Coding and cryptography for speech and vision

  • E. V. Stansfield
  • M. Walker
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1025)


There are many areas of industry in which coding and cryptography play a key role, and in this paper applications to speech, video and data communications are described. In each case, the purpose of the coding and encryption processes is to improve the reliability, privacy and integrity of information transmission over different media, including telephone lines, mobile radio and satellites. Coding for error correction is often preceded by source coding and data compression techniques, and it is therefore inevitable that the applied error protection coding and cryptographic techniques depend on the nature of the signals to be transmitted. This is illustrated in our paper by considering the following application areas: compression and security of speech transmissions; transmission of still video pictures in a matter of a few seconds over voice band radio; and security for mobile telecommunications systems.


Speech Signal Forward Error Correction Vocal Tract Home Network Speech Quality 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Atkinson I. A., Kondoz A.M., Evans B.G.: 1. 6 kbit/s LP vocoder using time envelope. IEE Electronics Letters 31 No. 7 (30 March 1995) pp. 517–518CrossRefGoogle Scholar
  2. 2.
    Beaumont J.M.: Advances in block based fractal coding of still images. IEE Colloquium “Application of fractal techniques in image processing”, Digest 1990/171 (3 December 1990)Google Scholar
  3. 3.
    Beker H.J., Piper F.: Secure speech communications. Academic Press (1985)Google Scholar
  4. 4.
    Cattermole K.W.: Principles of PCM. Iliffe (1969)Google Scholar
  5. 5.
    C-Cube Microsystems: CL550 JPEG Image Compression master Processor. Preliminary data Book (Novemer 1990)Google Scholar
  6. 6.
    Chater-Lea, D.: Security in PMR systems. IEE Colloquium “Security in Networks” Digest 1995/024 (February 1995)Google Scholar
  7. 7.
    Cheetham B.M., Wong W.T.K.: Adaptive LSP filter for sub-band coding of speech. IEE Colloquium “Digital signal processing” Digest 1987/14 (26 January 1987)Google Scholar
  8. 8.
    Cheng N.-T., Kingsbury N.G.: The ERPC — an efficient error resilient technique for encoding positional information or sparse data. IEEE Trans COM-40 No. 1 (January 1992) pp. 140–148CrossRefGoogle Scholar
  9. 9.
    Clarke R.J.: Relation between Karhunen-Loeve and cosine transforms. IEE Proc-F 128 No. 6 (November 1981) pp. 356–360Google Scholar
  10. 10.
    Flanagan J.L.: Speech Analysis, synthesis and perception. Springer-Verlag (1972)Google Scholar
  11. 11.
    Huang F., Stansfield E.V.: Time sample speech scrambler which does not require synchronisation. IEEE Trans COM-41 No. 11 (November 1993) pp. 1715–1722CrossRefGoogle Scholar
  12. 12.
    Jacquin A.E.: A novel fractal block coding technique for digital images. IEEE ICASSP (1990) pp. 2225–8Google Scholar
  13. 13.
    Jayant N.S., Noll P.: Digital coding of waveforms. Prentice Hall (1984)Google Scholar
  14. 14.
    Jefferies, N., Mitchell, C. and Walker, M.: Proposed architecture for trusted third party services. Proc. Cryptography: policy and algorithms conference, Brisbane (July 1995)Google Scholar
  15. 15.
    Kleijn W.B.: Continuous representations in linear prediction. IEEE ICASSP (1991) pp. 201–4Google Scholar
  16. 16.
    Kondoz A.M.: Digital speech. Wiley (1994)Google Scholar
  17. 17.
    Makhoul J.: Linear prediction: a tutorial review. Proc. IEEE 63 No. 4 (1975) pp. 561–580Google Scholar
  18. 18.
    Malvar H.S.: Signal Processing with lapped transforms. Artech House (1992)Google Scholar
  19. 19.
    Markel J.D., Gray A.H.: Linear prediction of speech. Springer-Verlag (1975)Google Scholar
  20. 20.
    Mouly, M. and Pautet, Marie-Bernadette: The GSM system for mobile communications. (1992)Google Scholar
  21. 21.
    NIST, FIPS Publication 185: Escrowed Encryption Standard. (February 1994)Google Scholar
  22. 22.
    Rabiner L.R., Schafer R.W.: Digital processing of speech signals. Prentice Hall (1978)Google Scholar
  23. 23.
    Shelswell P.: The COFDM modulation system: the heart of digital audio broadcast. IEE ECEJ (June 1995) pp. 127–136Google Scholar
  24. 24.
    Stansfield E.V., Harmer D., Kerrigan M.F.: Speech processing techniques for HF radio security. IEE Proc-I 136 No. 1 (February 1989) pp. 25–46Google Scholar
  25. 25.
    Steele R.: Delta modulation systems. Pentech (1975)Google Scholar
  26. 26.
    Suen A.-N., Wang J.-F., Yao T.-C: Dynamic partial search scheme for stochastic codebook of FS1016 CELP coder. IEE Proc. Vis. Image Signal Processing 142 No. 1 (February 1995) pp. 52–58Google Scholar
  27. 27.
    Walker, M.: Security in mobile and cordless telecommunications. IEEE Computer Society (1992)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1995

Authors and Affiliations

  • E. V. Stansfield
    • 1
  • M. Walker
    • 2
  1. 1.Racal Research LtdReading
  2. 2.Vodafone Ltd, The CourtyardNewbury

Personalised recommendations