期刊文献+

基于DCT域实时语音的信息隐藏方法 被引量:2

Information hiding based on real-time voice in DCT domain
下载PDF
导出
摘要 为了满足对秘密信息的实时性的需求,提出一种基于DCT域实时语音的信息隐藏方法。该方法使用DirectSound对实时的语音进行捕获,依据人类听觉系统的掩蔽效应,选择DCT中的高频系数,通过量化秘密的音频信息将其嵌入到捕获的原始语音中,通过Socket技术对语音进行实时的传输,并且在秘密信息的提取过程中不需要原始音频载体信息的参与,实现秘密信息的盲提取。实验结果表明,在网络较好的情况下可以有效地借助实时的语音传递秘密信息。 In order to meet the real-time requirements of important information,an information hiding method based on DCT domain real-time voice is given.DirectSound is using to capture real-time voice.According to masking effect of human auditory system,high frequency coefficient in DCT domain is chosen and the hide secret audio information is embedded into the captured original voice carrier by quantitative methods.Finally,real-time voice is transmitted using socket technology.Furthermore,the process of extracting secret information needn't participation of original voice carrier information to realize the blind extraction of secret information.The experiment shows that we can deliver secret information effectively by real-time voice in a good network environment.
出处 《计算机工程与设计》 CSCD 北大核心 2012年第2期474-478,555,共6页 Computer Engineering and Design
基金 国家自然科学基金项目(60773049) 江苏省自然科学基金项目(BK2010192) 江苏省高校自然科学研究计划基金项目(07KJB520016) 江苏大学高级人才基金项目(07JDG053) 教育部博士点基金项目(20093227110005) 江苏省六大人才高峰基金项目(1631170006)
关键词 捕获 离散余弦变换 盲提取 实时 语音 capture discrete cosine transform(DCT) blind extraction real-time voice
  • 相关文献

参考文献9

二级参考文献60

共引文献77

同被引文献18

  • 1周云霞,曹冬建,周靖凯,等.基于压缩感知的语音信息隐藏模型的实现[J].声学技术,2013,32(4):285-287.
  • 2Liu Lihua, Li Mingyu, Li Qiong, et al. Perceptually trans- parent information hiding in G. 729 bitstream [C] //Procee- dings of the 4th International Conference on Intelligent Informa- tion Hiding and Multimedia Signal Proceeding. Harbin: 1EEE Press, 2008: 406-409.
  • 3Liu Jim Zhou Ke, Tian Hui. Least-significant-digit steganog- raphy in low bit-rate speech [C] //IEEE International Confe- rence on Proceedkngs of the Communications, 2012: 1133-1137.
  • 4Miao Rui, Huang Yongfeng. An approach of covert communi- cation based on the adaptive steganography scheme on voice over IP [C] //IEEE International Conference on Communications, 2011: 1-5.
  • 5Wei Ziling, Zhao Baokang, Liu Bo. A novel steganography ap- proach for voice over IP [J]. Journal of Ambient Intelligence and Humanized Computing, 2014, 5 (4): 601-610.
  • 6Tang Shanyu, Huang Yongfeng. Prediction of distortion pat- terns in image steganography by means of fractal computing [C] //3rd International Conference on Pervasive Patterns and Applications, 2011: 128-132.
  • 7YangJun, Bai Sen, Huang Yongfeng. Implementation of stega-nography based on HOOK [C] //Proceedings of the In- ternational Conference on Informatics, Cybernetics, and Com- puter Engineering, 2011: 133-141.
  • 8WANG HongXia & FAN MingQuan School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, China.Centroid-based semi-fragile audio watermarking in hybrid domain[J].Science China(Information Sciences),2010,53(3):619-633. 被引量:14
  • 9王春辉,黄永峰,王卫华,邓北星.一种基于G.723.1的大容量自适应信息隐藏算法[J].武汉理工大学学报(信息与管理工程版),2010,32(4):522-525. 被引量:1
  • 10孙景民.信息安全技术分析与探讨[J].信息安全与技术,2013,4(6):5-7. 被引量:3

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部