Abstract
Scalable speech coders have been developed in order to achieve efficient speech communication over mobile ad hoc networks (MANETS). In practice, selective encryption is used with scalable speech coders to provide security of speech data. This paper analyzes the scalable ADPCM coders with selective encryption scheme where only core bits of coded speech are encrypted. The parameters of the coder have been identified by analyzing the selectively encrypted speech. The methodology developed is based on signal processing techniques. Autocorrelation method and power spectral density have been used to extract the bit rate and align the core and enhancement bits. Further zero crossing rate and Fourier Transform operations are used to detect speech-pause regions.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Siva Ram Murthy, C., Manoj, B.S..: Ad Hoc Wireless Networks Architectures and Protocols. Pearson Education (2004)
Earle, A.E.: Wireless Security Handbook. Auerbach Publication (2006)
Servetti, A., De Martin, J.C.: Perception-based partial encryption of compressed speech. IEEE Trans. Speech Audio Process. 10, 637–643 (2002)
Gibson, J.D., Servetti, A., Dong, H., Gersho, A., Lookabaugh, T., De Martin, J.C.: Selective encryption and scalable speech coding for voice communication over multi-hop wireless links. In: IEEE Military Communication Conference (MILCOM), pp. 792–798 (2004)
Dong, H., Chakares, I.D., Lin, C.H., Gersho, A., Belding-Royer, E., Madhow, U., Gibson, J.D.: Speech Coding for Mobile Ad hoc Networks. Research work supported by NSF, University of California
Dong, H., Gibson, J.D.: Structure for SNR scalable speech coding. IEEE Trans. ASL Process. 14(2) (2006)
Dong, H.: SNR and Bandwidth Scalable Speech Coding. Ph.D. thesis, Southern Methodist University, Dalas, Texas (2002)
ITU-T: 5-, 4-, 3- and 2-bit/ sample Embedded Adaptive Differential Pulse Code Modulation (ADPCM) (1990)
ISO/IEC JTCI SC29/WG11, ISO/IEC FDIS 14496-3: Information Technology-Coding of Audiovisual Objects- Part 3: Audio (1998)
Meshram, P., Bhaisare, P., Karale, S.J.: Comparative study of selective encryption algorithm for wireless adhoc network. In: JREAS, vol. 2, pp. 506–517 (2012)
Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Trans. Sig. Process. 3, 2439–2451 (2000)
Alattar, A.M., AI-Regib, G.I.: Evaluation of selective encryption techniques for secure transmission of MPEG-compressed bit-stream. In: IEEE International Symposium on Circuits and Systems, pp. 340–343 (1999)
Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Pearson Education (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tyagi, R., Malhotra, K., Khosla, A. (2018). Security Analysis of Scalable Speech Coders. In: Agrawal, S., Devi, A., Wason, R., Bansal, P. (eds) Speech and Language Processing for Human-Machine Communications. Advances in Intelligent Systems and Computing, vol 664. Springer, Singapore. https://doi.org/10.1007/978-981-10-6626-9_17
Download citation
DOI: https://doi.org/10.1007/978-981-10-6626-9_17
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6625-2
Online ISBN: 978-981-10-6626-9
eBook Packages: EngineeringEngineering (R0)