DocumentCode :
1702523
Title :
User identification and cipher synchronization in speech information hiding
Author :
Zhao, Geng ; Xu, Ping ; Liu, Yi-Xin
Author_Institution :
Commun. Eng. Dept., Beijing Electron. Sci. & Technol. Inst., China
Volume :
2
fYear :
2005
Lastpage :
868
Abstract :
User identification must be done in speech information hiding. To shorten the time of building link and exchanging protocol, this paper presents a technology for fast cross-identification. To enhance the security of communication, encryption should be done before hiding information. After encryption, secure info is hidden in the host info which has been recorded. Since speech communications are on the full-duplex synchronization link and have burst of communications, so we use the same encryption and decryption algorithms on both sides to avoid increasing operation spending which is caused when using different encryption and decryption algorithms. A strict synchronization algorithm is requested; so the cycle buffer synchronization algorithm is presented.
Keywords :
cryptography; data handling; data privacy; feature extraction; identification technology; speech intelligibility; speech recognition; synchronisation; telecommunication security; burst communications; cipher synchronization; communication security; cross-identification technology; cycle buffer synchronization algorithm; decryption algorithms; encryption algorithms; full-duplex synchronization link; link building; operation spending; protocol exchange; secure information; speech communications; speech information hiding; user identification; Circuits; Cryptography; Information security; Modems; Monitoring; Oral communication; Protection; Protocols; Speech processing; Watermarking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications, Circuits and Systems, 2005. Proceedings. 2005 International Conference on
Print_ISBN :
0-7803-9015-6
Type :
conf
DOI :
10.1109/ICCCAS.2005.1495246
Filename :
1495246
Link To Document :
بازگشت