A Unique Wavelet Steganography Based Voice Biometric Protection Scheme

Full Text (PDF, 197KB), PP.42-47

Views: 0 Downloads: 0

Author(s)

Sanjaypande M. B 1,* Raikoti Sharanabasappa 2

1. VVIET, Mysore, India

2. Research Scholar, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2013.03.06

Received: 10 Oct. 2012 / Revised: 19 Nov. 2012 / Accepted: 25 Dec. 2012 / Published: 8 Mar. 2013

Index Terms

Image Steganography, Audio Steganography, Discrete Wavelet Transform, Spectrum Analysis, Voice Biometric, Voice Recognition

Abstract

Voice biometric is an easy and cost effective biometric technique which requires minimalistic hardware and software complexity. General voice biometric needs a voice phrase by user which is processed with Mel Filter and Vector Quantized features are extracted. Vector quantization reduces the codebook size but decreases the accuracy of recognition. Therefore we propose a voice biometric system where voice file's non quantized code books are matched with spoken phrase. In order to ensure security to such direct voice sample we embed the voice file in a randomly selected image using DWT technique. Imposters are exposed to only images and are unaware of the voice files. We show that the technique produces better efficiency in comparison to VQ based technique.

Cite This Paper

Sanjaypande M. B, Raikoti Sharanabasappa,"A Unique Wavelet Steganography Based Voice Biometric Protection Scheme", IJIGSP, vol.5, no.3, pp.42-47, 2013. DOI: 10.5815/ijigsp.2013.03.06

Reference

[1]K B Shiva Kumar et. al. "Bit length replacement steganography based on DCT coefficients" / International Journal of Engineering Science and Technology. Vol. 2(8), 2010, 3561-3570

[2]K B Shiva Kumar et. al "Hybrid Domain in LSB Steganography" International Journal of Computer Applications (0975 – 8887). Volume 19– No.7, April 2011

[3]K B Shiva Kumar et. al "Steganography Based on Payload Transformation" IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011. ISSN (Online): 1694-0814. www.IJCSI.org

[4]Saddaf Rubab, Dr. M. Younus. "Improved Image Steganography Technique for Colored Images using Huffman Encoding with Symlet Wavelets" IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1, March 2012 ISSN (Online): 1694-0814".

[5]Akram M. Zeki, Adamu A. Ibrahim And Azizah A. Manaf, "Steganographic Software: Analysis and Implementation" International Journal Of Computers And Communications Issue 1, Volume 6, 2012

[6]S. K. Muttoo and Sushil Kumar, "Robust Source Coding Steganographic Technique Using Wavelet Transforms" BVICAM's International Journal of Information Technology.

[7]Kriti Saroha and Pradeep Kumar Singh "A Variant of LSB Steganography for Hiding Images in Audio". International Journal of Computer Applications (0975 – 8887) Volume 11– No.6, December 2

[8]Lalitha.G et al. / International Journal on Computer Science and Engineering (IJCSE), "Secure Transmission of Compound Information Using Image Steganography"

[9]Md. Shafakhatullah Khan et al. "An Optimized Method for Concealing Data using Audio Steganography" International Journal of Computer Applications (0975 – 8887) Volume 33– No.4, November 2011

[10]Pradeep Kumar Singh et. al "Enhancement of LSB based Steganography for Hiding Image in Audio". / (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 05, 2010, 1652-1658

[11]Jayaram et al. "Information Hiding Using Audio Steganography –A Survey"The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011 

[12]Elham Ghasemi, Jamshid Shanbehzadeh, Nima Fassihi. " High Capacity Image Steganography using Wavelet Transform and Genetic Algorithm". Proceedings of the international multiconference of engineers and computer scientists 2011 volI

[13]Minh N.Do, An Automatic speaker Recognition System, Audio Visual Communications Laboratory, Swiss Federal Institute of Technology, Lausanne, Switzarland.

[14]J.W. Cooley and J.W. Tukey, An algorithm for the machine calculation of complex Fourier Series, Mathematics Computation, Vol.19, 1965, pp 297-301.