Top Banner
Speech Hiding Reference: “A New Speech Hiding Scheme Based u pon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen Digital Object Identifier: 10.1109/ICICS.20 03.1292605 Speaker: Chung-Yi Wang Adviser: Quincy Wu Date: 2007/6/4
21

Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

Jan 03, 2016

Download

Documents

May Malone
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

Speech HidingReference: “A New Speech Hiding Scheme Based upon Sub-Band Coding”

Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen Digital Object Identifier: 10.1109/ICICS.2003.1292605

Speaker: Chung-Yi WangAdviser: Quincy WuDate: 2007/6/4

Page 2: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 2

outline

Introduction Basic Ideals Flow Chart Results Reference

Page 3: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 3

Introduction(1/3)

A speech technique that protects the speech signal from the peeping of illegal users is proposed

Page 4: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 4

Sender ReceiverNetwork

Illegal user

Sender ReceiverNetwork

Page 5: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 5

Introduction(2/3) Maybe Cryptosystem is not the best solution

Encrypting data make signal be chaotic and meaningless

Chaotic and meaningless signal always be detected by illegal user They want to break it!

Encrypting Data

(DES,AES,IDEA…)

Page 6: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 6

Introduction(3/3)

Embedding the secret speech into another speech (cover speech) could be a good solution Stego speech (cover speech with secret speech) i

s meaningful Illegal users will be perplexed by speech hiding syste

m Even if illegal users detect the Stego speech is fra

ud… They still can’t obtain the secret speech without the pri

vate key since the secret speech is encrypted

Page 7: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 7

Basic Ideals(1/4)

For speech signal, small distortions make difference to human ears

If we could hiding speech but make distortions be small, there is no difference to human ears!

Page 8: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 8

Basic Ideals(2/4)

Speech signal could divide into two band, the high frequency band and low frequency band

High frequency band always is noise alike to human ears

Page 9: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 9

Basic Ideals(3/4)

| ------------------------- Low Frequency Band ------------------------ | | -- High Frequency -- |

Hiding data here!

Page 10: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 10

Basic Ideals(4/4)

Small distortions make difference to human ears Hiding speech but be no difference to human

ears High frequency band always is noise alike to

human ears Hiding data here!

Page 11: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 11

Flow chart

S

C

S’’

1.Compress and Encrypt

Ch

Cl

2.Sub-band

3.Hidden

G

4.Combine

G5.Send

Gh

Gl

6.Sub-band

S’’

7.Construct

S8.Decode

Page 12: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 12

Flow chart Process Cover Speech

CFs

1.Sub-band

ChFs/2

ClFs/2

Cl’Fs/2

2.DPCM or PCM

Ch’Fs/2

Hiding Speech Band

Page 13: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 13

Flow chart Process Cover Speech

Analog

Digital

DPCMP (Differential Pulse Code Modulation)

PCM (Pulse Code Modulation)

Staircase, Finite

Compress

Page 14: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 14

Flow chartProcess Secret Speech

SFs

1.Sub-band

ShFs/2

SlFs/2

Sl’Fs/2

3.DPCM or PCM

2.Drop

1.Noise

2.Reduce bandwidth

Sl’’Fs/24.DES or IDEA

Page 15: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 15

Flow chart Hiding Secret Speech into Cover Speech

0 1 2 3 4S’’ …

0123456789101112131415One

Speech Sample

0 1 2 3 4Ch’ …

Page 16: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 16

Flow chart Hiding Secret Speech into Cover Speech

0123456789101112131415Cover (Ch’)

Speech Sample

0123456789101112131415Secret (Sl’’)

Speech Sample

0123456789101112131415Cover (Ch’)

Speech Sample

0123456789101112131415Cover (Ch’)

Speech Sample

Embedding r bits from Sl’’ into Ch’

(to LSB r bits)

Page 17: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 17

Flow chart Hiding Secret Speech into Cover Speech

How many bits need to pick up?

ns is the bytes of Sl’’, ns x 8 means the sum bits of Sl’’ nC is the number of samples in C

Ch’ has a half of frequency from C, we should count it by nC / 2

m is the number of bits required to store the value of ns

Page 18: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 18

Flow chart Hiding Secret Speech into Cover Speech

For example… ns is 4

nC is 64

m is 16 (bits)

0123456789101112131415

16

0 1 2 3 4 … 3164

r = [4 * 8 / (64/2) – 16]

= 2 (bits)

4

0123456789101112131415

0123456789101112131415

0123456789101112131415

0123456789101112131415

Page 19: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 19

Result

Hiding

Decode

Page 20: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 20

Result

Page 21: Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.

2007/6/4 21

Reference A New Speech Hiding Scheme Based upon Sub-Ba

nd Coding http://ieeexplore.ieee.org/iel5/9074/28789/01292605.pdf

Sub-Band Codinghttp://en.wikipedia.org/wiki/Sub-band_coding

DEShttp://en.wikipedia.org/wiki/Data_Encryption_Standard

IDEAhttp://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm