text, audio, video. The purpose of steganography is to covert communication and to hide a message from a third party or intruder. Steganography is often confused with cryptography because the two are similar in the way that both are used to protect confidential information. Though there are many types of steganography, video Steganography is more reliable due to high capacity image, more data embedment, perceptual redundancy etc. This research paper deals with various Video Steganography techniques and algorithms including Spatial Domain, Pseudorandom permutations, TPVD (Tri-way pixel value differencing), Motion Vector Technique, Video Compression, and Motion Vector Technique. The Video compression which uses modern coding techniques to reduce redundancy in video data has been also studied and analyzed. In fact, Video compression operates on square-shaped groups or blocks of neighboring pixels, often called macro blocks. These pixel groups or blocks of pixels are compared from one frame to the next and the video compression code sends only the differences within those blocks. Generally, the motion field in video compression is assumed to be translational with horizontal component and vertical component and denoted in vector form for the spatial variables in the underlying image, such as three steps search, etc. The study also discusses and focusses on the evolution of the Video Steganography techniques and algorithms over the years based on its application and subsequent merits and demerits. Further, Advanced Video Steganography Algorithm/Bit Exchange Method based on the bit shifting and XOR operation in the secret message file has been studied and implemented. The encrypted secret message is embed in the cover file in alternate byte. The bits are substituted in LSB & LSB+3 bits in the cover file. Finally, the simulation and evaluation of the above mentioned approach is performed using MATLAB tools.
Securing Image Transmission Using in- Compression Encryption TechniqueCSCJournals
Multimedia is one of the most popular data shared in the Web, and the protection of it via encryption techniques is of vast interest. In this paper, an Optimized Multiple Huffman Tables (OMHT) technique is proposed to face some compression and security problems found in Multiple Huffman Tables (MHT) technique. OMHT depends on using statistical-model-based compression method to generate different tables from the same data type of images or videos to be encrypted leading to increase compression efficiency and security of the used tables. A systematic study on how to strategically integrate different atomic operations to build a multimedia encryption system is presented. The resulting system can provide superior performance over both generic encryption and its simple adaptation to multimedia in terms of a joint consideration of security, bitrate overhead. The effectiveness of this scheme is verified through a series of experiments, and the robustness of our approach is demonstrated by comparing it against a standard compression technique, JPEG.
DIGITAL VIDEO SOURCE IDENTIFICATION BASED ON GREEN-CHANNEL PHOTO RESPONSE NON...csandit
This paper proposes a simple but yet an effective new method for the problem of digital video camera identification. It is known that after an exposure time of 0.15 seconds, the green
channel is the noisiest of the three RGB colour channels [5]. Based on this observation, the digital camera pattern noise reference, which is extracted using only the green channel of the frames and is called Green-channel Photo Response Non-Uniformity (G-PRNU), is exploited as
a fingerprint of the camera. The green channels are first resized to a standard frame size (512x512) using bilinear interpolation. Then the camera fingerprint is obtained by a wavelet
based denoising filter described in [4] and averaged over the frames. 2-D correlation coefficient is used in the detection test. This method has been evaluated using 290 video sequences taken by four consumer digital video cameras and two mobile phones. The results
show G-PRNU has potential to be a reliable technique in digital video camera identification,and gives better results than PRNU.
An improved security and message capacity using AES and Huffman coding on ima...TELKOMNIKA JOURNAL
Information security is very important and has been widely implemented. Cryptography and steganography are two common methods that can be implemented to secure and conceal the information. In this research, the proposed AES algorithm for cryptography and DWT for steganography. However, in case of implementing DWT as steganography, there is a weakness which is a lower capacity. Based on DWT’s problem, proposed Huffman Coding to reduce the total of the message’s bit and increase the capacity. In the implementation, a message will be processed by using AES and compressed by using Huffman Coding then conceal in a cover using DWT. After doing several experiments using a 128x128 pixel message image and a 512x512 pixel of the cover image, achieved the average of MSE is 1.5676 and the average of PSNR result is above 40 db which is 46.1878.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An LSB Method Of Image Steganographic TechniquesIJERA Editor
The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. As sharing of sensitive information via a common communication channel has become inevitable. Steganography means hiding a secret message (the embedded message) within a larger one (source cover) in such a way that an observer cannot detect the presence of contents of the hidden message [1]. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet [2]. This paper intends to give an overview of image Steganography, its uses and techniques. It also attempts to identify the requirements of a good Steganography algorithm and briefly reflects on which Steganography techniques are more suitable for which applications.
Noise reduction in speech processing using improved active noise control (anc...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Noise reduction in speech processing using improved active noise control (anc...eSAT Journals
Abstract An improved feed forward adaptive Active Noise Control (ANC) scheme is proposed by using Voice Activity Detector (VAD) and wiener filtering method. The ‘speech-plus-noise’ periods and ‘noise-only’ periods are separated using VAD and the unwanted noise is removed by adaptive filtering method. By using Speech Distortion Weighted- Multichannel Wiener Filtering (SDW-MWF) algorithm the noise periods which is present along with the speech signal, is processed and filtered out. The background noise along with the speech samples are removed by the iterative procedure of filtering process. Feed forward based ANC is used to achieve a system with a better noise reduction in speech processing. Adaptive filtering process is carried out and the speech signal without the background noise can be achieved. Key Words: Active Noise Control (ANC), Noise reduction, Adaptive filtering, Feed forward ANC
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYcsandit
Rapid increase in data transmission over internet results in emphasis on information security.
Audio steganography is used for secure transmission of secret data with audio signal as the
carrier. In the proposed method, cover audio file is transformed from space domain to wavelet
domain using lifting scheme, leading to secure data hiding. Text message is encrypted using
dynamic encryption algorithm. Cipher text is then hidden in wavelet coefficients of cover audio
signal. Signal to Noise Ratio (SNR) and Squared Pearson Correlation Coefficient (SPCC)
values are computed to judge the quality of the stego audio signal. Results show that stego
audio signal is perceptually indistinguishable from the cover audio signal. Stego audio signal is
robust even in presence of external noise. Proposed method provides secure and least error
data extraction.
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
Internet which is ever more accessible to interference by not with authority people over the World. It is important to bring down a chance of Information being sensed while Transmitting is the major issue these days. To overcome these problems one of the solution is cryptography. There will be no solitude once it is decoded. So hiding data to make it confidential. Copyright is one of the ways for hiding data and it is security for digital media. Its significance and techniques used in executing hiding of data let us see in brief. The existing LSB modification technique as in this approach the bits are randomly distributes the bits of message in image so which will becomes complex for anonymous persons to extract original message information, it opens the gates for loosing important hidden information. Here hiding and extraction method is used for AVI (Audio Video Interleave). As Higher order coefficients maintains Secret message bits. The hidden information will be in the form of gray scale image pixel values. Grayscale value then converted into binary values .The resultant binary values will be assigned to the higher order coefficient values of DCT of AVI video frames. These experiments were successful. We can analyze the results using Mat lab simulation software.
In this study, we present how digital steganography can be analyzed in computer forensic. Computer forensics is a scientific study of computers in a manner consistent with the principles of the rules of evidence and court rules of procedure.
Steganography is a state of art that is used for hiding information within different media. In this paper, we will discuss how the criminal can use steganography to hide evidence and tracks, and how the steganalysis for computer forensic can be done. There are different types of steganography, such as image, text, video, and audio steganography, all will be discussed in detail. The paper will focus on how the investigator can detect the steganography in all its forms using several techniques. The main goal of this paper is to assist computer forensics investigators in knowing how the criminals can conduct their crimes and obscure evidence from computer systems using steganography techniques.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
The combination of steganography and
cryptography is considered as one of the best security methods
used for message protection, due to this reason, in this paper, a
data hiding system that is based on image steganography and
cryptography is proposed to secure data transfer between the
source and destination. Animated GIF image is chosen as a
carrier file format for the steganography due to a wide use in web
pages and a LSB (Least Significant Bits) algorithm is employed to
hide the message inside the colors of the pixels of an animated
GIF image frames. To increase the security of hiding, each frame
of GIF image is converted to 256 color BMP image and the
palette of them is sorted and reassign each pixels to its new index,
furthermore, the message is encrypted by LZW ( Lempel _
Ziv_Welch) compression algorithm before being hidden in the
image frames. The proposed system was evaluated for
effectiveness and the result shows that, the encryption and
decryption methods used for developing the system make the
security of the proposed system more efficient in securing data
from unauthorized users. The system is therefore, recommended
to be used by the Internet users for establishing a more secure
communication
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...IJECEIAES
Compression and encryption of speech signals are essential multimedia technologies. In the field of speech, these technologies are needed to meet the security and confidentiality of information requirements for transferring huge speech signals via a network, and for decreasing storage space for rapid retrieval. In this paper, we propose an algorithm that includes hybrid transformation in order to analyses the speech signal frequencies. The speech signal is then compressed, after removing low and less intense frequencies, to produce a well compressed speech signal and ensure the quality of the speech. The resulting compressed speech is then used as an input in a scrambling algorithm that was proposed on two levels. One of these is an external scramble that works on mixing up the segments of speech that were divided using Fuzzy C-Means and changing their locations. The internal scramble scatters the values of each block internally based on the pattern of a Sudoku puzzle and quadratic map so that the resulting speech is an input to a proposed encryption algorithm using the threefish algorithm. The proposed algorithm proved to be highly efficient in the compression and encryption of the speech signal based on approved statistical measures.
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION ijcsit
Biometrics data recently has become a major role in determining the identity of the person. With such
importance for the use of biometrics data, there are many attacks that threaten the security and integrity of
biometrics data itself. Therefore, it becomes necessary to protect the originality of biometrics data against
manipulation and fraud. This paper presents an authentication technique to achieve the authenticity of
speech signals based on adaptive watermarking technique. The basic idea is depends on extracting the
speech features from the speech signal initially and then using these features as a watermark. The
watermark information embeds into the same speech signal. The short time energy technique is used to
identifying the suitable positions for embedding the watermark in order to avoid the regions that used in
the speech recognition system. After exclusion the important areas that used in speech recognition the
Genetic Algorithm (GA) is used to generate random locations to hide the watermark information in an
intelligent manner. The experimental results have achieved high efficiency in establishing the authenticity
of speech signal and the process of embedding
Speech encryption by multiple chaotic maps with fast fourier transform IJECEIAES
There are various ways of social communication including writing (WhatsApp, Messenger, Facebook, Twitter, Skype, etc), calling (mobile phone) and voice recording (record your voice and then send it to the other party), but there are ways to eavesdropping the calls and voice messages, One way to solve this problem is via cryptographic approach. Chaos cryptography build on top of nonlinear dynamics chaotic system has gained some footstep in data security. It provides an alternative to conventional cryptography built on top of mathematical structures. This research focuses on the protection of speech recording by encrypting it with multiple encryption algorithms, including chaotic maps (Logistic Map and Sine Maps).
Encrypting an audio file based on integer wavelet transform and hand geometryTELKOMNIKA JOURNAL
A new algorithm suggested for audio file encryption and decryption utilizing integer wavelet transform to take advantage of the property for adaptive context-based lossless audio coding. In addition, biometrics are used to give a significant level of classification and unwavering quality because the procedure has numerous qualities and points of interest. The offered algorithm utilized many properties of hand geometry estimations as keys to encode and decode the audio file. Many tests were carried out on a set of audio files and quality metrics such as mean square error and correlations were calculated which in turn confirmed the efficiency and quality of the work.
A METHOD FOR ENCRYPTING AND DECRYPTINGWAVE FILESIJNSA Journal
This paper aims at presenting a novel method for encrypting and decrypting wave files. Basically, the target files are sound files. First, the files are fetched, then a two-dimensional matrix of the double data type is created to maintain the values that correspond to the sample range; these values are placed in a
column matrix then they are kept in the two dimensional-matrix already created. The double 2D matrix will be encrypted using matrix multiplication with a private double matrix key [1]. Having been encrypted, the data will be sent in wave file format and decrypted using the same 2D matrix private key.
DWT-SMM-based audio steganography with RSA encryption and compressive samplingTELKOMNIKA JOURNAL
Problems related to confidentiality in information exchange are very important in the digital computer era. Audio steganography is a form of a solution that infuses information into digital audio, and utilizes the limitations of the human hearing system in understanding and detecting sound waves. The steganography system applies compressive sampling (CS) to the process of acquisition and compression of bits in binary images. Rivest, Shamir, and Adleman (RSA) algorithms are used as a system for securing binary image information by generating encryption and decryption key pairs before the process is embedded. The insertion method uses statistical mean manipulation (SMM) in the wavelet domain and low frequency sub-band by dividing the audio frequency sub-band using discrete wavelet transform (DWT) first. The optimal results by using our system are the signal-to-noise ratio (SNR) above 45 decibel (dB) and 5.3833 bit per second (bps) of capacity also our system has resistant to attack filtering, noise, resampling and compression attacks.
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
Audio Steganography Coding Using the Discreet Wavelet TransformsCSCJournals
The performance of audio steganography compression system using discreet wavelet transform (DWT) is investigated. Audio steganography coding is the technology of transforming stego-speech into efficiently encoded version that can be decoded in the receiver side to produce a close representation of the initial signal (non compressed). Experimental results prove the efficiency of the used compression technique since the compressed stego-speech are perceptually intelligible and indistinguishable from the equivalent initial signal, while being able to recover the initial stego-speech with slight degradation in the quality .
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Speech signal encryption decryption using noise signal and
1. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [49]
SPEECH SIGNAL ENCRYPTION-DECRYPTION USING NOISE SIGNAL AND
PMT
Prof. Yousif Eltous
Dr. Akram Moustafa Hamarchi
Dr. Mohammad S. Khrisat
Dr. Saleh A. Khawatreh
Prof. Ziad Alqadi
Albalqa Applied University, Al Al-Bayt University, Al-Ahliyya Amman University
yousifeltous@yahoo.com
jamarchi@yahoo.com
mkhrisat@bau.edu.jo
skhawatreh@ammanu.edu.jo
natalia_maw@yahoo.com
ABSTRACT
Digital signals, and those including the audio signal, are among the most important types of digital data circulating in
the Internet and through various social media.
The digital audio signal may contain confidential information, or the signal may be of a personal nature, which
requires preventing its understanding from unauthorized entities or persons and therefore this signal must be
encrypted.
In this paper, we will discuss a new method for encrypting the audio signal based on redistributing the signal range
values and on adding a specific noise signal.
The method will be run to measure its efficiency and the extent to which it achieves the level of security and
protection. We will compare this method with other methods used to indicate the preference of the proposed method.
Keywords:
Speech, PMT, MSE, PSNR, encryption time, decryption time, throughput, speedup, noise.
INTRODUCTION
Digital signals [1], [2], [3], among them the sound [4], [5] and color digital picture[17], [18], are among the
most important types of data circulating between people and different institutions because of these types of
importance and wide use in many important and vital applications [6], [7], [8].
The digital signal may carry confidential information [22], [23], [24] or it may be of a personal nature [9], [10].
In these cases, it is necessary to prevent people and unauthorized parties from understanding this signal[33],
[34] or deciphering it to know the content of the digital signal [35], [36], 37], which requires us to provide a safe
way to protect this signal [25], [26], [38].
The audio signal is an analogue signal that is converted into a digital signal through the use of an analogue to
digital converter[19]m [20], [21], which applies as shown in figure 1 sampling and quantization operations to
get the speech signal samples values [11], [12], [13].
2. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [50]
Figure 1: Converting speech analogue signal to digital
Based on the foregoing, the digital audio signal can be dealt with as a single-column array (mono speech) or an
array of two columns (stereo speech) consisting of a set of values that indicate the signal range (amplitude) in
different time periods [13], [14], and the number of these values (samples) is determined by the frequency ratio
(sampling frequency) used in the process of conversion [15], [16].
Signal encryption-decryption methods
Signal encrypting means obtaining a destructive and incomprehensible signal from the original signal [25[, [26],
[27]. As for decrypting, it means obtaining a signal that is completely identical to the original signal and without
losing any information from it [28], [29]. Many existing method of cryptography are based on using a private
key and some arithmetic and logic operations to implement encryption-decryption as shown in figure 2 [30],
[31], [32].
Figure 2: Encryption-decryption process
When using a specific method, the following must be taken into consideration [33], [34], [35]:
- The peak-to-signal ratio between the original signal (PSNR) and the encrypted one must be very low
(Mean square error (MSE)) must very high.
- PSNR value between the original signal and the decrypted one must be very high (MSE must be closed
to zero).
- Encryption, decryption time must be very small, making the process to increase the throughput
(number of samples manipulated in a unit of time (second)) [36], [37], [38].
- The method must provide a high level of security and protection by making the process of hacking
impossible or even very difficult [39], [40].
Many methods were introduced to encrypt-decrypt color image, some of these methods were based on image
blocking and XORING the created blocks by a private key [31], [32], [33], [35], [41], [45]. In [36], a method
based on matrix multiplication of the original image and a special generated private key matrix [30]. In [41] the
3. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [51]
authors used matrix reordering principle, while in [43] the encryption was based on based on 3D Chaotic Cat
Maps. In [44] the authors introduced a method based on Rubik's Cube principle; these methods will be
implemented to make comparisons with the proposed here method.
The proposed method
The proposed method of speech signal encryption-decryption as shown in figure 3 is based on the following:
Figure 3: Proposed method block diagram
1) A noise signal of huge number of samples is to be generated, this signal must be saved and it will be
used as a private key.
2) From the noise signal we have to extract a segment with size equal the speech signal size, this segment
must be added to the original signal.
3) A partition map table (PMT) must be created, this table is to be used as another private key, and it is
used to divide the signal into partitions, then the partitions must reordered to get the encrypted signal,
table 1 shows an example of used PMT in our experiments:
Table 1: PMT example
Partition number Location Size Order after rearrangement
1 1 2000 3
2 2001 5500 5
3 7501 27500 2
4 35001 60000 4
5 95001 Variable depending on
speech size
1
Figure 4 shows how add/subtract a noise signal to/from a simple signal, while figure 5 illustrates the effect of
using PMT.
4. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [52]
-10 0 10
-1
-0.5
0
0.5
1
Original signal
-10 0 10
-2
-1.5
-1
Noise signal
-10 0 10
-3
-2
-1
0
Adding noise
-10 0 10
-1
-0.5
0
0.5
1
Subtracting noise
Figure 4: Adding/subtracting noise signal
-10 -5 0 5 10
-1
0
1
Original signal
-10 -5 0 5 10
-1
0
1
Rearranged signal
-10 -5 0 5 10
-1
0
1
Encrypted Signal
-10 -5 0 5 10
-1
0
1
Decrypted Signal
Figure 5: Rearranging the signals using PMT
The proposed method requires an initialization step, in this step we have to generate a noise signal of huge size
to cover any treated speech signal, this noise signal is to be saved and kwon for the sender and receiver.
The encryption phase can be implemented applying the following steps:
a) Get the speech signal.
b) Retrieve the signal size.
c) Reshape the signal into one raw matrix.
d) Load the noise signal.
e) Extract a segment from the noise signal with size equal to the speech signal size.
f) Add the extracted noise to the speech signal.
g) Select the partitions (location and size of each partition) by creating PMT.
h) Reorder the partitions and update PMT
i) Save PMT
j) Combine the encrypted signal and reshape it to the original.
The decryption phase can be implemented applying the following steps:
a) Get the encrypted speech signal.
b) Retrieve the signal size.
c) Reshape the signal into one raw matrix.
d) Get PMT
5. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [53]
e) Reorder the signal according to PMT.
f) Load the noise signal.
g) Extract a segment from the noise signal with size equal to the speech signal size.
h) Subtract the extracted noise to the speech signal.
i) Combine the decrypted signal and reshape it to the original.
Implementation and experimental results
The proposed method was implemented using various speech signals, figure 6 shows a sample output of one
implementation, while figure 7 shows selected set values of each speeches.
0 2 4
x 10
5
-0.4
-0.3
-0.2
-0.1
0
0.1
0.2
0.3
0.4
0.5
Amplitude
Original
0 2 4
x 10
5
-1.5
-1
-0.5
0
0.5
1
1.5
Time (Seconds)
Encrypted
0 2 4
x 10
5
-0.4
-0.3
-0.2
-0.1
0
0.1
0.2
0.3
0.4
0.5
Decrypted
Figure 6: Implementation sample outputs
Figure 7: Outputs sample values
The proposed method was implemented using the speech files recorded with sampling frequency equal to 48000
samples per second; these speeches represent different spoken sentences, table 2 shows the used in the implementation
process speech signals.
Table 2: The used speech signals
Speech number Spoken sentence Size (samples)
1 My name is ziad alqadi and I am from Jordan 250809
6. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [54]
2 Stay home stay safe 136566
3 Amman is the capital city of Jordan 199778
4 Good morning every one 144600
5 Good evening ladies and gentles men 181909
6 Albalq Applied University 160994
7 Faculty of engineering technology 188378
8 Computer engineering department 161539
9 Communication technology department 173328
10 Digital signal processing, human speeches 245301
Average 184320
During the encryption-decryption processes each speech signal was divided into 5 partitions as shown in the PMT in
table 1, the number of partitions can be varied and it is not fixed, but the same partitions must be used in the
encryption and decryption phases.
Tables 3 and 4 show the results of implementation:
Table 3: Encryption phase results
Speech
# ET(seconds)
MSE between original and encrypted
speeches
PSNR between original and encrypted
speeches
Throughput (samples per
second)
1 0.0150 0.3447 52.7906 15646000
2 0.0040 0.3441 52.7982 34142000
3 0.0140 0.3442 52.7961 14270000
4 0.0050 0.3430 52.8118 28920000
5 0.0130 0.3431 52.8110 13993000
6 0.0110 0.3458 52.7760 14636000
7 0.0130 0.3419 52.8254 14491000
7. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [55]
8 0.0060 0.3422 52.8216 26923000
9 0.0120 0.3415 52.8310 14444000
10 0.0170 0.3442 52.7963 14429000
Average 0.0110 0.3435 52.8058 19189400
Table 4: Decryption phase results
Speech
#
ET(seconds) MSE between original and encrypted
speeches
PSNR between original and encrypted
speeches
Throughput (samples per
second)
1 0.0150 6.6754e-035 389.9200 15646000
2 0.0040 5.0453e-035 391.1359 34142000
3 0.0140 5.6269e-035 390.6621 14270000
4 0.0050 5.4640e-035 390.7897 28920000
5 0.0130 5.7121e-035 390.5969 13993000
6 0.0110 5.9182e-035 390.4429 14636000
7 0.0130 4.9074e-035 391.2563 14491000
8 0.0060 5.2802e-035 390.9383 26923000
9 0.0120 4.4161e-035 391.7144 14444000
10 0.0170 5.6580e-035 390.6382 14429000
0.0110 5.3365e-035 390.8095 19189400
From the obtained experimental results shown in tables 3 and 4 we can see the following:
- PSNR value between the original speech signal and the encrypted one is low (High MSE), which means that
the encryption process destroys the original signal and made it destructive and incomprehensible signal.
- PSNR value between the original speech signal and the decrypted one is high (low MSE), which means that
the decryption process generates a signal identical to the original.
- The encryption decryption times are very low, thus the provide method provides a high throughput.
8. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [56]
- The provide method provide a high security and protection level by using two keys the noise signal and PMT
and it is difficult to know or guess them.
- The propose method has some advantages comparing with other methods results by increasing the process
throughput, and it has a speedup always greater than one as shown in table 5
Table 5: Results comparisons
Method Encryption time (s) Decryption time (s) Speedup of the proposed
method
Order
Proposed SSEAM 0.0110 0.0110 `1 1
Ref. [29] 0.0513 0.0513 4.6636 2
Ref. [39] 0.06469 0.062727 5.8809 3
Ref. [40] 0.23 0.23 20.9091 5
Ref. [41] 0.5 0.5 45.4545 7
Ref. [42] 0.4 0.4 36.3636 6
Ref. [43] 0.12 0.12 10.9091 4
Ref. [44] v.1 0.56 0.56 50.9091 8
Ref [45] v.2 1.01 1.01 91.8182 9
Conclusion
A simple method of speech signal encryption-decryption was proposed, this method is highly secure and protected by
using two keys; the noise signal and PMT. The proposed method was implemented using various speech signals, and
the obtained experimental results showed that the proposed is very efficient and it satisfies the requirement of
encryption-decryption process.
References
[1] Matrouk, A Al-Hasanat, H Alasha'ary, Z Al-Qadi, H Al-Shalabi, Speech fingerprint to identify isolated word person, World
Applied Sciences Journal, vol. 31, issue 10, pp. 1767-1771, 2014.
[2] Jamil Azzeh, Bilal Zahran, Ziad Alqadi, Salt and Pepper Noise: Effects and Removal, International Journal on
Informatics Visualization, vol. 2, issue 4, pp. 252-256, 2018.
[3] Ayman Al-Rawashdeh, Ziad Al-Qadi, Using wave equation to extract digital signal features, Engineering,
Technology & Applied Science Research, vol. 8, issue 4, pp. 1356-1359, 2018.
[4] ] Ziad AA Alqadi, Investigation and analysis of mat lab models used to solve second order linear ODE,
International Journal on Numerical and Analytical Methods in Engineering, vol. 2, issue 1, 2014.
[5] Ziad A AlQadi Amjad Y Hindi, O Dwairi Majed, PROCEDURES FOR SPEECH RECOGNITION USING LPC
AND ANN, International Journal of Engineering Technology Research & Management, vol. 4, issue 2, pp. 48-55,
2020.
[6] Ziad Alqad, Prof. Yousf Eltous Dr. Ghazi M. Qaryouti, Prof. Mohammad Abuzalata, Analysis of Digital Signal
Features Extraction Based on LBP Operator, International Journal of Advanced Research in Computer and
Communication Engineering, vol. 9, issue 1, pp. 1-7, 2020.
[7] Amjad Y. Hindi, Majed O. Dwairi, Ziad A. AlQadi, Creating Human Speech Identifier using WPT, International
Journal of Computer Science and Mobile Computing, vol. 9, issue 2, pp. 117 – 123, 2020.
[8] Ismail Shayeb, Ziad Alqadi, Jihad Nader, Analysis of digital voice features extraction methods, International
Journal of Educational Research and Development, vol. 1, issue 4, pp. 49-55, 2019.
[9] Aws Al-Qaisi, Saleh A Khawatreh, Ahmad A Sharadqah, Ziad A Alqadi, Wave File Features Extraction Using
Reduced LBP, International Journal of Electrical and Computer Engineering, vol. 8, issue 5, pp. 2780, 2018.
[10] Prof. Yousif Eltous Dr. Amjad Hindi, Prof. Ziad Alqadi, Dr. Ghazi M. Qaryouti, Prof. Mohammad Abuzalata,
Using FIR Coefficients to Form a Voiceprint, International Journal of Innovative Research in Electrical, Electronics,
Instrumentation and Control Engineering, vol. 8, issue 1, pp. 1-6, 2020.
9. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [57]
[11] Dr. Ghazi M. Qaryouti, Prof. Mohammad Abuzalata, Prof. Yousf Eltous, Prof. Ziad Alqadi, Comparative Study
of Voice Signal Features Extraction Methods, IOSR Journal of Computer Engineering (IOSR-JCE), vol. 22, issue 1,
pp. 58-66, 2020.
[12] Amjad Y. Hindi, Majed O. Dwairi, Ziad A. AlQadi, Analysis of Digital Signals using Wavelet Packet Tree,
IJCSMC, vol. 9, issue 2, pp. 96-103, 2020.
[13] Yousf Eltous Ziad A. AlQadi, Ghazi M. Qaryouti, Mohammad Abuzalata, ANALYSIS OF DIGITAL SIGNAL
FEATURES EXTRACTION BASED ON KMEANS CLUSTERING, International Journal of Engineering
Technology Research & Management, vol. 4, issue 1, pp. 66-75, 2020.
[14] Prof. Yousif Eltous, Dr. Ghazi M. Qaryouti, Prof. Mohammad Abuzalata, Prof. Ziad Alqadi, Evaluation of Fuzzy
and C_mean Clustering Methods used to Generate Voiceprint, IJCSMC, vol. 9, issue 1, pp. 75 -83, 2020.
[15] Majed O. Al-Dwairi, Amjad Y. Hendi, Mohamed S. Soliman, Ziad A.A. Alqadi, A new method for voice signal
features creation, International Journal of Electrical and Computer Engineering (IJECE), vol. 9, issue 5, pp. 4092-
4098, 2019.
[16] Dr. Amjad Hindi Dr. Majed Omar Dwairi Prof. Ziad Alqadi, PROCEDURES FOR SPEECH RECOGNITION
USING LPC AND ANN, International Journal of Engineering Technology Research & Management, vol. 4, issue 2,
pp. 48-55, 2020.
[17] Haitham Alasha'ary, Abdullah Al-Hasanat, Khaled Matrouk, Ziad Al-Qadi, Hasan Al-Shalabi, A Novel Digital
Filter for Enhancing Dark Gray Images, European Journal of Scientific Research , pp. 99-106, 2014.
[18] Majed O Al-Dwairi, Ziad A Alqadi, Amjad A Abujazar, Rushdi Abu Zneit, Optimized true-color image
processing, World Applied Sciences Journal, vol. 8, issue 10, pp. 1175-1182, 2010.
[19] Jamil Al Azzeh, Hussein Alhatamleh, Ziad A Alqadi, Mohammad Khalil Abuzalata, Creating a Color Map to be
used to Convert a Gray Image to Color Image, International Journal of Computer Applications, vol. 153, issue 2, pp.
31-34, 2016.
[20] Musbah J. Aqel, Ziad A. Alqadi, Ibraheim M. El Emary, Analysis of Stream Cipher Security Algorithm, Journal
of Information and Computing Science, vol. 2, issue 4, pp. 288-298, 2007.
[21] Jamil Al-Azzeh, Ziad Alqadi, Mohammed Abuzalata, Performance Analysis of Artificial Neural Networks used
for Color Image Recognition and Retrieving, International Journal of Computer Science and Mobile Computing, vol.
8, issue 2, pp. 20 – 33, 2019.
[22] Amjad Y Hindi, Majed O Dwairi, Ziad A AlQadi, A Novel Technique for Data Steganography, Engineering,
Technology & Applied Science Research, vol. 9, issue 6, pp. 4942-4945, 2019.
[23] Mutaz Rasmi Abu Sara Rashad J. Rasras, Ziad A. AlQadi, A Methodology Based on Steganography and
Cryptography to Protect Highly Secure Messages, Engineering, Technology & Applied Science Research, vol. 9,
issue 1, pp. 3681-3684, 2019.
[24] Dr. Amjad Hindi, Dr. Ghazi M. Qaryouti, Prof. Yousif Eltous, Prof. Mohammad Abuzalata, Prof. Ziad Alqadi,
Color Image Compression using Linear Prediction Coding, International Journal of Computer Science and Mobile
Computing, vol. 9, issue 2, pp. 13 – 20, 2020.
[25] Prof. Ziad Alqadi, Dr. Mohammad S. Khrisat, Dr. Amjad Hindi, Dr. Majed Omar Dwairi, USING SPEECH
SIGNAL HISTOGRAM TO CREATE SIGNAL FEATURES, International Journal of Engineering Technology
Research & Management, vol. 4, issue 3, pp. 144-153, 2020.
[26] Ziad A. AlQadi, A Highly Secure and Accurate Method for RGB Image Encryption, IJCSMC, vol. 9, issue 2, pp.
12-21, 2020.
10. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [58]
[27] Belal Zahran Rashad J. Rasras, Ziad Alqadi, Mutaz Rasmi Abu Sara, Developing new Multilevel security
algorithm for data encryption-decryption (MLS_ED), International Journal of Advanced Trends in Computer Science
and Engineering, vol. 8, issue 6, pp. 3228-3235, 2020.
[28] Ziad Alqad, Majid Oraiqat, Hisham Almujafet, Salah Al-Saleh, Hind Al Husban, Soubhi Al-Rimawi, A New
Approach for Data Cryptography, International Journal of Computer Science and Mobile Computing, vol. 8, issue 9,
pp. 30-48, 2019.
[29] Majed O Al-Dwairi, A Hendi, Z AlQadi, An efficient and highly secure technique to encrypt-decrypt color
images, Engineering, Technology & Applied Science Research, vol. 9, issue 3, pp. 4165-4168, 2019.
[30] Amjad Y Hendi, Majed O Dwairi, Ziad A Al-Qadi, Mohamed S Soliman, A novel simple and highly secure
method for data encryption-decryption, International Journal of Communication Networks and Information Security,
vol. 11, issue 1, pp. 232-238, 2019.
[31] Ziad Alqadi, Ahmad Sharadqh, Naseem Asad, Ismail Shayeb, Jamil Al-Azzeh, Belal Ayyoub, A highly secure
method of secret message encoding, International Journal of Research in Advanced Engineering and Technology, vol.
5, issue 3, pp. 82-87, 2019.
[32] Prof. Ziad Alqadi, Dr. Mohammad S. Khrisat, Dr. Amjad Hindi, Dr. Majed Omar Dwairi, Simple and Highly
Secure, Efficient and Accurate Method (SSEAM) to Encrypt-Decrypt Color Image, International Journal of
Advanced Research in Computer and Communication Engineering, vol. 9, issue 4, pp. 64-69, 2020.
[33] Amjad Y Hendi, Majed O Dwairi, Ziad A Al-Qadi, Mohamed S Soliman, A novel simple and highly secure
method for data encryption-decryption, International Journal of Communication Networks and Information Security,
vol. 11, issue 1, pp. 232-238, 2019.
[34] Ziad Alqadi, Ahmad Sharadqh, Naseem Asad, Ismail Shayeb, Jamil Al-Azzeh, Belal Ayyoub, A highly secure
method of secret message encoding, International Journal of Research in Advanced Engineering and Technology, vol.
5, issue 3, pp. 82-87, 2019.
[35] Rushdi Abu Zneit, Jamil Al-Azzeh, Ziad Alqadi, Belal Ayyoub, Ahmad Sharadqh, Using Color Image as a
Stego-Media to Hide Short Secret Messages, IJCSMC, Vol. 8, Issue 6, pp. 106 –123, 2019.
[36] Qazem Jaber Rashad J. Rasras, Mohammed Abuzalata, Ziad Alqadi, Jamil Al-Azzeh, Comparative Analysis of
Color Image Encryption-Decryption Methods Based on Matrix Manipulation, IJCSMC, vol. 8, issue 3, pp. 14-26,
2019.
[37] Jamil Al-Azzeh, Bilal Zahran, Ziad Alqadi, Belal Ayyoub, Muhammed Mesleh, A Novel Based On Image
Blocking Method To Encrypt-Decrypt Color, International Journal on Informatics Visualization, vol. 3, issue 1, pp.
86-93, 2019.
[38] Jamil Al-Azzeh, Ziad Alqadi, Qazem Jaber, A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt
Digital Images, INTERNATIONAL JOURNAL ON INFORMATICS VISUALIZATION, VOL 3 (2019) NO 3, pp.
262-265.
[39] S. Wang, Y. Zheng, Z. Gao, “A New Image Scrambling Method through Folding Transform”, IEEE International
Conference on Computer Application and System Modeling, Taiyuan, China, October 22-24, 2010.
[40] G. Ye, “An Efficient Image Encryption Scheme based on Logistic maps”, International Journal of Pure and
Applied Mathematics, Vol. 55, No. 1, pp. 37-47, 2009.
[41] T. Sivakumar, R. Venkatesan, “A Novel Image Encryption Approach using Matrix Reordering”, WSEAS
Transactions on Computers, Vol. 12, No. 11, pp. 407-418, 2013.
11. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [59]
[42] H. Gao, Y. Zhang, S. Liang, D. Li, “A New Logistic maps for Image Encryption”, Chaos- Solutions & Fractals,
Vol. 29, No. 2, pp. 393- 399, 2006.
[43] G. Chen, Y. Mao, C. K. Chui, “A Symmetric Image Encryption Scheme based on 3D Chaotic Cat Maps”, Chaos,
Solutions & Fractals, Vol. 21, No. 3, pp. 749–761, 2004.
[44] K. Loukhaoukha, J. Y. Chouinard, A. Berdai, “A Secure Image Encryption Algorithm Based on Rubik's Cube
Principle”, Journal of Electrical and Computer Engineering, Vol. 2012, Article ID 173931, pp. pp. 1-13, 2012.
[45] X. Wang, J. Zhang, “An Image Scrambling Encryption using Chaos-controlled Poker Shuffle Operation”, IEEE
International Symposium on Biometrics and Security Technologies, Islamabad, Pakistan, April 23-24, 2008.