Skip to main content

Critical analysis of security in voice hiding techniques

  • Session 6: Security Evaluation
  • Conference paper
  • First Online:
Book cover Information and Communications Security (ICICS 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1334))

Included in the following conference series:

Abstract

This paper provides a comparative assessment of detection in certain voice hiding techniques. The assessment is based on the complexity of breaking the stego key, the robustness of the hiding techniques, and the stego transmission rate. Unlike cryptography, to break the stego key in voice communication requires not only an extensive search but also estimation techniques for determining the values of parameters used in data embedding. We also consider disturbing embedded data in case resource constraints are imposed.

Research supported by the Office of Naval Research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R. (1996) “Stretching the Limits of Steganography”. In Proceedings of Information Hiding Workshop, University of Cambridge, pp. 39–48.

    Google Scholar 

  2. Bender, W., Gruhl, D., Morimoto, N. & Lu, A. (1996) “Techniques for data hiding”. IBM Systems Journal, Vol 35, NOS 3&4, pp. 313–336.

    Google Scholar 

  3. Bogert, B., Healy, M. & Tukey, J. (1963) “The Quefrency Analysis of Time Series for Echoes”. Proc. Symp. on Time Series Analysis, (ed. Rosenblatt, M.), pp. 209–243, Wiley

    Google Scholar 

  4. Chang, L. (1997) “Analysis of Hiding Data in Speech Signal”. in preparation.

    Google Scholar 

  5. Cox, I., Kilian, J., Leighton, T. & Shamoon, T. (1995) “Secure Spread Spectrum Watermarking for Multimedia”. NEC Research Institute, TR 95-10.

    Google Scholar 

  6. Dixon, R. (1994) Spread Spectrum Systems with Commercial Applications. John Wiley & Sons.

    Google Scholar 

  7. Gruhl, D., Lu, A. & Bender, W. (1996) “Echo Hiding”. In Proceedings of Information Hiding Workshop, University of Cambridge, pp. 295–315.

    Google Scholar 

  8. Hall, D (1972) Journal of the Acoustical Society, 1972 Vol 51, pp. 1863–1871 & 1872–1881.

    Article  Google Scholar 

  9. Flanagan, D. (1972) Speech Analysis. Springer-Verlag.

    Google Scholar 

  10. Kang, G. (1985) “Narrowband Integrated Voice Data System Based on the 2400b/s LPC”. NRL TR 8942.

    Google Scholar 

  11. Meadows, C. and Moskowitz, 1. (1996) “Covert Channels—A Context Based View”. In Proceedings of Information Hiding Workshop, University of Cambridge, pp. 73–94.

    Google Scholar 

  12. Pierce, H. (1995) The Science of Musical Sound. Freeman.

    Google Scholar 

  13. Pfitzmann, B. (1996) “Information Hiding Terminology”. In Proceedings of Information Hiding Workshop, University of Cambridge, pp. 347–350.

    Google Scholar 

  14. Proakis, J. (1996) Digital Communication. McGraw-Hill.

    Google Scholar 

  15. Schneier, B. (1996) Applied Cryptography. Wiley.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yongfei Han Tatsuaki Okamoto Sihan Qing

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Chang, L., Moskowitz, I.S. (1997). Critical analysis of security in voice hiding techniques. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028476

Download citation

  • DOI: https://doi.org/10.1007/BFb0028476

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63696-0

  • Online ISBN: 978-3-540-69628-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics