VLSI Implementation of Speech Steganography with Advanced Wavelet Transform
Main Article Content
Abstract
In the realm of secure communication systems, the integration of advanced wavelet transforms into speech steganography systems has emerged as a promising path. Secure transmission of sensitive information in military communications, confidential exchange of data in corporate environments, and protection of personal information in telecommunication networks. However, the current system employs conventional methods of speech steganography, relying on basic encryption techniques and simplistic embedding algorithms. While functional, these approaches lack robustness and fail to adequately conceal secret data within speech signals, leaving them vulnerable to detection and interception. So, the proposed system leverages advanced wavelet transforms to enhance the security and efficiency of speech steganography. By exploiting the multi-resolution analysis capabilities of wavelets, the system achieves improved embedding capacity while maintaining perceptual transparency. Additionally, the use of dynamic embedding algorithms based on wavelet coefficients ensures adaptability to varying signal characteristics, enhancing robustness against attacks and noise interference. The VLSI implementation of this system optimizes resource utilization and computational efficiency, making it suitable for real-time applications in communication systems.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
. Abood, Enas Wahab, Zaid Alaa Hussien, Haifaa Assy Kawi, Zaid Ameen Abduljabbar, Vincent Omollo
Nyangaresi, Junchao Ma, Mustafa A. Al Sibahee, Ali Kalafy, and Saad Ahmad. "Provably secure and
efficient audio compression based on compressive sensing." International Journal of Electrical &
Computer Engineering (2088-8708) 13, no. 1 (2023).
. Mawla, Noura A., and Hussein K. Khafaji. "“Three Layered Model for Audio Steganography." Computers
, no. 8 (2023).
. Nayab, Mohammad Gauhar, Aditya Pratap Singh, Ritik Sharma, and Gaurav Raj. "Reversible Image
Steganography to Achieve Effective PSNR." In International Conference on Information Technology, pp.
-156. Singapore: Springer Nature Singapore, 2023.
. Roselinkiruba, R., T. Sree Sharmila, and JK Josephine Julina. "An efficient Moving object, Encryption,
Compression and Interpolation technique for video steganography." Multimedia Tools and Applications
(2024).
. Sari, Christy Atika, Muhammad Hafizh Dzaki, Eko Hari Rachmawanto, Rabea Raad Ali, and Mohamed
Doheir. "High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using
LSB." International Journal of Intelligent Engineering & Systems 16, no. 4 (2023)..
. Zolfaghari, Behrouz, Hamid Nemati, Naoto Yanai, and Khodakhast Bibak. "The Dichotomy of Crypto
and NN: War and Peace." An audio steganography by a low-bit coding method with wave files, pp. 15-
Cham: Springer Nature Switzerland, 2023.
. Xue, Yiming, Jiaxuan Wu, Ronghua Ji, Ping Zhong, Juan Wen, and Wanli Peng. "Adaptive domaininvariant feature extraction for cross-domain linguistic steganalysis." “Audio Steganography using LSB”
(2023).
. Noorallahzadeh, Mojtaba, Mohammad Mosleh, and Kamalika Datta. "“Data Hiding Technique: Audio
Steganography using LSB Technique." Frontiers of Computer Science 18, no. 6 (2024): 186908.
. Roselinkiruba, R., and G. Bhuvaneshwari. "Feature extraction based pixel segmentation techniques data
hiding and data encryption." Multimedia Tools and Applications (2023): 1-18.
. Hazzazi, Mohammad Mazyad, Raja Rao Budaraju, Zaid Bassfar, Ashwag Albakri, and Sanjay Mishra.
"A Finite State Machine-Based Improved Cryptographic Technique." Mathematics 11, no. 10 (2023):
. Al Hadad, Zeina, and Ibtisam Hassoun Ali. "Survey in Image and Audio Steganography by using the
Deep Learning Methods." Journal of Kufa for Mathematics and Computer 10, no. 2 (2023): 132-139.
. Gutub, Adnan. "Regulating watermarking semi-authentication of multimedia audio via counting-based
secret sharing." Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi 28, no. 2 (2022): 324-332.
. Evsutin, Oleg, Anna Melman, and Ahmed A. Abd El-Latif. "Overview of information hiding algorithms
for ensuring security in IoT based cyber-physical systems." Security and Privacy Preserving for IoT and
G Networks: Techniques, Challenges, and New Directions (2022): 81-115.
. Srinivasarao, G., Penchaliah, U., Devadasu, G. et al. Deep learning based condition monitoring of road
traffic for enhanced transportation routing. J Transp Secur 17, 8 (2024). https://doi.org/10.1007/s12198-
-00271-3
. Semenov, Serhii, Minjian Zhang, O. O. Mozhaiev, N. H. Kuchuk, S. A. Tiulieniev, Yu V. Hnusov, M. O.
Mozhaiev, V. M. Strukov, Yu M. Onyshchenko, and H. A. Kuchuk. "Construction of a model of
steganographic embedding of the UAV identifier into ADS-B data." (2023).
. Hosny, Khalid M., Mohamed A. Zaki, Nabil A. Lashin, Mostafa M. Fouda, and Hanaa M. Hamza.
"Multimedia Security Using Encryption: A Survey." IEEE Access (2023).