全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2017 

基于最优脉冲和脉冲相关性的AMR自适应隐写算法 An Adaptive Steganography Algorithm for AMR Based on the Optimal Pulse and Pulse Correlation

Keywords: 自适应隐写,固定码本,STC,最小嵌入化影响

Full-Text   Cite this paper   Add to My Lib

Abstract:

由于AMR(adaptive multimedia rate)语音在无线通信及移动互联网中的广泛应用,基于AMR压缩域的隐写算法已经逐渐出现.现有隐写算法具有明显的统计分布特性,因此其无法抵抗后继出现的多种隐写分析算法的检测.为了提高隐蔽性和统计安全性,本文提出了一种针对AMR固定码本(FCB,fixed codebook)的自适应隐写算法(简称为AFAS算法).基于AMR固定码本最优搜索原理和非零脉冲位置相关性,设计了嵌入代价函数和加性失真函数,并结合STC编码(syndrome-trellis codes)实现了AFAS算法.在12.2kb/s编码模式下,AFAS算法隐写后载密语音质量的PESQ(perceptual evaluation of speech quality)值较现有算法提高约8%;在抗隐写分析的能力方面,其平均检测错误率(TER)较现有隐写算法提高约10%.对比实验结果表明,AFAS算法较现有算法具有更好的听觉隐蔽性和统计安全性

References

[1]  XIA Z,WANG X,SUN X,et al.Steganalysis of least significant bit matching using multi-order differences[J].Security and Communication Networks,2014,7(8):1283-1291.DOI:10.1002/sec.864.
[2]  BESSETTE B,SALAMI R,LEFEBVRE R,et al.The adaptive multi-rate wideband speech codec(AMRWB)[J].IEEE Transactions on Speech and Audio Processing,2002,10(8):620-636.DOI:10.1109/tsa.2002.804299.
[3]  XIAO B,HUANG Y,TANG S.An approach to information hiding in low bit-rate speech stream[C]//IEEE Global Telecommunications Conference.New York:IEEE Press,2008:1-5.DOI:10.1109/glocom.2008.ecp.375.
[4]  刘程浩,柏森,黄永峰,等.一种基于基音预测的信息隐藏算法[J].计算机工程,2013,39(2):137-140.DOI:10.3969/j.issn.1000-3428.2013.02.027.LIU C H,BAI S,HUANG Y F,et al.An information hiding algorithm based on pitch prediction[J].Computer Engineering,2013,39(2):137-140.DOI:10.3969/j.issn.1000-3428.2013.02.027(Ch).
[5]  李松斌,孙东红,袁键,等.一种基于码字分布特性G.729A压缩语音流隐写分析方法[J].电子学报,2012,40(4):842-846.DOI:10.3969/j.issn.0372-2112.2012.04.036.LI S B,SUN D H,YUAN J,et al.A steganalysis method for G.729Acompressed speech stream based on codeword distribution characteristics[J].Acta Electronica Sinica,2012,40(4):842-846.DOI:10.3969/j.issn.0372-2112.2012.04.036(Ch).
[6]  ZHANG W,ZHANG Z,ZHANG L,et al.Decomposing Joint Distortion for Adaptive Steganography[DB/OL].[2016-04-01].http://staff.ustc.edu.cn/~zhangwm/Paper/2016_13.pdf.
[7]  HOLUB V,FRIDRICH J.Designing steganographic distortion using directional filters[C]//Information Forensics and Security(WIFS).New York:IEEE Press,2012:234-239.DOI:10.1109/WIFS.2012.6412655.
[8]  HOLUB V,FRIDRICH J.Digital image steganography using universal distortion[C]//Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security.New York:ACM,2013:59-68.DOI:10.1145/2482513.2482514.
[9]  GEISER B,VARY P.High Rate Data Hiding in ACELP Speech Codecs[C/OL].[2016-06-05].http://ieeexplore.ieee.org/document/4518532/.
[10]  DING Q,PING X J.Steganalysis of compressed speech based on histogram features[C]//Wireless Communications Networking and Mobile Computing(WiCOM)of the 6th IEEE.New York:IEEE Press.2010:1-4.DOI:10.1109/WICOM.2010.5600125.
[11]  MIAO H B,HUANG L S,SHEN Y,et al.Steganalysis of compressed speech based on Markov and entropy[C]//International Workshop on Digital Watermarking.Berlin Heidelberg:Springer-verlag,2013:63-76.DOI:10.1007/978-3-662-43886-2_5.
[12]  REN Y Z,CAI T T,TANG M,et al.AMR steganalysis based on the probability of same pulse position[J].IEEE Transactions on Information Forensics and Security,2015,10(9):1801-1811.DOI:10.1109/TIFS.2015.2421322.
[13]  PEVNY T,FILLER T,BAS P.Using high-dimensional image models to perform highly undetectable steganography[C]//International Workshop on Information Hiding(LNCS 6387).Berlin Heidelberg:Springer,2010:161-177.DOI:10.1007/978-3-642-16435-4_13.
[14]  LIU P,LI S B,WANG H Q.Steganography in vector quantization process of linear predictive coding for low-bitrate speech codec[J/OL].[2016-05-23].https://link.springer.com/article/10.1007/s00530-015-0500-7.
[15]  NISHIMURA A.Data hiding in pitch delay data of the adaptive multi-rate narrow-band speech codec[C]//Intelligent Information Hiding and Multimedia Signal Processing of the 5th IEEE.New York:IEEE,2009:483-486.DOI:10.1109/IIH-MSP.2009.83.
[16]  余迟,黄刘生,杨威,等.一种针对基音周期的3G信息隐藏方法[J].小型微型计算机系统,2012,33(7):1445-1449.DOI:10.3969/j.issn.1000-1220.2012.07.011.YU C,HUANG L S,YANG W,et al.A 3Gspeech data hiding method based on pitch period[J].Journal of Chinese Computer Systems,2012,33(7):1445-1449.DOI:10.3969/j.issn.1000-1220.2012.07.011(Ch).
[17]  BURNS E M,VIEMEISTER N F.Played-again SAM:Further observations on the pitch of amplitudemodulated noise[J].The Journal of the Acoustical Society of America,1981,70(6):1655-1660.DOI:10.1121/1.387220.
[18]  WANG C Y,WU Q.Information Hiding in RealTime VoIP Streams[C/OL].[2016-5-30].http://jozjan.s.cnl.sk/dwl/voip/Remote%20Publications/Information%20 Hiding%20in%20Real-Time%20VoIP%20Streams.pdf.
[19]  AHITAKER J M,KER A D.Steganalysis of Overlapping Images[C/OL].[2016-05-05].http://www.cs.ox.ac.uk/andrew.ker/docs/ADK64B.pdf.
[20]  WANG K,ZHAO H,WANG H X.Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value[J].IEEE Transactions on Information Forensics and Security,2014,9(5):741-751.DOI:10.1109/tifs.2014.2308633.
[21]  PAULIN C,SELOUANI S A,HERVET E.Audio steganalysis using deep belief networks[J].International Journal of Speech Technology,2016,19(3):585-591.DOI:10.1007/s10772-016-9352-6.
[22]  MIAO H,HUANG L,CHEN Z,et al.A new scheme for covert communication via 3G encoded speech[J].Computers&Electrical Engineering,2012,38(6):1490-1501.DOI:10.1016/j.compeleceng.2012.05.003.
[23]  RIX A W,BEERENDS J G,HOLLIER M P,et al.Perceptual evaluation of speech quality(PESQ)—A new method for speech quality assessment of telephone networks and codecs[C]//Acoustics,Speech,and Signal Processing of IEEE International Conference.New York:IEEE Press,2001,2:749-752.DOI:10.1109/ICASSP.2001.941023.
[24]  PETITCOLAS F A P,ROSS J,ANDERSON R J,et al.Information Hiding Survey—A Survey[J/OL].[2016-03-10].http://gray-world.net/it/papers/petitcolas99information.pdf.
[25]  SEDIGHI V,COGRANNE R,FRIDRICH J.Content-adaptive steganography by minimizing statistical detectability[J].IEEE Transactions on Information Forensics and Security,2016,11(2):221-234.DOI:10.1109/TIFS.2015.2486744.
[26]  WILSON A,KER A D.Avoiding Detection on Twitter:Embedding Strategies for Linguistic Steganography[J/OL].[2016-03-13].http://www.cs.ox.ac.uk/andrew.ker/docs/ADK68B.pdf.
[27]  SADEK M M,KHALIFA A S,MOSTAFA G M.Video steganography:A comprehensive review[J].Multimedia Tools and Applications,2015,74(17):7063-7094.DOI:10.1007/s11042-014-1952-z.
[28]  BILAL I,KUMAR R,ROJ M S,et al.Recent advancement in audio steganography[C]//Distributed and Grid Computing(PDGC).New York:IEEE Press,2014:402-405.DOI:10.1109/pdgc.2014.7030779.
[29]  DENEMARK T,BOROUMAND M,FRIDRICH J.Steganalysis features for content-adaptive JPEG steganography[J].IEEE Transactions on Information Forensics and Security,2016,11(8):1736-1746.DOI:10.1109/tifs.2016.2555281.
[30]  LIU P,LI S B,WANG H Q.Steganography integrated into linear predictive coding for low bit-rate speech codec[J].Multimedia Tools and Applications,2017,76(2):2837-2859.DOI:10.1007/s11042-016-3257-x.
[31]  FILLER T,JUDAS J,FRIDRICH J.Minimizing Embedding Impact in Steganography Using Trellis-Coded Quantization[C/OL].[2016-05-20].http://pdfs.semanticscholar.org/9c2d/eded0418cbc0dadc0964be40bb681f02daeb.pdf.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133