期刊文献+

基于隐写算法的保密语音传输系统(英文)

A Secure Speech Transmission System Based on Steganography
下载PDF
导出
摘要 提出了一种基于隐写算法的保密语音传输系统,首先采用G.729A编码算法对保密语音进行低码率压缩编码,然后通过改进LSB隐写算法将保密语音码流隐藏到公开音频中,并利用音频点播平台发布到网络上,最后通过客户端点播实现保密语音的提取和回放.测试数据结果表明:通过该改进算法,载体音频的感知质量得到了显著的提高,并且系统对于恶意攻击者具有更好的隐秘性. A digital encrypted speech transmission scheme based on audio-on-demand platform is proposed. Starting with G.729A coding algorithm being employed for secured speech, the bit stream from coder is embedded in open audio files using an improved LSB algorithm, and then output to the AOD network. The secured speech can be played back by the client from thesystem. Tests show that the audio quality is improved using the proposed algorithm, and the developed scheme has the better resistance to hostile attackers.
出处 《宁波大学学报(理工版)》 CAS 2008年第4期447-452,共6页 Journal of Ningbo University:Natural Science and Engineering Edition
基金 National Natural Science Foundation of China(60672070) Scientific Research Found of Ningbo University(XK0610032)
关键词 语音编码 隐写 音频点播 speech coding steganography audio on demand
  • 引文网络
  • 相关文献

参考文献6

二级参考文献60

  • 1王朔中,张新鹏,张开文.Steganographic Technique Capable of Withstanding RQP Analysis[J].Journal of Shanghai University(English Edition),2002,6(4):273-277. 被引量:5
  • 2杨榆,白剑,徐迎晖,钮心忻,杨义先.回声隐藏的研究与实现[J].中山大学学报(自然科学版),2004,43(A02):50-52. 被引量:6
  • 3赖金福.线性与接口集成电路简明手册[M].北京:电子工业出版社,1994..
  • 4陈安凯 陈嘉.最新国外集成电路数据手册[M].北京:人民邮电出版社,1997..
  • 5[美]KDJ.VISUAL C++ 技术内幕[M].北京:清华大学出版社,..
  • 6.MNP 2类 3类 4类5类:Modem通信协议(硬件)纠错协议[S].,..
  • 7[1]Arnold M.. Audio watermarking: features, applications and algorithms. In: Proceedings of IEEE International Conference on Multimedia & Expo, New York, USA, 2000, 2:1013~1016
  • 8[2]Swanson M.D., Bin Zhu, Tewfik A.H.. Current state of the art, challenges and future directions for audio watermarking. In:Proceedings of IEEE International Conference on Multimedia Computing and Systems, Florence, Italy,1999, 1:19~24
  • 9[4]Gerzon M.A., Graven P.G.. A high-rate buried-data channel for audio CD. Journal of the Audio Engineering Society, 1995, 43(1~2):3~22
  • 10[5]Gruhl D., Lu A., Bender W.. Echo hiding. In:Anderson R.J. ed.. Proceedings of the 1st Information Hiding Workshop. LNCS 1174, Berlin: Germany Springer-Verlag, 1996, 295~315

共引文献131

;
使用帮助 返回顶部