CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Spectral Magnitude Speech Steganography

by Tamer Rabie, Driss Guerchi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 5
Year of Publication: 2015
Authors: Tamer Rabie, Driss Guerchi

Tamer Rabie, Driss Guerchi . Spectral Magnitude Speech Steganography. International Journal of Computer Applications. 116, 5 ( April 2015), 1-6. DOI=10.5120/20329-2547

@article{ 10.5120/20329-2547,
author = { Tamer Rabie, Driss Guerchi },
title = { Spectral Magnitude Speech Steganography },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 5 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { },
doi = { 10.5120/20329-2547 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T22:56:11.851472+05:30
%A Tamer Rabie
%A Driss Guerchi
%T Spectral Magnitude Speech Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 5
%P 1-6
%D 2015
%I Foundation of Computer Science (FCS), NY, USA

This paper presents a speech-hiding framework that exploits spectral properties of the Fourier magnitude and phase of digital speech signals for the purpose of hiding secret speech messages inside other speech signals for secure transmissions over unsecured networks. The technique used exploits low-pass spectral properties of the speech magnitude spectrum to embed a secret speech signal in the low-amplitude-high-frequency regions of the host speech signal's spectral magnitude. Experimental evaluations on real male and female voice segments show that our technique is capable of hiding one speech message inside another host speech segment to produce a stego speech segment that is indistinguishable from the original host speech, while being able to extract the hidden speech message without any perceived degradations in quality.

  1. Niels Provos and Peter Honeyman, "Hide and seek: An introduction to steganography," in IEEE Security & Privacy Magazine, pp. 32–44. IEEE Computer Society, 2003.
  2. Min Wu and Bede Liu, "Data hiding in image and video:part I - fundamental issues and solutions," IEEE Trans. Image Processing, vol. 12, no. 6, pp. 685–695, June 2003.
  3. Chi Kwong Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, vol. 37, pp. 469–474, 2004.
  4. Kaushal Solanki, Noah Jacobsen, Upamanyu Madhow, B. S. Manjunath, and Shivkumar Chandrasekaran, "Robust image-adaptive data hiding using erasure and error correction," IEEE Trans. Image Processing, vol. 13, no. 12, pp. 1627–1639, December 2004.
  5. A. K. Jain, U. Uludag, and R. L. Hsu, "Hiding a face in a fingerprint image," in Proc. of the International Conference on Pattern Recognition (ICPR), Quebec City, Canada, August 2002.
  6. Lisa M. Marvel, Jr. Charles G. Boncelet, and Charles T. Retter, "Spread spectrum image steganography," IEEE Trans. Image Processing, vol. 8, no. 8, pp. 1075–1083, August 1999.
  7. Koichi Nozaki, Michiharu Niimi, Richard O. Eason, and Eiji Kawaguchi, "A large capacity steganography using color bmp images," in ACCV '98: Proceedings of the Third Asian Conference on Computer Vision-Volume I, London, UK, 1998, pp. 112–119, Springer-Verlag.
  8. Fabien AP Petitcolas, Ross J Anderson, and Markus G Kuhn, "Information hiding-A survey," Proceedings of the IEEE, vol. 87, no. 7, pp. 1062–1078, 1999.
  9. Dora M Ballesteros L and Juan M Moreno A, "Real-time, speech-in-speech hiding scheme based on least significant bit substitution and adaptive key," Computers and Electrical Engineering, vol. 39, no. 4, pp. 1192–1203, 2013.
  10. Dmitriy E Skopin, Ibrahim MM El-Emary, Rashad J Rasras, and Ruba S Diab, "Advanced algorithms in audio steganography for hiding human speech signal," in Advanced Computer Control (ICACC), 2010 2nd International Conference on. IEEE, 2010, vol. 3, pp. 29–32.
  11. Tamer Rabie and Driss Guerchi, "Magnitude spectrum speech hiding," in Signal Processing and Communications, 2007. ICSPC 2007. IEEE International Conference on. IEEE, 2007, pp. 1147–1150.
  12. Dora M Ballesteros L and Juan M Moreno A, "Highly transparent steganography model of speech signals using efficient wavelet masking," Expert Systems with Applications, vol. 39, no. 10, pp. 9141–9149, 2012.
  13. B. Geiser, P. Jax, and P. Vary, "Artificial bandwidth extension of speech supported by watermark-transmitted side information," in Proceedings of the 9th European Conference on Speech Communication and Technology (INTERSPEECH 05), Lisbon, Portugal, September 2005, pp. 1497–1500.
  14. A. V. Oppenheim and J. S. Lim, "The importance of phase in signals," Proc. of the IEEE. , vol. 69, no. 5, pp. 529–541, May 1981.
  15. Tamer Rabie, "Frequency-domain data hiding based on the Matryoshka principle," Special Issue on Advances in Video Processing and Security Analysis for Multimedia Communications, Int. J. Advanced Media and Communication, vol. 1, no. 3, 2007.
  16. Douglas O'Shaughnessy, Speech Communications: Human and Machine, Wiley-IEEE Press, 2 edition edition, November 1999.
  17. D Guerchi, H Harmain, T Rabie, and E Mohamed, "Speech secrecy: An fft-based approach," International Journal of Mathematics and Computer Science, vol. 3, no. 2, pp. 1–19, 2008.
  18. R. Salami, C. Laflamme, J. -P Adoul, A. Kataoka, S. Hayashi, T. Moriya, C. Lamblin, D. Massaloux, S. Proust, P. Kroon, and Y. Shoham, "Design and description of cs-acelp: A toll quality 8 kb/s speech coder," IEEE Transactions on Speech and Audio Processing, vol. 6, no. 2, pp. 116–130, March 1998.
  19. Kuldip K Paliwal and Bishnu S Atal, "Efficient vector quantization of lpc parameters at 24 bits/frame," Speech and Audio Processing, IEEE Transactions on, vol. 1, no. 1, pp. 3–14, 1993.
Index Terms

Computer Science
Information Sciences


Voiced Speech Hiding LPC CELP FFT Magnitude Spectrum Phase Separation.