VLSI Implementation of Speech Steganography with Advanced Wavelet Transform

Main Article Content

B. Akhila
Shaik Kareena
Makke Nikhitha
Valmeti Karuna Sri
Shaik Shahina

Abstract

In the realm of secure communication systems, the integration of advanced wavelet transforms into speech steganography systems has emerged as a promising path. Secure transmission of sensitive information in military communications, confidential exchange of data in corporate environments, and protection of personal information in telecommunication networks. However, the current system employs conventional methods of speech steganography, relying on basic encryption techniques and simplistic embedding algorithms. While functional, these approaches lack robustness and fail to adequately conceal secret data within speech signals, leaving them vulnerable to detection and interception. So, the proposed system leverages advanced wavelet transforms to enhance the security and efficiency of speech steganography. By exploiting the multi-resolution analysis capabilities of wavelets, the system achieves improved embedding capacity while maintaining perceptual transparency. Additionally, the use of dynamic embedding algorithms based on wavelet coefficients ensures adaptability to varying signal characteristics, enhancing robustness against attacks and noise interference. The VLSI implementation of this system optimizes resource utilization and computational efficiency, making it suitable for real-time applications in communication systems.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Akhila, B., Kareena, S. ., Nikhitha, M., Sri, V. K. ., & Shahina, S. . (2024). VLSI Implementation of Speech Steganography with Advanced Wavelet Transform. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 15(1), 263–268. https://doi.org/10.61841/turcomat.v15i1.14619
Section
Research Articles

References

. Abood, Enas Wahab, Zaid Alaa Hussien, Haifaa Assy Kawi, Zaid Ameen Abduljabbar, Vincent Omollo

Nyangaresi, Junchao Ma, Mustafa A. Al Sibahee, Ali Kalafy, and Saad Ahmad. "Provably secure and

efficient audio compression based on compressive sensing." International Journal of Electrical &

Computer Engineering (2088-8708) 13, no. 1 (2023).

. Mawla, Noura A., and Hussein K. Khafaji. "“Three Layered Model for Audio Steganography." Computers

, no. 8 (2023).

. Nayab, Mohammad Gauhar, Aditya Pratap Singh, Ritik Sharma, and Gaurav Raj. "Reversible Image

Steganography to Achieve Effective PSNR." In International Conference on Information Technology, pp.

-156. Singapore: Springer Nature Singapore, 2023.

. Roselinkiruba, R., T. Sree Sharmila, and JK Josephine Julina. "An efficient Moving object, Encryption,

Compression and Interpolation technique for video steganography." Multimedia Tools and Applications

(2024).

. Sari, Christy Atika, Muhammad Hafizh Dzaki, Eko Hari Rachmawanto, Rabea Raad Ali, and Mohamed

Doheir. "High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using

LSB." International Journal of Intelligent Engineering & Systems 16, no. 4 (2023)..

. Zolfaghari, Behrouz, Hamid Nemati, Naoto Yanai, and Khodakhast Bibak. "The Dichotomy of Crypto

and NN: War and Peace." An audio steganography by a low-bit coding method with wave files, pp. 15-

Cham: Springer Nature Switzerland, 2023.

. Xue, Yiming, Jiaxuan Wu, Ronghua Ji, Ping Zhong, Juan Wen, and Wanli Peng. "Adaptive domaininvariant feature extraction for cross-domain linguistic steganalysis." “Audio Steganography using LSB”

(2023).

. Noorallahzadeh, Mojtaba, Mohammad Mosleh, and Kamalika Datta. "“Data Hiding Technique: Audio

Steganography using LSB Technique." Frontiers of Computer Science 18, no. 6 (2024): 186908.

. Roselinkiruba, R., and G. Bhuvaneshwari. "Feature extraction based pixel segmentation techniques data

hiding and data encryption." Multimedia Tools and Applications (2023): 1-18.

. Hazzazi, Mohammad Mazyad, Raja Rao Budaraju, Zaid Bassfar, Ashwag Albakri, and Sanjay Mishra.

"A Finite State Machine-Based Improved Cryptographic Technique." Mathematics 11, no. 10 (2023):

. Al Hadad, Zeina, and Ibtisam Hassoun Ali. "Survey in Image and Audio Steganography by using the

Deep Learning Methods." Journal of Kufa for Mathematics and Computer 10, no. 2 (2023): 132-139.

. Gutub, Adnan. "Regulating watermarking semi-authentication of multimedia audio via counting-based

secret sharing." Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi 28, no. 2 (2022): 324-332.

. Evsutin, Oleg, Anna Melman, and Ahmed A. Abd El-Latif. "Overview of information hiding algorithms

for ensuring security in IoT based cyber-physical systems." Security and Privacy Preserving for IoT and

G Networks: Techniques, Challenges, and New Directions (2022): 81-115.

. Srinivasarao, G., Penchaliah, U., Devadasu, G. et al. Deep learning based condition monitoring of road

traffic for enhanced transportation routing. J Transp Secur 17, 8 (2024). https://doi.org/10.1007/s12198-

-00271-3

. Semenov, Serhii, Minjian Zhang, O. O. Mozhaiev, N. H. Kuchuk, S. A. Tiulieniev, Yu V. Hnusov, M. O.

Mozhaiev, V. M. Strukov, Yu M. Onyshchenko, and H. A. Kuchuk. "Construction of a model of

steganographic embedding of the UAV identifier into ADS-B data." (2023).

. Hosny, Khalid M., Mohamed A. Zaki, Nabil A. Lashin, Mostafa M. Fouda, and Hanaa M. Hamza.

"Multimedia Security Using Encryption: A Survey." IEEE Access (2023).