Skip to main content

Security Analysis of Scalable Speech Coders

  • Conference paper
  • First Online:
  • 824 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 664))

Abstract

Scalable speech coders have been developed in order to achieve efficient speech communication over mobile ad hoc networks (MANETS). In practice, selective encryption is used with scalable speech coders to provide security of speech data. This paper analyzes the scalable ADPCM coders with selective encryption scheme where only core bits of coded speech are encrypted. The parameters of the coder have been identified by analyzing the selectively encrypted speech. The methodology developed is based on signal processing techniques. Autocorrelation method and power spectral density have been used to extract the bit rate and align the core and enhancement bits. Further zero crossing rate and Fourier Transform operations are used to detect speech-pause regions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Siva Ram Murthy, C., Manoj, B.S..: Ad Hoc Wireless Networks Architectures and Protocols. Pearson Education (2004)

    Google Scholar 

  2. Earle, A.E.: Wireless Security Handbook. Auerbach Publication (2006)

    Google Scholar 

  3. Servetti, A., De Martin, J.C.: Perception-based partial encryption of compressed speech. IEEE Trans. Speech Audio Process. 10, 637–643 (2002)

    Google Scholar 

  4. Gibson, J.D., Servetti, A., Dong, H., Gersho, A., Lookabaugh, T., De Martin, J.C.: Selective encryption and scalable speech coding for voice communication over multi-hop wireless links. In: IEEE Military Communication Conference (MILCOM), pp. 792–798 (2004)

    Google Scholar 

  5. Dong, H., Chakares, I.D., Lin, C.H., Gersho, A., Belding-Royer, E., Madhow, U., Gibson, J.D.: Speech Coding for Mobile Ad hoc Networks. Research work supported by NSF, University of California

    Google Scholar 

  6. Dong, H., Gibson, J.D.: Structure for SNR scalable speech coding. IEEE Trans. ASL Process. 14(2) (2006)

    Google Scholar 

  7. Dong, H.: SNR and Bandwidth Scalable Speech Coding. Ph.D. thesis, Southern Methodist University, Dalas, Texas (2002)

    Google Scholar 

  8. ITU-T: 5-, 4-, 3- and 2-bit/ sample Embedded Adaptive Differential Pulse Code Modulation (ADPCM) (1990)

    Google Scholar 

  9. ISO/IEC JTCI SC29/WG11, ISO/IEC FDIS 14496-3: Information Technology-Coding of Audiovisual Objects- Part 3: Audio (1998)

    Google Scholar 

  10. Meshram, P., Bhaisare, P., Karale, S.J.: Comparative study of selective encryption algorithm for wireless adhoc network. In: JREAS, vol. 2, pp. 506–517 (2012)

    Google Scholar 

  11. Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Trans. Sig. Process. 3, 2439–2451 (2000)

    Google Scholar 

  12. Alattar, A.M., AI-Regib, G.I.: Evaluation of selective encryption techniques for secure transmission of MPEG-compressed bit-stream. In: IEEE International Symposium on Circuits and Systems, pp. 340–343 (1999)

    Google Scholar 

  13. Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Google Scholar 

  14. Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Pearson Education (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richa Tyagi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tyagi, R., Malhotra, K., Khosla, A. (2018). Security Analysis of Scalable Speech Coders. In: Agrawal, S., Devi, A., Wason, R., Bansal, P. (eds) Speech and Language Processing for Human-Machine Communications. Advances in Intelligent Systems and Computing, vol 664. Springer, Singapore. https://doi.org/10.1007/978-981-10-6626-9_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6626-9_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6625-2

  • Online ISBN: 978-981-10-6626-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics