全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2014 

在压缩语音编码中集成信息隐藏方法研究

DOI: 10.3969/j.issn.0372-2112.2014.07.010, PP. 1305-1310

Keywords: 信息隐藏,语音编码,动态码本,隐藏算法,隐藏容量,隐蔽性

Full-Text   Cite this paper   Add to My Lib

Abstract:

论文针对低速率语音编码过程的特点,提出了一种基于动态码本生成的信息隐藏方法,设计了相应的嵌入和提取算法.该方法解决了现有的基于静态码本分区的信息隐藏方法无法对抗码字统计分析检测的问题.实验表明该隐藏算法在13.3Kbps的载体速率下能获得450bps隐藏容量,而且载密信息的语音质量PESQ值下降不到6%.

References

[1]  IETF RFC 3951.Internet Low Bit Rate Codec(iLBC)[S].http://datatracker.ietf.org/doc/rfc3951/,2011,12.
[2]  谭良,吴波,等.一种基于混沌和小波变换的大容量音频信息隐藏算法[J].电子学报,2010,38(8):1812-1818. TAN Liang,WU Bo,et al.An audio information hiding algorithm with high-capacity which based on chaotic and wavelet transform[J].Acta Electronica Sinica,2010,38(8):1812-1818.(in Chinese)
[3]  L Liu,M Li,Q Li,Y Liang.Perceptually transparent information hiding in G.729 bitstream[A].Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing[C].Harbin,China:IEEE,2008.406-409.
[4]  Lu Z M,YanB,Sun S H.Watermarking combined with CELP speech coding for authentication[J].IEICE Transactions on Information and System,2005,E88-D(2):330-334.
[5]  Yongfeng Huang,Jian Yuan,Shanyu Tang,C Wang.Steganography in inactive frames of VoIP streams encoded by source codec[J].IEEE Transactions on Information Forensics and Security,June 2011,6(2):296-306.
[6]  龙敏,彭飞.基于混沌分组的二维工程图信息隐藏算法[J].电子学报,2009,37(1):79-83. LONG Min,PENG Fei.An information hiding algorithm for two-dimensional engineering graphics based on chaotic grouping [J].Acta Electronica Sinica,2009,37(1):79-83.(in Chinese)
[7]  Rui Miao,Yongfeng Huang.An aproach of covert communication based on the adaptive steganography scheme on voice over IP[A].IEEE International Conference on Communications(ICC2011)[C].USA:IEEE,2011.1-5.
[8]  B Xiao,Y Huang,S Tang.An approach to information hiding in low bit-rate speech stream[A].Proceedings of the 2008 IEEE Global Telecommunications Conference[C].New Orleans,LA,USA:IEEE,2008.1-5.
[9]  Qingzhong Liu,Andrew H Sung,Mengyu Qiao.Temporal derivative-based spectrum and mel-cepstrum audio steganalysis[J].IEEE Transactions on Information Forensics and Security,2009,4(3):359-368.
[10]  Y Huang,J Yuan,S Tang,C Wang.Steganography in inactive frames of VoIP streams encoded by source codec[J].IEEE Transactions on Information Forensics and Security,2011,6(2):296-306.
[11]  Yongfeng Huang,Shanyu Tang,Chunlai Bao,Yau Jim Yip.Steganalysis of compressed speech to detect covert VoIP channels[J].IEE/IEEE Journal,IET Information Security,2011,5(1):1-7.
[12]  Huang Y,Zhang Y,S Tang.Detection of covert VoIP communications using sliding window based steganalysis[J].IET Communications,IEE/IEEE Journal,2011,5(2):126-133.
[13]  Songbin Li,Huaizhou Ta,Yongfeng Huang.Detection of QIM steganography in G.723.1 bit stream based on quantization index sequence analysis[J].Zhejiang Univ-Sci C(Comput & Electron),2012,13(8):624-534.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133