Font Size: a A A

Methods And Algorithms For Steganography Protection Of The Speech Signal

Posted on:2022-06-04Degree:MasterType:Thesis
Country:ChinaCandidate:Mishina OlgaFull Text:PDF
GTID:2518306572965399Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Communication of people by means of oral speech is considered one of the most frequently used ways of exchanging and transmitting information.Currently,there are technologies that allow their users to falsify oral speech.From which it follows that communication by means of oral speech needs to be protected.There are several directions that can provide digital protection of the transmitted message,which is a sound recording of oral speech.These areas include both methods of steganography and cryptography.Both steganography and cryptography are designed to protect information,but their ideology differs significantly.Cryptography encrypts a message to protect its contents.At the same time,you can only decrypt the message with a key.And when the message is already decrypted,the protection is removed,and the privacy is no longer preserved.In steganography,unlike cryptography,the existence of a message is unknown to anyone,except for the recipient and sender.This ensures the secrecy of the protection.When using Cryptography,the message can be intercepted by attackers.And when using steganography,an attacker may not even know that a steganographic message exists.From this we can conclude that steganography not only protects a confidential message,but also ensures the security of the sender and recipient.Therefore,steganography and cryptography can be combined to provide a higher level of security for transmitted oral speech.From the beginning,the message is encrypted using cryptography,and then the encrypted message is hidden inside the digital object.A term associated with the combination of steganography and cryptography digital fingerprints.A digital fingerprint is an identifier in the form of a secret encrypted message located inside an object,which allows you to highlight its uniqueness relative to similar objects.In other words,"digital fingerprint" refers to the process of identifying and secretly writing an encrypted message into code that is already inherent in the object.This is often seen as a method used to track authorized users.The difference between digital fingerprints and digital watermarks is the origin of the hidden encrypted message of the unique code and the way it is encoded.In digital watermarks,a code is an arbitrary message containing information about the property.A digital fingerprint is a sequence formed by the transmitted data and the ID of the authorized user.This sequence is then converted to a unique but significantly shorter number or string.It is worth noting that the digital fingerprint consists of three main parts,namely:a hash encoder that uses the authorized user ID and an analyzer of the transmitted data,a device for embedding and a detector.In the theoretical part of the work,mathematical models of forming a hash sequence using the authorized user's ID and the structure of the transmitted data,which is a sound recording,will be considered.The mathematical foundations of methods of covert information introduction are described.The practical part contains:-a scheme for covert implementation of a digital fingerprint;-digital fingerprint identification scheme;-algorithm for generating a digital fingerprint hash sequence;-algorithm for covert introduction of a digital fingerprint;-digital fingerprint extraction algorithm;-digital fingerprint identification algorithm.Purpose work: To develop a scheme for the introduction of a digital footprint into the sound recording of oral speech,with providing of secrecy.Target of the research: code representation of sound recording of oral speech.Subject of study: the method of forming a digital footprint.Research objectives:1.Overview of approaches to code representation of sound.2.Analyze the methods of forming the hash function.3.Analysis of methods and problems of ensuring the secrecy and persistence of information.4.Development of a scheme and a software prototype,encoding/decoding a digital fingerprint into a sound recording with ensuring its secrecy.5.Evaluation of the efficiency of the method of sound recording protection and the stability of the encoded information.
Keywords/Search Tags:Steganography, Cryptography, Information security, Data transmission, Hashing, Digital print
PDF Full Text Request
Related items