PESQ-Based Selection of Efficient Partial Encryption Set for Compressed Speech
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yang, Hae-Yong | - |
dc.contributor.author | Lee, Kyung-Hoon | - |
dc.contributor.author | Lee, Sang-Han | - |
dc.contributor.author | Ko, Sung-Jea | - |
dc.date.accessioned | 2021-09-08T15:06:40Z | - |
dc.date.available | 2021-09-08T15:06:40Z | - |
dc.date.created | 2021-06-10 | - |
dc.date.issued | 2009-08 | - |
dc.identifier.issn | 1225-6463 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/119563 | - |
dc.description.abstract | Adopting an encryption function in voice over Wi-Fi service incurs problems such as additional power consumption and degradation of communication quality To overcome these problems, a partial encryption (PE) algorithm for compressed speech was recently introduced. However, from the security point of view, the partial encryption sets (PESs) of the conventional PE algorithm still have much room for improvement. This paper proposes a new selection method for finding a smaller PES while maintaining the security level of encrypted speech. The proposed PES selection method employs the perceptual evaluation of the speech quality (PESQ) algorithm to objectively measure the distortion of speech. The proposed method is applied to the ITU-T G.729 speech codec, and content protection capability is verified by a range of tests and a reconstruction attack. The experimental results show that encrypting only 20% of the compressed bitstream is sufficient to effectively hide the entire content of speech. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY | - |
dc.title | PESQ-Based Selection of Efficient Partial Encryption Set for Compressed Speech | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Ko, Sung-Jea | - |
dc.identifier.doi | 10.4218/etrij.09.0108.0508 | - |
dc.identifier.scopusid | 2-s2.0-68949090764 | - |
dc.identifier.wosid | 000268948600008 | - |
dc.identifier.bibliographicCitation | ETRI JOURNAL, v.31, no.4, pp.408 - 418 | - |
dc.relation.isPartOf | ETRI JOURNAL | - |
dc.citation.title | ETRI JOURNAL | - |
dc.citation.volume | 31 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 408 | - |
dc.citation.endPage | 418 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.identifier.kciid | ART001367375 | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Wi-Fi | - |
dc.subject.keywordAuthor | partial encryption | - |
dc.subject.keywordAuthor | multimedia security | - |
dc.subject.keywordAuthor | ITU-T G.729 speech codec | - |
dc.subject.keywordAuthor | reconstruction attack | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.