Skip to main content

A New Method of Haar and Db10 Based Secured Compressed Data Transmission Over GSM Voice Channel

  • Chapter
  • First Online:

Part of the book series: Studies in Computational Intelligence ((SCI,volume 660))

Abstract

In this chapter, a successful attempt for transmission of secured compressed data over GSM voice channel has been made. In this work, given text of any length is converted to real-time speech signal and then compressed with discrete wavelet transform, encoded with gold code sequence, modulated using quadrature phase-shift keying and sent over the GSM voice channel. The aim of this paper was to present a secured digital data compression and modulation for robust data transmission in terms of voice. The main objective was to achieve higher data rates, lower bit error rate, and less utilization of the bandwidth. The performance of the proposed technique is compared to an already existing technique for data transmission over voice channel. It has been observed that the proposed technique shows much better results in terms of bit error rate (BER), mean square error (MSE), and peak signal-to-noise ratio (PSNR) as compared to the already existing techniques. The proposed scheme has a great significance in GSM systems where data security and quality of service (QoS) are two main issues.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Katugampala N, Al-Naimi V, Villette S, Kondoz A (2005) Real time end to end secure voice communications over GSM voice channel. In: 13th European signal processing conference, Antalya, Turkey, pp 1–4

    Google Scholar 

  2. LaDue CK, Sapozhnykov VV, Fienberg KS (2008) A data modem for GSM voice channel. IEEE Trans Veh Technol 57(4):2205–2218

    Article  Google Scholar 

  3. Boloursaz M, Hadavi AH, Kazemi R, Behnia F (2013) A data modem for GSM adaptive multi rate voice channel. In: East-west design and test symposium, pp 1–4, 27–30

    Google Scholar 

  4. Ehmayssani T, Baudoin G (2008) Data transmission over voice dedicated channels using digital modulations. In: Radio electronika 18th international conference, IEEE, pp 1–4, ISBN: 978-1-4244-2087-2

    Google Scholar 

  5. Yarman BS, Guz U, Gurkan H (2006) On the comparative results of SYMPES: a new method of speech modeling. Int J Electron Commun (AEU) 60:421–427

    Article  Google Scholar 

  6. Kotnik B, Mezgec Z, Svečko J, Chowdhury A (2009) Data transmission over GSM voice channel using digital modulation technique based on autoregressive modeling of speech production. Digit Signal Process 19:612–627

    Article  MATH  Google Scholar 

  7. Ciornei S, Bogdan I, Scripcariu L, Popa M (2014) Sensitivity analysis of quadrature amplitude modulation over AMR-WB voice code. In: Proceedings of the second international conference on advances in computing, communication and information technology—CCIT 2014. ISBN: 978-1-63248-051-4

    Google Scholar 

  8. Mahapatra R, Dhar AS, Datta D (2009) Integrated voice and data transmission employing adaptive modulation in wireless networks. Int J Electron Commun 63:1012–1025

    Article  Google Scholar 

  9. Swetha N, Anuradha K (2013) Text to speech conversion. Int J Adv Trends Comput Sci Eng 2(6):269–278 ISSN: 2278-3091

    Google Scholar 

  10. Patil MV, Gupta A, Varma A, Salil S (2013) Audio and speech compression using DCT & DWT techniques. Int J Innov Res Sci Eng Technol, 2(5). ISSN: 2319-8753

    Google Scholar 

  11. Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Lifting wavelet transformation based blind watermarking technique of photoplethysmographic signals in wireless telecardiology. In: 2012 world congress on information and communication technologies (WICT), IEEE, pp 230–235

    Google Scholar 

  12. Dey N, Pal M, Das A (2012) A session based watermarking technique within the NROI of retinal fundus images for authencation using DWT, spread spectrum and Harris corner detection. Int J Mod Eng Res 2(3):749–757

    Google Scholar 

  13. Sheikh JA, Parah SA, Akhtar S, Bhat GM (2015) Performance evaluation and comparison of speech compression using linear predictive coding and discrete wavelet transform. In: Commune 2015 international conference on advances in computers, communication and electronic engineering, 16–18 March 2015, University of Kashmir, pp 352–355

    Google Scholar 

  14. Kumar S, Singh OP, Mishra GR, Mishra SK, Trivedi A (2012) Speech compression and enhancement using wavelet coders. Int J Electron Commun Comput Eng 3(6). ISSN (Online): 2249–071X, ISSN (Print): 2278–4209

    Google Scholar 

  15. Joseph SM, Auto B (2012) Speech coding based on orthogonal and biorthogonal wavelet. In: 2nd international conference on communication, computing and security, procedia technology, Elsevier, vol 6, pp 397–404

    Google Scholar 

  16. Jagtap SK, Mulye MS, Uplane MD (2015) Speech coding techniques. Procedia Comput Sci 49:253–263

    Article  Google Scholar 

  17. Sheikh JA, Akhtar S, Parah SA, Bhat GM (2015) On the design and performance evaluation of compressed speech transmission over wireless channel. In: 12th IEEE India international conference (INDICON) on electronics, energy, environment, communication, computers, control (E3-C3), 17–20 December 2015, Jamia Millia Islamia, New Delhi

    Google Scholar 

  18. Dey N, Roy AB, Das A, Chaudhuri SS (2012) Stationary wavelet transformation based self-recovery of blind-watermark from electrocardiogram signal in wireless telecardiology. In: Recent trends in computer networks and distributed systems security, Springer, Berlin Heidelberg, pp 347–357

    Google Scholar 

  19. Dey N, Dey M, Mahata SK, Das A, Chaudhuri SS (2015) Tamper detection of electrocardiographic signal using watermarked bio-hash code in wireless cardiology. Int J Signal Imaging Syst Eng 8(1–2):46–58

    Article  Google Scholar 

  20. Dey N, Mishra G, Nandi B, Pal M, Das A, Chaudhuri SS (2012) Wavelet based watermarked normal and abnormal heart sound identification using spectrogram analysis. In: 2012 IEEE international conference on computational intelligence and computing research (ICCIC), IEEE, pp 1–7

    Google Scholar 

  21. Dey N, Acharjee S, Biswas D, Das A, Chaudhuri SS (2013) Medical information embedding in compressed watermarked intravascular ultrasound video. arXiv preprint arXiv:1303.2211

  22. Ahmad J, Akhtar S, Majeed S, Ahmad S (2016) On the design and performance evaluation of DWT based compressed speech transmission with convolutional coding. Commun Appl Electron 4(9):36–40. doi:10.5120/cae2016652173

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Javaid Ahmad Sheikh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Sheikh, J.A., Akhtar, S., Parah, S.A., Bhat, G.M. (2017). A New Method of Haar and Db10 Based Secured Compressed Data Transmission Over GSM Voice Channel. In: Dey, N., Santhi, V. (eds) Intelligent Techniques in Signal Processing for Multimedia Security. Studies in Computational Intelligence, vol 660. Springer, Cham. https://doi.org/10.1007/978-3-319-44790-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44790-2_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44789-6

  • Online ISBN: 978-3-319-44790-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics