2012
DOI: 10.1186/1687-4722-2012-20
|View full text |Cite
|
Sign up to set email alerts
|

Speech steganography using wavelet and Fourier transforms

Abstract: A new method to secure speech communication using the discrete wavelet transforms (DWT) and the fast Fourier transform is presented in this article. In the first phase of the hiding technique, we separate the speech high-frequency components from the low-frequency components using the DWT. In a second phase, we exploit the low-pass spectral proprieties of the speech spectrum to hide another secret speech signal in the low-amplitude high-frequency regions of the cover speech signal. The proposed method allows h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0
1

Year Published

2014
2014
2018
2018

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 53 publications
(32 citation statements)
references
References 21 publications
0
31
0
1
Order By: Relevance
“…Information of non-LSB methods are presented in Table 3. These methods include: Addition Method (AM) [10], Amplitude Modulation (AMod) [40], DWT-FFT [41], DWT fusion [42], Mp3Stego [43], Publimark [30], Quantization Index Method (QIM) [10], Stego wave [44], Stochastic Modulation (StMod) [45], WaSpStego [15], Wavelet LSB [10], Integer wavelet (I-Wavelet) [46], and DSSS in the frequency domain (DSSS + DCT) [47]. Table 4 presents the embedding algorithms that each paper has investigated.…”
Section: Discussionmentioning
confidence: 99%
“…Information of non-LSB methods are presented in Table 3. These methods include: Addition Method (AM) [10], Amplitude Modulation (AMod) [40], DWT-FFT [41], DWT fusion [42], Mp3Stego [43], Publimark [30], Quantization Index Method (QIM) [10], Stego wave [44], Stochastic Modulation (StMod) [45], WaSpStego [15], Wavelet LSB [10], Integer wavelet (I-Wavelet) [46], and DSSS in the frequency domain (DSSS + DCT) [47]. Table 4 presents the embedding algorithms that each paper has investigated.…”
Section: Discussionmentioning
confidence: 99%
“…A new method to secure speech communication using the discrete wavelet transforms (DWT) and the fast Fourier transform is presented in [10]. In the first phase of the hiding technique, the speech high-frequency components from the low-frequency components using the DWT are separated.…”
Section: Related Workmentioning
confidence: 99%
“…But the security is not maintained. Rekik et al [5] have provided security to speech communication based on DWT and Fast Fourier Transform. Alturkia et al [6] have proposed hiding the data using DCT Phase modulation.…”
Section: Introductionmentioning
confidence: 99%