期刊文献+

提高MP3Stego性能的方法与实现 被引量:4

Approaches of Improving Performance of MP3Stego and their Implementations
下载PDF
导出
摘要 MP3Stego是目前最具有代表性的MP3隐写工具。对MP3Stego进行了分析,提出了改进方法:基于Logistic混沌模型的、可控隐写信道利用率的随机选择隐写单元方法;以密钥的Hash序列作为隐写信息提取结束标志;利用隐写信息的Hash序列,来验证提取信息完整性等。实验结果表明改进方法在不影响音频质量的情况下,提高了MP3Stego的隐藏率和安全性,使MP3Stego具有更高的实用性。 MP3Stego is the most representative MP3 stegannography tool.This paper analyzes and improves MP3Stego. The improved algorithm randomly selects the embedding units based on Logistic Chaos Model with controllable selecting rate.And it uses the Hash serial of the password as the label of detecting end-token.It also makes use of the Hash serial of the embedding information to ensure its integrity.The experimental results illustrate that the improved algorithm has higher embedding rate and security,while it does not affect the audio quality in audibility.The improved algorithm makes MP3Stego more practical.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第35期95-100,共6页 Computer Engineering and Applications
基金 国家863高技术研究发展计划资助项目(2005AA142110 2002AA119010-4)。
关键词 MP3Stego 隐写术 Logistic混沌模型 Hash序列 安全性 MP3Stego steganography Logistic chaos model Hash serial security
  • 相关文献

参考文献8

  • 1BRANDENBURG K,POPP H.An introduction to MPEG Layer-3.EBU Technical Review,June 2000.
  • 2OHME R B,WESTFELD A.Statistical characterisation of MP3 encoders for steganalysis[C]//proceedings of the 2004 Multimedia and Security Workshop on Multimedia and Security,Magdeburg,Germany,September 2004.
  • 3PETITCOLAS A P.MP3Stego 1.1.16[ED/OL].(2005-01-19).http://www.cl.cam.ac.uk/~fapp2/steganography/mp3stego.
  • 4Noch.Stego-Lame[ED/OL].(2005-01-19).http://sourceforge.net/projects/stego-lame.
  • 5WESTFELD A.Detecting low embedding rates[C]//PETITCOLAS F A P.Information Hiding 2002,LNCS 2578.Berlin,Heidelberg:SpringerVerlag,2003:324-339.
  • 6PETITCOLAS F A P,ANDERSON R J,KUHN M G.Information hiding:a survey[J].Proceedings of the IEEE:Special Issue on Protection of Multimedia Content,1999,87(7):1062-1078.
  • 7梁敬弘,王道顺,黄连生,戴一奇.对MP3Stego的攻击研究[J].计算机辅助设计与图形学学报,2003,15(8):954-960. 被引量:7
  • 8DITTMANN J,LANG A,STEINEBACH M,et al.StirMark benchmark for audio(SMBA)[ED/OL].(2005-01-19).http://amsl-smb.cs.uni-magdeburg.de/smfa/downloads.php.

二级参考文献12

  • 1杨洋 戴跃伟 王执铨.一种基于块分类的DCT域音频水印技术[A]..全国第三届信息隐藏学术研讨会((2IHW'2001)[c].西安:西安电子科技大学出版社,2001.129~134.
  • 2University of Cambridge, Computer Laboratory. MP3Stego [OL]. http://www, cl. cam. ac. uk/-- fapp2/steganography/MP3Stego/index. html, 2002.
  • 3Fabien A P Petitcolas, Ross J Anderson, Markus G Kuhn.Attacks on copying marking systems [OL]. http://www, cl.cam. ac. uk/Research/Security/.
  • 4Fabien A P Petitcolas, Ross J Anderson. Weaknesses of copyright marking systems [OL]. http://www, cl. cam. ac. uk/Research/Security/.
  • 5Karlheinz Brandenbrug, Gerhard Stoll. ISO-MPEG-1 audio: A generic standard for coding of high-quantity digital audio [J].Audio Engineer Society, 1994, 42(10) : 780--792.
  • 6Bender W, Gruhl D, Morimoto N, et al. Technique for data hiding[J]. IBM System Journal, 1996, 35(3/4): 313-336.
  • 7Gruhl D, Bender W, Lu A. Echo Hiding in Information Hiding[M]. In: Anderson R J, ed. Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1996, 1174:295--315.
  • 8Lie Wen-Nung, Chang Li-Chun. Robust and high-quality timedomain audio watermarking subject to psychoacoustic masking[J]. Circuits and Systems, 2001, 2:245--248.
  • 9Lu Chunshien, Liao Hongyuan, Mark Chen Lianghua.Multipurpose audio watermarking [A]. In: Proceedings of the 15th International Conference on Pattern Recognition,Barcelona, Spain, 2000, Ⅲ: 286--289.
  • 10Chang L, Moskowitz I S. Critical analysis of security in voice hiding techniques [A]. In: Proceedings of the International Conference on Information and Communications Security, vol 1334 of Lecture Notes in Computer Science [C]. Berlin:Springer, 1997. 203--216.

共引文献6

同被引文献23

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部