期刊论文详细信息
ETRI Journal
PESQ-Based Selection of Efficient Partial Encryption Set for Compressed Speech
关键词: reconstruction attack;    ITU-T G729 speech codec;    multimedia security;    partial encryption;    Wi-Fi;   
Others  :  1185792
DOI  :  10.4218/etrij.09.0108.0508
PDF
【 摘 要 】

Adopting an encryption function in voice over Wi-Fi service incurs problems such as additional power consumption and degradation of communication quality. To overcome these problems, a partial encryption (PE) algorithm for compressed speech was recently introduced. However, from the security point of view, the partial encryption sets (PESs) of the conventional PE algorithm still have much room for improvement. This paper proposes a new selection method for finding a smaller PES while maintaining the security level of encrypted speech. The proposed PES selection method employs the perceptual evaluation of the speech quality (PESQ) algorithm to objectively measure the distortion of speech. The proposed method is applied to the ITU-T G.729 speech codec, and content protection capability is verified by a range of tests and a reconstruction attack. The experimental results show that encrypting only 20% of the compressed bitstream is sufficient to effectively hide the entire content of speech.

【 授权许可】

   

【 预 览 】
附件列表
Files Size Format View
20150520114603916.pdf 863KB PDF download
【 参考文献 】
  • [1]S. Taso, "Research Challenges and Perspectives of Voice over Wireless LAN," Proc. IEEE EITC, Aug. 2005.
  • [2]J. Goodman and A.P. Chandrakasan, "Low Power Scalable Encryption for Wireless Systems," Wireless Networks, no. 4, Jan. 1998, pp. 55-70.
  • [3]H. Xiao and P. Zarrella, "Quality Effects of Wireless VoIP Using Security Solutions," Proc. IEEE MILCOM, vol. 3, Oct. 2004, pp. 1352-1357.
  • [4]R. Chandramouli, S. Bapatla, and K.P. Subbalakshmi, "Battery Power-Aware Encryption," ACM Trans. Information and System Security, vol. 9, no. 2, May 2006, pp. 162-180.
  • [5]A. Servetti and J.C. De Martin, "Perception-Based Partial Encryption of Compressed Speech," IEEE Trans. Speech and Audio Processing, vol. 10, no. 8, Nov. 2002, pp. 637-643.
  • [6]C.-P. Wu and C.-C. J. Kuo, "Fast Encryption Methods for Audio-Visual Data Confidentiality," Proc. SPIE Int. Symp. Information Technologies, vol. 4209, Nov. 2000, pp. 284-295.
  • [7]J.D. Gibson et al., "Selective Encryption and Scalable Speech Coding for Voice Communications over Multi-hop Wireless Links," Proc. MILCOM, vol. 2, Oct. 2004, pp. 792-798.
  • [8]ITU-T Recommendation G.729, Coding of Speech at 8 kbit/s Using Conjugate-Structure Algebraic-Code-Excited Linear Prediction (CS-ACELP), ITU-T, Mar. 1996.
  • [9]K. Swaminathan and A.R. Hammons, "Selective Error Protection of ITU-T G.729 Codec for Digital Cellular Channels," Proc. IEEE ICASSP, vol. 1, May 1996, pp. 577-580.
  • [10]ITU-T Recommendation P.800, Methods for Objective and Subjective Assessment of Quality, ITU-T, Aug. 1996.
  • [11]ITU-T Recommendation P.862, Perceptual Evaluation of Speech Quality (PESQ): An Objective Method for End-to-End Speech Quality Assessment of Narrowband Telephone Networks and Speech Codecs, ITU-T, Jan. 2002.
  • [12]C. Hoene, H. Karl, and A. Wolisz, "A Perceptual Quality Model for Adaptive VoIP Applications," Proc. SPECTS, July 2004.
  • [13]W.C. Chu, Speech Coding Algorithms: Foundation and Evolution of Standardized Coders, John Wiley & Sons, 2003, ch. 11, pp. 299-301.
  • [14]C.-P. Wu and C.-C. J. Kuo, "Design of Integrated Multimedia Compression and Encryption Systems," IEEE Trans. Multimedia, vol. 7, no. 5. Oct. 2005, pp. 828-839.
  • [15]A. Said, "Measuring the Strength of Partial Encryption Schemes," Proc. IEEE ICIP, vol. 2, Sept. 2005, pp. 1126-1129.
  • [16]Texas Instrument, Data Manual: TMS320VC5502 Fixed-Point Digital Signal Processor, Aug. 2006.
  文献评价指标  
  下载次数:17次 浏览次数:57次