A speech encryption algorithm based on blind source separation

被引:8
作者
Lin, QH [1 ]
Yin, FL [1 ]
Mei, TM [1 ]
Liang, HL [1 ]
机构
[1] Dalian Univ Technol, Sch Elect & Informat Engn, Dalian 116023, Peoples R China
来源
2004 INTERNATIONAL CONFERENCE ON COMMUNICATION, CIRCUITS, AND SYSTEMS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS | 2004年
关键词
blind source separation; independent component analysis; speech encryption;
D O I
10.1109/ICCCAS.2004.1346350
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a novel speech encryption algorithm based on blind source separation (BSS). Our approach integrates a modified time domain scrambling scheme with an amplitude scrambling method which masks the speech signal with a random noise by specific mixing. The resulting system can securely encrypt the speech files for the purpose of storing speech messages and transmitting them over the Internet. There are two major advantages associated with this system. The first advantage is that it makes the encrypted speech sound like white noise. The second advantage is that it does not impose any restriction on the key space. Our system is systematically evaluated, and it shows a high level of security with excellent audio quality.
引用
收藏
页码:1013 / 1017
页数:5
相关论文
共 15 条
[1]  
Beker H., 1985, SECURE SPEECH COMMUN
[2]   AN INFORMATION MAXIMIZATION APPROACH TO BLIND SEPARATION AND BLIND DECONVOLUTION [J].
BELL, AJ ;
SEJNOWSKI, TJ .
NEURAL COMPUTATION, 1995, 7 (06) :1129-1159
[3]   General approach to blind source separation [J].
Cao, XR ;
Liu, RW .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 1996, 44 (03) :562-571
[4]   Blind signal separation: Statistical principles [J].
Cardoso, JF .
PROCEEDINGS OF THE IEEE, 1998, 86 (10) :2009-2025
[5]   INDEPENDENT COMPONENT ANALYSIS, A NEW CONCEPT [J].
COMON, P .
SIGNAL PROCESSING, 1994, 36 (03) :287-314
[6]   DESIGN AND CRYPTANALYSIS OF TRANSFORM-BASED ANALOG SPEECH SCRAMBLERS [J].
GOLDBURG, B ;
SRIDHARAN, S ;
DAWSON, E .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) :735-744
[7]   Fast and robust fixed-point algorithms for independent component analysis [J].
Hyvärinen, A .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 1999, 10 (03) :626-634
[8]  
KASPRZAK W, 1996, P 13 INT C PATT REC, V2, P394
[9]  
Lee TW, 1997, ADV NEUR IN, V9, P758
[10]   Chaotic cryptosystem with high sensitivity to parameter mismatch [J].
Li, K ;
Soh, YC ;
Li, ZG .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2003, 50 (04) :579-583