期刊文献+

基于G.729语音编码非零脉冲位置信息的隐藏算法

An Hiding Algorithm of Nonzero Pulses Position Information Based on G.729 Speech Coding
下载PDF
导出
摘要 VoIP以语音流为传输媒介,具有传输数据量大和应用广泛的优点。但VoIP系统也面临数据安全和隐私泄露的安全威胁。针对编码标准G.729固定码本搜索的非遍历特性和具有一定冗余性的特点,该文提出基于G.729语音编码非零脉冲位置信息的隐藏算法。该算法在固定码本搜索过程中,利用秘密信息控制码本的搜索过程,并在非零脉冲位置和秘密信息之间构建函数进行信息隐藏。在搜索过程中利用最不重要脉冲替换思想并采用最小化失真准则控制由秘密信息的嵌入带来的音质失真。实验结果表明:算法隐藏容量可达400 bit/s,算法具有良好的隐蔽性(PESQ平均值约为3.45)。 VoIP(Voice over Internet Protocol) is based on voice stream,which has the advantages of large data transmission and wide application.But the VoIP system is confronted with the security threats of data security and privacy disclosure.Thus,according to nonergodicity and redundancy of the fixed codebook search,an information hiding algorithm based on fixed codebook search process is proposed.This information hiding algorithm is carried out by a functional relationship between the nonzero pulse positions and secret information.The idea of least significant pulse replacement is used in the search process and a distortion minimization criterion is proposed to control the distortion of speech quality caused by the embedding of secret information.The experimental results show that the hiding capacity of the proposed algorithm is up to 400 bit/s and the average PESQ score is 3.45 which indicate that the algorithm has good imperceptibility.
作者 吴志军 郭安心 沈丹丹 WU Zhijun;GUO Anxin;SHEN DANDan(College of Information Engineering and Automation, Civil Aviation University of China, Tianjin 300300, Chin)
出处 《电子与信息学报》 EI CSCD 北大核心 2018年第6期1438-1445,共8页 Journal of Electronics & Information Technology
基金 国家自然基金委员会与中国民航局联合基金(U1533107) 天津市自然科学基金重点项目(17JCZDJC30900)~~
关键词 信息隐藏 G.729 固定码本 非零脉冲位置 Information hiding G.729 Fixed codebook Nonzero pulse positions
  • 相关文献

参考文献6

二级参考文献32

  • 1白剑,景晓军,杨榆,徐迎晖,钮心忻,杨义先.语音信息隐藏中的AERA算法[J].电子学报,2005,33(9):1541-1544. 被引量:3
  • 2吴頔,张勇,李岳楠,牛夏牧.VQ域信息隐藏检测算法[J].电子学报,2005,33(B12):2549-2551. 被引量:1
  • 3WU Zhijun,YANG Wei.Speech Information Hiding in G.729[J].Chinese Journal of Electronics,2006,15(3):545-549. 被引量:4
  • 4Y Huang, S Tang, J Yuan. Steganography in inactive frames of VolP streams encoded by source codec[J]. IEEE Transactions on Information Forensics and Security, 2011,6(2):296- 306. 被引量:1
  • 5Chen B, Womell G W. Quantization index modulation: a class of provably good methods for digital watermarking and infor- marion embedding[J]. IEEE Transactions on Information The- ory,2001,47(4) : 1423 - 1443. 被引量:1
  • 6Xiao Bo, Huang Yongfeng, Shanyu Tang. An approach to infor- mation hiding in low bit-rate speech stream[ A ]. IEEE Globe- Com2008 [ C] .New Orleans, USA,2008. 1940 - 1944. 被引量:1
  • 7Malik Hafiz. Statistical modeling of footprints of QIMsteganography [ A ]. 2010 1F, EE International Conference on Multimedia and Expo[ C]. IEEE,2010. 1487 - 1492. 被引量:1
  • 8Malik Hafiz, K P Subbalakshmi, R Chandramouli. Nonparamet- ric steganalysis of QIM data hiding using approximate entropy EA]. Proc SPIE, Vol 6819 [ C]. CA, USA, 2008. 681914 - 681921. 被引量:1
  • 9Malik Hafiz. Steganalysis of QIM steganography using irregu- larity measure [ A]. Proceedings of the 10th ACM Workshop on Multimedia and Security[ C]. ACM,2008.149 - 158. 被引量:1
  • 10Qinxia Wu, Weiping Li, Xiao Yi Yu. Revisit steganalysis on QIM-based data hiding [ A]. The 5th International Conference on Intelligent Information Hiding and Multimedia Signal Pro- cessing [C]. IEEE, 2009.929 - 932. 被引量:1

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部