Index
A
finding fractional lag,
101
open-loop pitch period estimation,
99
perceptual weighting filter,
98
search range for pitch period,
101
Adaptive codebook ID,
105
Adaptive differential pulse code modulation (ADPCM) system,
65,
69,
114,
116,
154,
156
backward, encoder and decoder,
70
forward, encoder and decoder,
69
Adaptive embedding quantizer, functions of,
72
Adaptive schemes
backward gain-adaptive quantizer,
68
forward gain-adaptive quantizer,
66
Algebraic codebook
Algebraic code excited linear prediction (ACELP)-based scheme
of speech information hiding and extraction,
104
Analogue scrambling
in secure communication methods,
42
Analysis-by-synthesis (ABS) algorithm,
53
information hiding algorithm,
56
Analysis-by-synthesis (ABS) methods,
50
based speech information,
81
Analysis-by-synthesis (ABS) scheme,
41
notations and abbreviations,
46
Analysis-by-synthesis speech information hiding (ABS-SIH),
32,
81
calculation complexity analysis,
58
embedding method, schematic diagram of,
54
hiding capacity and effect,
57
public speech and composite speech in spectrum,
61
of public speech and composite speech in wave,
60
of secret speech in spectrum,
63
of secret speech in wave,
62
traditional information hiding technologies, test results of,
58
extraction algorithms,
52,
81
extraction method, schematic diagram of,
55
filter similarity,
46,
48
information extraction algorithm,
55
information hiding algorithm,
54
linear predictive coefficients (LPCs)
coefficients substitution based on filter similarity,
50,
62
substitution algorithm,
51
LPC-IH-FS and BD-IE-MES algorithms,
63
secret speech information hiding,
52
selection of test parameters,
56
performance evaluation,
56
test initial parameters setup,
57
Anonymity, in communication,
6
Antifake, in communication,
8
Aoki, Naofumi
telephony communications, steganography technique for,
15
Audio signals
human ear characteristic of,
20
Autocorrelation expression,
100
Autoregressive (AR) model,
41,
46
B
Bark spectral distortion (BSD),
12
Beijing Comsys Technologies Co. Ltd.,
159
Bell Telephone Laboratory,
11
Bit error rate (BER),
144
Blind detection technique,
32,
55
C
Capability of noise tolerance (CNT),
127,
131
Cepstrum parameter, calculation,
21
Channel coding technique,
136
Chaotic secure communication methods,
3,
4
Cipher algorithm, strength of,
5
Closed-loop optimization,
82
Code excited linear prediction (CELP),
81
based on ABS principle,
82
encoder
based on ABS principle, block diagram,
82
generic, block diagram of,
84
key components of, block diagram,
83
speech production model,
81,
82
type speech coding scheme,
89
vector quantization (VQ),
85
Coding
algebraic codebook structure,
97
digital media, copyright protection for,
7
information hiding methods
network technology, development of,
1
secure
information hiding, applications of,
7
information hiding concepts,
4
Composite speech spectrum,
111
Conjugate-structure algebraic-code-excited linear prediction (CS-ACELP),
56,
97
marking in communication,
6
protection for communication, in digital media,
7
protection in communication,
8
Covert communication
based on VoIP system,
127
Cryptoanalysis techniques,
153
Cryptographic pseudonumber computer simulation,
4
D
Data communications equipment (DCE),
144
Data confidentiality, in communication,
8
Data embedding, in communication,
7
Data integrity, in communication,
9
Data sending buffer, flow chart of,
149
Data terminal equipment (DTE),
144
Diagnostic acceptability measure (DAM),
12
Diagnostic rhyme test (DRT),
12
Differential pulse code modulation (DPCM),
65
Digital coding, method for,
10
Digital signal processor (DSP),
18,
161
Digital speech communications systems,
15
Digital watermarking, in communication,
6
Digitized encryption
in secure communication methods,
2
Discrete cosine transform (DCT),
22
Discrete Fourier transform (DFT),
22,
44
Discrete wavelet transform (DWT),
154
Dual-tone multifrequency signaling (DTMF),
97
E
ElGamal signature scheme,
32,
34
Embedding secret speech, experiment of,
77
Encoding, principle of,
132
Erlang B distribution,
31
Excitation synthesis filter,
92
Extracted secret speech spectrum,
111
Extraction scheme,
90,
108
F
Fingerprinting, in communication,
7
Fixed codebook index,
132
Formant synthesis filter,
102
G
G.711
based adaptive speech information hiding approach,
18
G.721-adaptive differential pulse code modulation (ADPCM) coder,
71
Gain-adaptive quantizer,
120
G.721-based speech information hiding approach
adaptive differential pulse code modulation,
69
backward, encoder and decoder,
70
forward, encoder and decoder,
69
backward gain-adaptive quantizer,
68
forward gain-adaptive quantizer,
66
classical information hiding technologies, test results for,
80
composite speech spectrum,
79
composite speech waveform,
79
differential pulse code modulation (DPCM),
65
experiment results and analysis,
77
extracted secret speech spectrum,
79
extracted secret speech waveform,
79
hide secret speech approach,
71
public speech spectrum,
79
public speech waveform,
78
secret speech spectrum,
78
secret speech waveform,
78
G.728-based speech information hiding approach
code excited linear prediction,
81
composite speech spectrum,
94
experiment results and analysis,
93
performance test result of,
93
extracted secret speech spectrum,
94
hide secret speech approach,
90
hiding and extraction, CELP-based scheme of,
87
speech information extraction,
90
low-delay-code excited linear prediction (LD-CELP)
decoder, block diagram for,
86
encoder, block diagram for,
86
public speech spectrum,
94
secret speech spectrum,
94
G.729-based speech information hiding approach
ACELP-based scheme of,
104
carrier speech spectrum,
111
coder, bit allocation for,
103
algebraic codebook structure,
97
composite speech spectrum,
111
decoder, block diagram of,
104
encoder
open-loop pitch period estimation procedure for,
100
experiment results and analysis,
110
extracted secret speech spectrum,
111
hide secret speech approach into G.729,
108
extraction algorithm,
110
secret speech spectrum,
111
Global system for mobile telecommunications (GSM),
56
excitation generator,
120
filtering, and coding,
117
LPC quantization and interpolation,
117
sampling grids used in,
119
prediction-error filter,
117
impulse and frequency response of,
119
Graphical user interface (GUI),
150
adaptive codebook in,
106
implementation of ABS-based algorithm,
18
GSM (RPE-LTP)-based speech information hiding approach
approach to hide secret speech,
120
extraction algorithm,
121
carrier speech spectrum,
124
composite speech spectrum,
124
composite speech wave,
124
effect and hiding capacity, test result of,
125
experiment results and analysis,
122
extracted secret speech spectrum,
125
extracted secret speech wave,
125
RPE-LTP coding scheme,
114
secret speech spectrum,
123
G.72x-based communications,
34
H
Huang, Y F., covert communication,
17
Human auditory system (HAS),
19
Hybrid embedding methods,
130
I
Identity matrix,
n-order augmented,
134
Immeasurability, definition of,
9
Important information bits (IIB),
44
Information extraction with blind detection-based minimum mean square error (MES-BD),
4
Information hiding methods,
3
least significant bit (LSB),
19
digital media, copyright protection for,
7
Information-hiding model
application, general model for,
30
Extracted Secret Data,
31
parts of
communication channels,
27
for speech secure communication,
27
communication channels,
27
Information hiding techniques,
131
International Information Hiding Science Conference 1996,
4
International Telecommunications Union (ITU-T) standard,
65
Internet Engineering Task Force (IETF’s),
16
Internet Protocol (IP) networks,
127
Invisibility, definition of,
9
J
Japan National Defense Academy
method to embed secret messages,
14
K
Key subliminal channel (KSC),
32
L
Labeling
LCELP-based speech information extraction scheme,
108
Least significant bit (LSB),
19,
153
Levinson-Durbin algorithm,
47
Linear predictive coefficients (LPCs),
45,
47,
50,
83
ABS codec systems, structure of,
43
ABS speech coding scheme,
45,
49
coefficient substitution based on filter similarity,
50
parameters substitution for secret speech information hiding based on filter similarity,
4
substitution algorithm,
51
substitution approach, based on filter similarity,
62
Linear predictive coefficients (LPCs)-IH-FS algorithm,
94
Linear predictive filter (LPF) coefficient,
105
Linear spectrum frequency (LSF),
47,
107
Line spectrum pairs (LSPs),
88,
132
Logarithm area ratio (LARs),
117
Lost audio packets steganography (LACK),
16,
17
Low-delay-code excited linear prediction (LD-CELP),
12,
56
backward adaptive prediction in,
85
M
Man-machine interface,
162
Mazurczyk, Wojciech
VoIP steganography methods,
16
Mean opinion score (MOS),
12,
56
Minimum square error (MSE)
Mixed excitation linear prediction (MELP),
31,
56
encoded secret speech,
136
Modulated complex lapped transform (MCLT),
22
Moulin, Pierre
information-theoretic analysis of,
15
Multimedia programming,
147
data sending buffer flow chart,
150
file processing flow chart,
149
implementation levels,
148
schematic diagram of,
148
PC-based speech secure communication experimental system, GUI of,
151
data embedding/extraction module,
152
data encryption/decryption module,
152
RCC communication module,
151
speech collecting/playing module,
151
speech encoding/decoding module,
151
Multipulse excitation model,
114
N
Nonrepudiation, in communication,
8
Normalized correlation coefficient,
57
Normalized cumulative correlation coefficient (NCCC),
56
O
Objective evaluation method,
12
regular-pulse excitation, illustration of,
115
O’Sullivan, Joseph A.
information-theoretic analysis of,
15
P
Perceptual evaluation speech quality (PESQ) value,
138
Perceptual weighting filter,
83,
84,
98
Petitcolas, Fabien A. P.,
15
Physical scanning process,
159
Pierre Moulin’s theory,
33
Point-to-point covert communication,
6
p-order predictor
Power spectrum density (PSD),
78
Prediction-error sequence,
114
Private branch exchange (PBX),
1
Protocol data unit (PDU)-based embedding methods,
130
Public switched telephone network (PSTN),
1,
27,
34,
93,
127,
152
Pulse coding modulation (PCM),
93
signal, preprocessing of,
88
Q
QPSK coded modulation,
156
R
Real-time control protocol (RTCP),
16
Real-time speech secure communication design design and realization based on PC,
144
coding scheme selection,
147
multimedia programming,
147
permutator-based encryption scheme,
158
RSA-like encryption scheme,
158
secure communication plan,
143
functional requirements,
145
requirements analysis,
144
speech information hiding telephone (SIHT),
152
computational load distribution,
161
robustness of information hiding,
153
encryption and decryption,
157
speech coder and speech decoder,
156
speech embedding scheme,
155
speech information hiding scheme,
155
Real-time transport protocol (RTP),
16,
128
Reflection coefficients (RCs),
116
Regular pulse excitation-long-term prediction (RPE-LTP),
56
multipulse excitation model,
114
speech coding paradigm,
113
Regular-pulse excitation scheme,
115
Regular pulse excited linear prediction coding (RPE-LPC) algorithm,
11
Regular singular (RS) algorithm,
18
like approach, for speech encryption,
158
Robustness, definition of,
9
S
Secret/confidential message,
5
Secret speech information,
163
Secret speech information extraction with blind detection based on minimum mean square error (BD-IE-MES),
23,
55
Secret speech spectrum,
94
Secret speech subliminal channel (SSSC),
18
cipher algorithm, strength of,
5
information hiding concepts,
4
speech secure technology,
2
Session initiation protocol (SIP),
7,
16,
128
Signal-to-noise ratio (SNR),
11
coding methods, types of,
11
speech signals, redundancy of,
10
MOS levels and descriptions,
14
objective evaluation method,
12
performance comparisons of,
14
subjective evaluation method,
12
Speech echo hiding method,
21
Speech information extraction,
90
Speech information hiding algorithms,
41
Speech information hiding model,
31
experiments and results analysis,
37
carrier speech, spectrum of,
39
composite speech, spectrum of,
39
extracted secret speech, spectrum of,
39
secret speech, spectrum of,
39
speech quality
segment average
Itakura distance
DM,
36
speech energy variation
δ,
36
uniform correlation coefficient,
35
Speech information hiding telephone (SITH),
18,
80,
112,
143
architecture details,
161
computational load distribution,
161
based on information hiding techniques,
163
block distribution of,
156
robustness of information hiding,
153
encryption and decryption,
157
speech coder and speech decoder,
156
speech embedding scheme,
155
speech information hiding scheme,
155
Speech quality
segment average
Itakura distance
DM,
36
speech energy variation
δ,
36
uniform correlation coefficient,
35
Speech secure communication
abbreviations used in,
29
information-hiding model for,
27
as communication problem,
29
real-time speech secure communication,
27
speech information hiding model,
28,
31
Speech security communication test system,
145
segmentation, procedure,
49
Steganographic methods,
129
speech information hiding telephone (SIHT),
154
technique for DVI-ADPCM transactions,
16
technique for telephony communications,
15
in VoIP-based covert communication system
Steganography algorithm,
138
Subjective evaluation method,
12
Synchronization mechanism,
20
Synthetic composite speech
Synthetic speech, quality of,
12
T
Tolerant information bits (TIB),
44
Transcoding steganography (TranSteg),
17
V
Vector quantization (VQ),
47,
132
Very large scale integrated circuits (VLSI),
10
Voice over broadband (VoBB),
127
Voice over Internet Protocol (VoIP),
1,
127
covert communication based on,
17
regular singular (RS) algorithm,
18
session control protocols,
128
sliding window-based steganalysis,
18
stacks and protocols,
128
VoIP-based covert communication system,
127
carrier speech and stego speech
cover bits selection scheme,
136
embedding method, classifications of,
129
experiment results and analysis,
138
G.729 speech flows, embedding secret speech into,
131
accumulation inversion, DSNR value of,
133
embedding approach based on matrix coding,
134
single-bit inversion, DSNR value of,
133
modeling and realization of,
130
spectrum in frequency domain, comparison of,
141
steganography
voice over internet protocol (VoIP) system,
127
stacks and protocols,
128
waveform in time domain, comparison of,
140
W
Waveform
in time domain, comparison of,
140
Z
Zhijun, Wu
in secure communication,
18
speech information hiding telephone (SITH),
18