Neuro-Genetic based Speech Processing for Promoting Global Cyber Security using Steganography technique

T. S. Sinha, G. Sanyal
{"title":"Neuro-Genetic based Speech Processing for Promoting Global Cyber Security using Steganography technique","authors":"T. S. Sinha, G. Sanyal","doi":"10.1109/INDCON.2006.302799","DOIUrl":null,"url":null,"abstract":"The goal of cryptography is to provide confidentiality and privacy by encrypting the information. If any unauthorized human body does cryptanalysis then this goal may be defeated. In this paper the authors have attempted an algorithm called STEG_NGBSP (steganography/neuro-genetic based speech processing) using a technique called steganography that inherits some features of cryptography in such a way, that the information is encrypted as well as hidden. The methodology adopted here is the concept of null ciphers, which are extracted from the speech signal of a Bengali speaker using neuro-genetic approach. The speech signal is processed and then veiled with an image. Every image is encapsulated with some information, which may be decrypted at the receivers end using the master image-voiced frame, in which the speech data is covered by another image. The proposed algorithm is unique in handling the security measures from steganalysis, thus promoting global cyber security and bridging the gap between the computer and the user with more security through natural language processing","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 Annual IEEE India Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDCON.2006.302799","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

The goal of cryptography is to provide confidentiality and privacy by encrypting the information. If any unauthorized human body does cryptanalysis then this goal may be defeated. In this paper the authors have attempted an algorithm called STEG_NGBSP (steganography/neuro-genetic based speech processing) using a technique called steganography that inherits some features of cryptography in such a way, that the information is encrypted as well as hidden. The methodology adopted here is the concept of null ciphers, which are extracted from the speech signal of a Bengali speaker using neuro-genetic approach. The speech signal is processed and then veiled with an image. Every image is encapsulated with some information, which may be decrypted at the receivers end using the master image-voiced frame, in which the speech data is covered by another image. The proposed algorithm is unique in handling the security measures from steganalysis, thus promoting global cyber security and bridging the gap between the computer and the user with more security through natural language processing
利用隐写技术促进全球网络安全的神经遗传语音处理
密码学的目标是通过加密信息来提供机密性和隐私性。如果任何未经授权的人体进行密码分析,那么这个目标可能会失败。在本文中,作者尝试了一种名为STEG_NGBSP(隐写/基于神经遗传的语音处理)的算法,该算法使用一种称为隐写的技术,该技术继承了密码学的一些特征,以这种方式加密信息并隐藏信息。本文采用的方法是零密码的概念,利用神经遗传学方法从孟加拉语说话者的语音信号中提取零密码。对语音信号进行处理,然后用图像掩盖。每个图像都封装了一些信息,这些信息可以在接收端使用主图像-语音帧进行解密,其中语音数据被另一个图像覆盖。该算法在处理隐写分析的安全措施方面具有独特性,从而促进全球网络安全,并通过自然语言处理更安全地弥合计算机与用户之间的差距
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信