期刊文献+

基于GSM语音的汉字隐秘传输方法 被引量:3

Covert communication method of Chinese characters based on GSM speech
下载PDF
导出
摘要 给出了一种基于GSM(global system for mobile communication)语音的机密汉字隐秘传输方法.该数据隐藏方法选择对每帧GSM语音信号中对人的听觉最不敏感的69 bits,最多改变1bit,便可以嵌入6 bits的机密数据.采用该方法可以在规则脉冲激励长时预测编码(RPE-LTP)语音中,每秒隐藏300 bits的机密汉字数据.由于该算法采用二级加密,因此,具有很好的安全性.该信息隐藏方法已通过局域网隐秘传输模拟实验,嵌入机密汉字信息后的语音具有较好的峰值信噪比(peak SNR,PSNR),信号的平均失真(normal average distortion metrics,NADM)也很小. A novel covert communication method of secret Chinese characters based on GSM speech was proposed. The data hiding method can embed as many as 6 bits of covert data by changing, at most, 1 bit in these most imperceptible 69 bits in each frame of the GSM speech. Using the proposed scheme, as many as 300 bits of secret Chinese characters data per second could be concealed in the RPE-LTP speech signal. Because the algorithm was based on two levels encryption, it guaranteed a very high level of security. The method was simulated in local area networks, which shows that the speech embedded secret Chinese characters have better PSNR (peak SNR) and the NADM (normal average distortion metrics) of the signal is very small.
出处 《中国科学技术大学学报》 CAS CSCD 北大核心 2006年第5期530-534,共5页 JUSTC
关键词 信息隐藏 GSM 汉字 隐秘传输 嵌入 information hiding GSM Chinese characters covert communication embed
  • 相关文献

参考文献7

  • 1Tseng Yu-chee,CHEN Yu-yuan,PAN Hsiang-kuang.A secure data hiding scheme for binary images[J].IEEE Transactions on Communications,2002,50 (8):1 227-1 231.
  • 2陆红琳,程义民,王以孝,田源.一种基于ICA的汉字信息隐秘传输方法[J].中文信息学报,2003,17(4):59-65. 被引量:8
  • 3田源,王以孝,程义民,陆红琳.一种基于视频的彩色图像隐藏方法[J].计算机工程与应用,2004,40(9):65-66. 被引量:5
  • 4田源,程义民,王以孝.一种新的数据隐藏方法[J].电子学报,2004,32(9):1444-1447. 被引量:24
  • 5GSM 06.10 Version 7.0.2:ETSI EN 300 961 V7.02.Digital Cellular Telecommunications Systems (Phase2+); Full Rate Speech; Transcoding[S].1998:58-59.
  • 6Petitcolas F.Watermarking schemes evaluation[J].IEEE Signal Processing,2000,17 (5):58-64.
  • 7WANG Rang-ding,CHAI Pei-qi.A new adaptive audio watermarking algorithm for copyright protection[C] // 2003 International Conference on Natural Language Processing and Knowledge Engineering.IEEE Press,2003:281-286.

二级参考文献17

  • 1[1]F A P Petitcolas,R J Anderson,M G Kuhn.Information Hiding--A Survey[J].Proceedings of the IEEE,1999,87(7):1062-1078.
  • 2[2]D Kirovski,H S Malvar.Spread-spectrum watermarking of audio signals[J].IEEE Transaction on Signal Processing,2003,51(4):1020-1033.
  • 3[3]J A Bloom,I J Cox,et al.Copy protection for DVD video[J].Proceedings of the IEEE,July 1999,87(7):1267-1276.
  • 4[5]Gang Pan,Zhaohui Wu,Yunhe Pan.A data hiding method for few-color images[A].Acoustics,Speech,and Signal Processing,Proceedings[C].Orlando,Florida:IEEE,2002,4.IV-3469-IV-3472.
  • 5[6]J Chou,K Ramchandran,A Ortega.High capacity audio data hiding for noisy channels[A].Information Technology:Coding and Computing[C].Las Vegas,Nevada:IEEE,2001.108-112.
  • 6[8]R G van Schyndel,A Z Osborne.A digital watermark[A].IEEE International Conferenca on Image Processing (Vol.2)[C].Austin,TX USA:IEEE,Nov 1994.86-90.
  • 7[9]Min Wu,E Tang,B Lin.Data Hiding in digital binary image[A].Multimedia and Expo,2000[C].New York:IEEE,2000,1.393-396.
  • 8[10]Yu-Chee Tseng,Yu-Yuan Chen,Hsiang-Kuang Pan.A secure data hiding scheme for binary images[J].IEEE Transactions on Communications,Aug 2002,50(8):1227-1231.
  • 9Hyvaerinen, A and Oja. E.. Independent Component Analysis: Algorithms and Applications[J]. Neural Networks, 2000,13 (4 - 5) : 411 - 430.
  • 10Hyvaerinen and Oja. E.. A Fast Fixed-Point Algorithm for Independent Component Analysis[J ]. Neural Computation, 1997,9(7) : 1483 - 1492.

共引文献30

同被引文献13

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部