Critical analysis of security in voice hiding techniques

This paper provides a comparative assessment of detection in certain voice hiding techniques. The assessment is based on the complexity of breaking the stego key, the robustness of the hiding techniques, and the stego transmission rate. Unlike cryptography, to break the stego key in voice communication requires not only an extensive search but also estimation techniques for determining the values of parameters used in data embedding. We also consider disturbing embedded data in case resource constraints are imposed.

[1]  Ira S. Moskowitz,et al.  Covert Channels - A Context-Based View , 1996, Information Hiding.

[2]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[3]  A.P. Benguerel,et al.  Speech analysis , 1981, Proceedings of the IEEE.

[4]  John R. Pierce,et al.  The science of musical sound , 1983 .

[5]  John G. Proakis,et al.  Digital Communications , 1983 .

[6]  Ross Anderson,et al.  Information hiding terminology , 1996 .

[7]  J. L. Hall Auditory Distortion Products f2−f1 and 2f1−f2 , 1972 .

[8]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[9]  Walter Bender,et al.  Echo Hiding , 1996, Information Hiding.

[10]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.