期刊文献+

基于统计特征的音频中隐藏信息估计方法 被引量:1

Estimation of Secret Message in Audio Based on Statistic Characteristics
下载PDF
导出
摘要 该文基于信息嵌入不同位平面所引起的幅度统计分布变化,提出了一种音频中隐藏信息长度估计方法。通过该方法,不仅可以判别未知音频中是否包含隐藏信息,而且还能有效识别信息嵌入位平面和较精确地估计隐藏信息长度。该方法已在微机上进行了实验,实验结果表明,该方法识别正确率较高,隐藏信息长度估计较精确,可有效用于音频隐藏分析。 Based on the audio amplitude distribution change caused by secret message embedding in different bit-planes, a method of secret message length estimation is presented in this paper. This method can not only discriminate the existence of secret message, but also recognize the embedding bit-plane and estimate the amount of secret message. The proposed method has been implemented on PC. The experimental result shows its good recognition performance and relatively high estimation accuracy of secret message length. The proposed method can be used effectively in audio steganalysis.
出处 《电子与信息学报》 EI CSCD 北大核心 2009年第6期1341-1344,共4页 Journal of Electronics & Information Technology
关键词 信息隐藏 隐藏分析 位平面 副峰 嵌入率 统计特征 Information hiding Steganalysis Bit-plane Sub-peak Embedding rate Statistic characteristics
  • 相关文献

参考文献11

  • 1Dumitrescu S and Wu Xiaolin. A new framework of LSB steganalysis of digital media [J]. IEEE Trans. on Signal Processing, 2005, 53(10): 3936-3947.
  • 2Ker A D. Derivation of error distribution in least squares steganalysis [J]. IEEE Trans. on Information Forensics and Security, 2007, 2(2): 140-148.
  • 3詹双环,张鸿宾.基于小波分解和方差分析的图像信息隐藏盲检测[J].电子与信息学报,2007,29(6):1460-1463. 被引量:4
  • 4田源,程义民,王以孝.一种新的数据隐藏方法[J].电子学报,2004,32(9):1444-1447. 被引量:24
  • 5程义民,钱振兴,王以孝,田源.基于数位信息的信息隐藏方法[J].电子与信息学报,2005,27(8):1304-1309. 被引量:15
  • 6Dumitrescu S, Wu Xiallin, and Wang Zhe. Detection of LSB steganography via sample pair analysis [J]. IEEE Trans. on Signal Processing, 2003, 51(7): 1995-2007.
  • 7Yu Xiao-yi, Tan Tie-niu, and Wang Yun-hong. Extended optimization method of LSB steganalysis [C]. IEEE International Conference on Image Processing 2005. Genova, Italy, 2005(11): 1102-1105.
  • 8Ker A D. Steganalysis of embedding in two least-significant bits [J]. IEEE Trans. on Information and Security, 2007, 2(1): 46-54.
  • 9Huang Hesu and Kyriakakis C. Blind dereverberation of audio signals using a modified constant modulus algorithm [C]. 121st Audio Engineering Society. San Francisco, CA, US, 2006: 6974-6977.
  • 10史晓非,刘人杰,苗瑞.一种峭度依赖的参数自适应盲分离算法[J].电子与信息学报,2006,28(11):2033-2036. 被引量:1

二级参考文献30

  • 1[1]F A P Petitcolas,R J Anderson,M G Kuhn.Information Hiding--A Survey[J].Proceedings of the IEEE,1999,87(7):1062-1078.
  • 2[2]D Kirovski,H S Malvar.Spread-spectrum watermarking of audio signals[J].IEEE Transaction on Signal Processing,2003,51(4):1020-1033.
  • 3[3]J A Bloom,I J Cox,et al.Copy protection for DVD video[J].Proceedings of the IEEE,July 1999,87(7):1267-1276.
  • 4[5]Gang Pan,Zhaohui Wu,Yunhe Pan.A data hiding method for few-color images[A].Acoustics,Speech,and Signal Processing,Proceedings[C].Orlando,Florida:IEEE,2002,4.IV-3469-IV-3472.
  • 5[6]J Chou,K Ramchandran,A Ortega.High capacity audio data hiding for noisy channels[A].Information Technology:Coding and Computing[C].Las Vegas,Nevada:IEEE,2001.108-112.
  • 6[8]R G van Schyndel,A Z Osborne.A digital watermark[A].IEEE International Conferenca on Image Processing (Vol.2)[C].Austin,TX USA:IEEE,Nov 1994.86-90.
  • 7[9]Min Wu,E Tang,B Lin.Data Hiding in digital binary image[A].Multimedia and Expo,2000[C].New York:IEEE,2000,1.393-396.
  • 8[10]Yu-Chee Tseng,Yu-Yuan Chen,Hsiang-Kuang Pan.A secure data hiding scheme for binary images[J].IEEE Transactions on Communications,Aug 2002,50(8):1227-1231.
  • 9Suhail M A, Obaidat M S. Digital watermarking-based DCT and JPEG model. IEEE Trans, on Instrumentation and Measurement,2003, 52(5): 1640- 1647.
  • 10Tseng Yu-Chee, Chen Yu-Yuan, Pan Hsiang-Kuang. A secure data hiding scheme for binary images[J]. IEEE Trans. on Communications, 2002, 50(8): 1227 - 1231.

共引文献38

同被引文献10

  • 1钱振兴,程义民,王以孝,田源.一种图像自嵌入方法[J].电子学报,2006,34(7):1347-1350. 被引量:12
  • 2C Bouder, S Azou, G Burel. Performance analysis of a spread ing sequence estimator for spread spectrum transmissions [ J]. Journal of the Franklin Institute, 2004,341 ( 7 ) : 594 - 614.
  • 3Li Jiang,Hongbing Ji, Lin Li. A blind estimation algorithm for PN sequence in DS-SS signals [A]. Proceedings of 8th Interna tional Conference on Signal Processing [C]. Guilin, China, 2006.3.16 - 20.
  • 4Mingyan Jiang, Yong Wang, Francisco Rubio. Spread spectrum code estimation by artificial fish swarm algorithm [ A ]. Pro ceedings of 2007 IEEE Intemational Symposium on Intelligent Signal Processing [C]. Alcala, Spain,2007.1 - 6.
  • 5Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu. Digital invisible-Ink data hiding based on spread-spectnun and quanti- zation techniques [J]. IF, EE Trans on multimedia, 2008,10(4) : 557 - 569.
  • 6Maria Gkizeli, Dimitris A. Pados, Michael J. Medley. Optimal signature design for spread-specturm steganography [ J ]. IF.EF. Trans on image processing,2007,16(2):391 -405.
  • 7Rongrong Ji, Hongxun Yao, Shaohui Liu, et al.A new steganal- ysis method for adaptive spread spectrum steganography [ A]. Proceeddings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing [ C ]. Pasadena, California, 2006. 365 - 368.
  • 8Saeed Sedghi, Habib Rajabi Mashhadi, Morteza Khademi. De tecting hidden information from a spread spectrum watermarked signal by genetic algorithm[A]. Proceedings of 2006 IEEE congress on Evolutionary Computation [ C ]. Vancouver, Canada,2006.173 - 178.
  • 9lmteyaz Ahmad,Partha P Mondal,Rajan Kanhirtx~. Hebbian learning based FIR filter for image restoration [ A]. Proceed- ings of 2005 IEEE. International Symposium on Signal Pro cessing and lnftm'nation Technology [ C ]. Athens, Greece, 2005.726 - 730.
  • 10邹潇湘,戴琼,黄晁,李锦涛.零知识水印验证协议[J].软件学报,2003,14(9):1645-1651. 被引量:9

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部