Skip to main content

Design and Implementation of Steganographic Speech Telephone

  • Conference paper
Advances in Multimedia Information Processing – PCM 2007 (PCM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4810))

Included in the following conference series:

Abstract

This paper explains the work to design an information hiding based secure communication system, named covert speech telephone (CST). The overall system is designed over the internet using UDP protocol. Based on a GUI (graphical user interface) software, CST is possible to execute two optional secure modes. It is a completely digital system with high speech quality. Practical effects show that CST can meet the requirement of real-time secure communication. This new technique can effectively guarantee information security in VoIP system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Diez-Del-Rio, L., Moreno-Perez, S.: Secure speech and data communication over the public switching telephone network. In: ICASSP. Acoustics, Speech, and Signal Processing, 1994 IEEE International Conference on ( April 19-22, 1994) vol. ii, pp.II/425–II/428

    Google Scholar 

  2. Eggers, J.J, Bauml, R.: Scalar Costa scheme for information embedding. [J], IEEE Transactions on Signal Processing 51(4), 1003–1019 (2003)

    Article  MathSciNet  Google Scholar 

  3. Wu, Z.-j., Niu, X.-x., Yang, Y.-x.: Design of Speech Information Hiding Telephone. In: Proc, IEEE Int. Conf. Tencon 2002, pp. 113–116 (2002)

    Google Scholar 

  4. Salami, R., Laflamme, C.: ITU-T G.729 Annex A: reduced complexity 8 kb/s CS-ACELP codec for digital simultaneous voice and data. IEEE Communication Magazine 35(9), 56–63 (1997)

    Article  Google Scholar 

  5. Deng, Z., Yang, Z., Deng, L.: A Real-time Secure Voice Communication System Based on Speech Recognition. In: IEEE ICSNC 2006. IEEE International Conference on Systems and Networks Communication, Tahiti, France, p. 22 (2006)

    Google Scholar 

  6. He, J., Liu, L.: Palm: A discriminative training algorithm for VQ-based speaker identification. IEEE Transaction on Speech and Audio Processing 7(3), 353–356 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Horace H.-S. Ip Oscar C. Au Howard Leung Ming-Ting Sun Wei-Ying Ma Shi-Min Hu

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Deng, Z., Yang, Z., Shao, X., Xu, N., Wu, C., Guo, H. (2007). Design and Implementation of Steganographic Speech Telephone. In: Ip, H.HS., Au, O.C., Leung, H., Sun, MT., Ma, WY., Hu, SM. (eds) Advances in Multimedia Information Processing – PCM 2007. PCM 2007. Lecture Notes in Computer Science, vol 4810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77255-2_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77255-2_52

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77254-5

  • Online ISBN: 978-3-540-77255-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics