期刊文献+

基于统计特征的语音回声隐藏分析 被引量:1

Steganalysis of Speech Echo Hiding Based on Statistical Characteristics
下载PDF
导出
摘要 提出了一种基于偏度和峰度的语音回声隐藏分析方法。通过分析回声隐藏导致的语音复倒谱变化,计算出语音复倒谱的统计特征——偏度和峰度。通过对原始语音样本和藏密语音样本复倒谱偏度和峰度的学习和训练,分别得到可用于回声隐藏分析的偏度和峰度阈值。该方法已在计算机上进行了实验。实验结果表明,该方法能够有效地分析多种回声隐藏方法,峰度的隐藏分析结果好于偏度。 A steganalysis method for speech echo hiding based on the statistical characteristics of skewness and kurtosis is presented. After calculating these two parameters, the change of the complex cepstrum caused by the echo hiding is analyzed. By learning and training the statistical characteristics of both the pure and stego speeches, the thresholds of the skewness and kurtosis are obtained. The method is tested on a computer. Experimental results show that the proposed mehtod can effectively analyze a variety of echo hiding methods and the kurtosis steganalysis results are better than that of the skewness.
出处 《数据采集与处理》 CSCD 北大核心 2009年第4期408-412,共5页 Journal of Data Acquisition and Processing
关键词 回声隐藏 隐藏分析 复倒谱 偏度 峰度 echo hiding steganalysis complex cepstrum skewness kurtosis
  • 相关文献

参考文献5

二级参考文献38

  • 1田源,程义民,王以孝.一种新的数据隐藏方法[J].电子学报,2004,32(9):1444-1447. 被引量:24
  • 2杨榆,白剑,徐迎晖,钮心忻,杨义先.回声隐藏的研究与实现[J].中山大学学报(自然科学版),2004,43(A02):50-52. 被引量:6
  • 3孙中伟,冯登国.DCT变换域乘嵌入图像水印的检测算法[J].软件学报,2005,16(10):1798-1804. 被引量:15
  • 4[1]Pohlmann K C.数字音频原理与应用[M].苏菲,译.北京:电子工业出版社,2002:215-218.
  • 5[2]Bender W,Gruhl D,Morimoto N,et al.Techniques for data hiding[J].IBM Systems Journal,1996,35(3-4):313-336.
  • 6[3]Kim H J,Choi Y H.A novel echo-hiding scheme with backward and forward kernels[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):885-889.
  • 7[4]Xu Changsheng,Wu Jiankang,Sun Qibin,et al.Applications of digital watermarking technology in audio signals[J].Journal of the Audio Engineering Society,1999,47(10):805-812.
  • 8[5]Oh H O,Seok J W,Hong J W,et al.New echo embedding technique for robust and imperceptible audio watermarking[C]//IEEE International Conference on Acoustics,Speech,and Signal Processing.Salt Lake City,USA:IEEE,2001:1341-1344.
  • 9[6]Yan Bin,Sun Shenghe,Lu Zheming.Improved echo hiding using power cepstrum and simulated annealing based synchronization technique[C]//IEEE the 2rd International Conference on Machine Learning and Cybernetics.Xian,China:IEEE,2003:2142-2147.
  • 10Lim H, Park S Y, Kang S J, et al. FPGA implementation of image watermarking algorithm for a digital camera[A]. Communications, Computers and Signal Processing, IEEE Pacific Rim Conference [C]. 2003.1000~1003.

共引文献21

同被引文献9

  • 1章熙春,曹燕,张军,韦岗.语音MFCC特征计算的改进算法[J].数据采集与处理,2005,20(2):161-165. 被引量:6
  • 2Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding [J]. IBM Systems Journal (S0018 -8670), 1996, 35 (3-4): 313-336.
  • 3Gruhl D, Bender W, LU A. Echo Hiding [ C]. In Proe. Information Hiding Workshop ( University of Cambridge, U. K), 1996:295-315.
  • 4ZENG Wei, AI Haojun, HU Ruimin. An algorithm of echo steganalysis based on power eepstrum and pattern classification [ C]. Audio, Language and Image Processing. Shanghai, IEEE. 2008- 1344 - 1348.
  • 5WANG Yunlu, WU Zhendong. Blind detection on echo hiding based on cepstrums [ C ]. Information, Computing and Telecommunication. Beijing: IEEE, 2009:235-238.
  • 6Haigh J A, Mason J S. Robust Voice Activity Detection using Cepstral Features [ C ]. Computer, Communication, Control and Power Engineering. Proceedings of the IEEE Region 10 Conference TENCON, 1993, 3:321 -324.
  • 7戚银城,付建文,苑津莎.基于直方图统计矩特征的小波域音频隐写分析[J].系统仿真学报,2008,20(7):1912-1914. 被引量:4
  • 8杨榆,雷敏,钮心忻,杨义先.基于回声隐藏的VDSC隐写分析算法[J].通信学报,2009,30(2):83-88. 被引量:8
  • 9王让定,柴佩琪.语音倒谱特征的研究[J].计算机工程,2003,29(13):31-33. 被引量:50

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部