一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內(nèi)容
驗證碼

基于隨機位置選擇和矩陣編碼的語音信息隱藏方法

吳志軍 李常亮 李榮

吳志軍, 李常亮, 李榮. 基于隨機位置選擇和矩陣編碼的語音信息隱藏方法[J]. 電子與信息學報, 2020, 42(2): 355-363. doi: 10.11999/JEIT181163
引用本文: 吳志軍, 李常亮, 李榮. 基于隨機位置選擇和矩陣編碼的語音信息隱藏方法[J]. 電子與信息學報, 2020, 42(2): 355-363. doi: 10.11999/JEIT181163
Zhijun WU, Changliang LI, Rong LI. Speech Information Hiding Method Based on Random Position Selection and Matrix Coding[J]. Journal of Electronics & Information Technology, 2020, 42(2): 355-363. doi: 10.11999/JEIT181163
Citation: Zhijun WU, Changliang LI, Rong LI. Speech Information Hiding Method Based on Random Position Selection and Matrix Coding[J]. Journal of Electronics & Information Technology, 2020, 42(2): 355-363. doi: 10.11999/JEIT181163

基于隨機位置選擇和矩陣編碼的語音信息隱藏方法

doi: 10.11999/JEIT181163
基金項目: 國家自然基金委員會與中國民航局聯(lián)合基金(U1933108),天津市 自然科學基金(17JCZDJC30900),天津市教委科研計劃項目 (2019KJ117), 2018 年中央高?;究蒲袠I(yè)務費項目(3122018D007, 3122018C003)
詳細信息
    作者簡介:

    吳志軍:男,1965年生,教授,博士生導師,研究方向為網(wǎng)絡和信息安全

    李常亮:男,1993年生,碩士生,研究方向為信息安全

    李榮:女,1995年生,碩士生,研究方向為信息安全

    通訊作者:

    吳志軍 zjwu@cauc.edu.cn

  • 中圖分類號: TN912.3

Speech Information Hiding Method Based on Random Position Selection and Matrix Coding

Funds: The Joint Funds of National Natural Science Foundation of China and Civil Aviation Administration of China (U1933108), The Key Program of Natural Science Foundation of Tianjin (17JCZDJC30900), The Scientific Research Project of Tianjin Municipal Education Commission (2019KJ117), The Fundamental Research Funds for the Central Universities of China (3122018D34007, 3122018C003)
  • 摘要:

    針對低速率語音編碼問題,該文提出基于G.723.1編碼標準的信息隱藏算法。在基音預測編碼過程中,通過控制閉環(huán)基音周期(自適應碼本)的搜索范圍,該文結合隨機位置選擇方法(RPS)和矩陣編碼方法(MCM),實現(xiàn)秘密信息的嵌入,在語音編碼過程中實現(xiàn)了信息的隱藏。RPS方法的采用降低了載體碼字之間的關聯(lián)性,MCM方法的采用降低了載體的改變率。實驗結果證明,該文算法下PESQ惡化率平均值最大為1.63%,隱蔽性良好。

  • 圖  1  實驗拓撲圖

    圖  2  隱藏算法實現(xiàn)框圖

    圖  3  載密語音與未載密語音對比圖

    圖  4  時長為3 s樣本的PESQ值對比

    圖  5  時長為10 s樣本的PESQ值對比

    圖  6  壓縮語音碼流在不同樣本時長下的平均檢測率

    圖  7  壓縮語音碼流在不同嵌入率下的平均檢測率

    表  1  發(fā)送方、接收方臺式PC配置情況

    處理器內(nèi)存聲卡系統(tǒng)
    Intel(R) Core(TM) i5-4590 CPU @ 3.30 GHz4 GBRealtek High Definition AudioWindows 7專業(yè)版 Service Pack 1
    下載: 導出CSV

    表  2  本文隱藏算法的PESQ統(tǒng)計值

    載密語音樣本未載密語音樣本PESQ改變率(%)
    3 s語音樣本
    CSMCSWESMESWCSMCSWESMESWCSMCSWESMESW
    平均值3.42373.34403.41653.47503.44293.39953.42593.5193–0.55–1.63–0.27–1.20
    最大值3.89993.78154.09954.10153.82623.74063.88633.94581.931.095.493.94
    最小值2.97562.96152.97562.90223.09303.17013.11603.1265–3.80–6.58–4.51–7.17
    10 s語音樣本
    CSMCSWESMESWCSMCSWESMESWCSMCSWESMESW
    平均值3.40953.35283.39903.38223.42183.39003.41023.4362–0.37–1.09–0.33–1.50
    最大值3.79543.71023.76143.87143.74063.67833.74063.86321.470.872.120.21
    最小值2.99652.91133.10032.99653.05903.01803.11233.0590–2.00–3.53–1.20–2.00
    下載: 導出CSV

    表  3  隱藏算法的PESQ統(tǒng)計對比(%)

    隱藏算法3 s語音樣本10 s語音樣本
    CSMCSWESMESW均值CSMCSWESMESW均值
    文獻[6]隱藏算法–0.49–1.05–0.93–1.37–0.96–0.62–1.44–0.29–1.22–0.89
    文獻[10]隱藏算法–0.59–1.63–0.28–1.35–0.96–0.52–1.42–0.35–1.47–0.94
    本文隱藏算法–0.55–1.63–0.27–1.20–0.91–0.37–1.09–0.33–1.50–0.82
    下載: 導出CSV

    表  4  語音幀處理時間統(tǒng)計對比(ms)

    隱藏算法CSMCSWESMESW均值
    文獻[6]隱藏算法7.438.488.248.948.27
    文獻[10]隱藏算法 7.02 7.96 7.89 8.74 7.90
    本文隱藏算法6.677.647.558.327.56
    下載: 導出CSV

    表  5  在滿嵌入率下兩種隱藏算法檢測率(%)

    隱藏方法語音種類樣本時長(s)
    0.10.20.30.40.50.60.70.80.91.02.03.04.05.06.0
    文獻[10]隱藏算法英文85.4088.0088.5089.2590.1091.4591.4092.4092.9593.7096.2096.9597.1597.6597.35
    中文86.8088.6590.2090.5091.2092.2593.1094.2594.7094.0596.8097.2098.1597.7597.95
    文獻[11]隱藏算法英文87.6590.1190.8191.6592.8994.0094.1595.0195.2096.6497.2098.70100.00100.00100.00
    中文90.7092.9594.0094.5595.7996.8397.1698.2298.3098.8999.1699.99100.00100.00100.00
    本文隱藏算法英文43.2046.4346.9547.3348.3949.5149.4450.3651.6451.9354.6755.6855.9256.0455.94
    中文45.5146.9147.5647.4848.7249.7049.5352.1452.3752.8755.0655.8656.0956.3555.63
    下載: 導出CSV

    表  6  在不同嵌入率下3種隱藏算法檢測率(%)

    隱藏方法語音種類嵌入率(%)
    102030405060708090100
    文獻[10]隱藏算法英文50.6157.6475.5380.2982.8185.6386.3590.5894.3297.35
    中文51.9358.4975.2880.5682.4985.2787.9292.5695.6397.95
    文獻[11]隱藏算法英文53.9460.8978.6683.4985.9188.6989.3593.7497.25100.00
    中文54.5361.6779.5584.8886.7789.5591.8395.6698.55100.00
    本文隱藏算法英文16.3217.5230.8739.4841.1644.1545.6248.1252.6155.94
    中文15.2217.3530.5639.5241.7444.1644.5949.3152.3855.63
    下載: 導出CSV
  • PETITCOLAS F A P, ANDERSON R J, and KUHN M G. Information hiding - a survey[J]. The IEEE, 1999, 87(7): 1062–1078. doi: 10.1109/5.771065
    丁琦, 平西建. 基于脈沖位置參數(shù)統(tǒng)計特征的壓縮域語音隱寫分析[J]. 計算機科學, 2011, 38(1): 217–220. doi: 10.3969/j.issn.1002-137X.2011.01.051

    DING Qi and PING Xijian. Steganalysis of compressed speech based on statistics of pulse position parameters[J]. Computer Science, 2011, 38(1): 217–220. doi: 10.3969/j.issn.1002-137X.2011.01.051
    DITTMANN J, HESSE D, and HILLERT R. Steganography and steganalysis in voice-over IP scenarios: Operational aspects and first experiences with a new steganalysis tool set[J]. SPIE, 2005, 5681: 607–618.
    TIAN Hui, SUN Jun, CHANG C C, et al. Detecting bitrate modulation-based covert voice-over-IP communication[J]. IEEE Communications Letters, 2018, 22(6): 1196–1199. doi: 10.1109/LCOMM.2018.2822804
    TIAN Hui, SUN Jun, CHANG C C, et al. Hiding information into voice-over-IP streams using adaptive bitrate modulation[J]. IEEE Communications Letters, 2017, 21(4): 749–752. doi: 10.1109/LCOMM.2017.2659718
    XIAO Bo, HUANG Yongfeng, and TANG Shanyu. An approach to information hiding in low bit-rate speech stream[C]. 2008 IEEE Global Telecommunications Conference, New Orleans, USA, 2008: 1–5.
    TIAN Hui, LIU Jin, and LI Songbin. Improving security of quantization-index-modulation steganography in low bit-rate speech streams[J]. Multimedia Systems, 2014, 20(2): 143–154. doi: 10.1007/s00530-013-0302-8
    CHIANG Y K, TSAI P, and HUANG Fenglong. Codebook partition based steganography without member restriction[J]. Fundamenta Informaticae, 2008, 82(1/2): 15–27.
    LI Songbin, JIA Yizhen, and KUO C C J. Steganalysis of QIM steganography in low-bit-rate speech signals[J]. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 2017, 25(5): 1011–1022. doi: 10.1109/TASLP.2017.2676356
    HUANG Yongfeng, LIU Chenghao, TANG Shanyu, et al. Steganography integration into a low-bit rate speech codec[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(6): 1865–1875. doi: 10.1109/TIFS.2012.2218599
    LIU C, BAI S, and HUANG Y. An information hiding algorithm in G. 729a based on pith prediction[C]. The 10th National Academic Conference on Information Hiding and Multimedia Information Security, Beijing, China, 2012: 15–18.
    LIN Zinan, HUANG Yongfeng, and WANG Jilong. RNN-SM: Fast steganalysis of VoIP streams using recurrent neural network[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7): 1854–1868. doi: 10.1109/TIFS.2018.2806741
    YANG Wanxia, TANG Shanyu, LI Miaoqi, et al. Steganalysis of low embedding rates LSB speech based on histogram moments in frequency domain[J]. Chinese Journal of Electronics, 2107, 26(6): 1254–1260. doi: 10.1049/cje.2017.09.026
    WU Zhijun, Gao Wei, and YANG Wei. LPC parameters substitution for speech information hiding[J]. The Journal of China Universities of Posts and Telecommunications, 2009, 16(6): 103–112. doi: 10.1016/S1005-8885(08)60295-2
    HUANG Yongfeng, TANG Shanyu, and YUAN Jian. Steganography in inactive frames of VoIP streams encoded by source codec[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(2): 296–307. doi: 10.1109/TIFS.2011.2108649
    李松斌, 賈已真, 付江云, 等. 基于碼書關聯(lián)網(wǎng)絡的基音調制信息隱藏檢測[J]. 計算機學報, 2014, 37(10): 2107–2117. doi: 10.3724/SP.J.1016.2014.02107

    LI Songbin, JIA Yizhen, FU Jiangyun, et al. Detection of pitch modulation information hiding based on codebook correlation network[J]. Chinese Journal of Computers, 2014, 37(10): 2107–2117. doi: 10.3724/SP.J.1016.2014.02107
    TIAN Hui, JIANG Hong, ZHOU Ke, et al. Transparency-orientated encoding strategies for voice-over-IP steganography[J]. The Computer Journal, 2012, 55(6): 702–716. doi: 10.1093/comjnl/bxr111
    WESTFELD A. F5-A steganographic algorithm: High capacity despite better steganalysis[C]. The 4th International Workshop on Information Hiding, Pittsburgh, USA, 2001: 289–302.
    ITU-T. ITU-T P.862 Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs[S]. Geneva, Switzerland: International Telecommunications Union, 2001.
  • 加載中
圖(7) / 表(6)
計量
  • 文章訪問數(shù):  2716
  • HTML全文瀏覽量:  963
  • PDF下載量:  93
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2018-12-18
  • 修回日期:  2019-07-20
  • 網(wǎng)絡出版日期:  2019-09-20
  • 刊出日期:  2020-02-19

目錄

    /

    返回文章
    返回