An Efficient Speech Coding Technique for Secure Mobile Communications

被引:0
|
作者
Abro, Fauzia I. [1 ]
Rauf, Farzana [2 ]
Batool, Mouazma [1 ]
Chowdhry, B. S. [2 ]
Aslam, Saleem [3 ]
机构
[1] Air Univ, Islamabad, Pakistan
[2] Mehran Univ Engn & Tech Jamshoro, Jamshoro, Pakistan
[3] Bahria Univ, Islamabad, Pakistan
关键词
Global System for Mobile Communication (GSM); Speech coding; Linear Predictive Coding; Encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Speech coding for secure mobile communication is a challenging task since encrypting the digitized speech signal adds overheads and randomizes the bit stream to a level where recovery of original signal becomes difficult. The commercially available speech coders are unbefitting for transmission of encrypted speech as it requires a low bit speech coding with preserved speech characteristics so that it can be transmitted over a bandwidth-limited channels with intelligible speech. In this paper, we present an efficient low bit-rate (1.9 kbps) speech coding technique to transmit encrypted speech over Global System for Mobile communications (GSM). Different speech characteristics such as pitch, energy and Line Spectral Frequencies (LSF) are extracted and preserved before compression and encryption speech. Empirical results show that the proposed speech coder can be used effectively in low bit rate applications such as secure voice communications.
引用
收藏
页码:940 / 944
页数:5
相关论文
共 50 条
  • [21] Secret Key Optimization for Secure Speech Communications
    Faragallah, Osama S.
    Farouk, Mahmoud
    El-Sayed, Hala S.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (02): : 3025 - 3037
  • [22] A SPECTRALLY EFFICIENT CONSTANT ENVELOPE MODULATION TECHNIQUE FOR PCS AND MOBILE COMMUNICATIONS
    GUO, YP
    FEHER, K
    IEEE TRANSACTIONS ON BROADCASTING, 1994, 40 (03) : 177 - 183
  • [23] An efficient secure data compression technique based on chaos and adaptive Huffman coding
    Usama, Muhammad
    Malluhi, Qutaibah M.
    Zakaria, Nordin
    Razzak, Imran
    Iqbal, Waheed
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 2651 - 2664
  • [24] An efficient secure data compression technique based on chaos and adaptive Huffman coding
    Muhammad Usama
    Qutaibah M. Malluhi
    Nordin Zakaria
    Imran Razzak
    Waheed Iqbal
    Peer-to-Peer Networking and Applications, 2021, 14 : 2651 - 2664
  • [25] A MORE SECURE AND EFFICIENT AUTHENTICATION SCHEME WITH ROAMING SERVICE AND USER ANONYMITY FOR MOBILE COMMUNICATIONS
    Li, Chun-Ta
    INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01): : 69 - 76
  • [26] Efficient Secure Group Communications for SCADA
    Choi, Donghyun
    Lee, Sungjin
    Won, Dongho
    Kim, Seungjoo
    IEEE TRANSACTIONS ON POWER DELIVERY, 2010, 25 (02) : 714 - 722
  • [27] Low-latency secure mobile communications
    Choyi, VK
    Barbeau, M
    WiMob'2005: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Vol 2, Proceedings: MOBILE NETWORKING, 2005, : 38 - 43
  • [28] A secure and efficient entropy coding based on arithmetic coding
    Li, Hengjian
    Zhang, Jiashu
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2009, 14 (12) : 4304 - 4318
  • [29] Secure hashing of the NEMO mobile router communications
    Tan, TK
    Samsudin, A
    2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, : 341 - 345
  • [30] Secure key distribution protocol in mobile communications
    Yang, Hyungkyu
    An, YoungHwa
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 152 - 155