期刊文献+

一种基于码字分布特性的G.729A压缩语音流隐写分析方法 被引量:4

A Steganalysis Method for G.729A Compressed Speech Stream Based on Codeword Distribution Characteristics
下载PDF
导出
摘要 有学者提出了一种在压缩语音编码过程中进行QIM(Quantization Index Modulation)隐写的方法.该方法可用于在G.729A压缩语音流中高隐蔽性地嵌入秘密信息,研究其隐写分析方法很有必要.本文首先分析了QIM隐写对G.729A码流造成的显著性特征变化,发现该种隐写将使码流中LPC滤波器的量化索引(码字)发生转移,并导致码字分布的不均衡性及相关性特性发生改变.本文设计了统计模型,实现了对码字分布特性的量化特征抽取;结合支持向量机,本文构造了用于隐写检测的集成分类器系统.实验结果显示本文方法能够在低于30ms的时间内,获得超过98%的检测准确率,实现了对QIM隐写的快速有效检测. An improved QIM(Quantization Index Modulation) steganography was proposed and it can be used for efficient information hiding in G.729A compressed speech stream.This paper wants to detect this type of steganography.This paper proves that such steganography will significantly change the imbalance and correlation distribution characteristics of codeword(quantization index) in the stream.And then it designs statistical models to extract the quantitative feature vectors of these characteristics.Combining the extracted vectors with the support vector machine,this paper constructs an ensemble classifier for detecting the QIM-based steganography in the G.729A speech stream.The experimental results show that the classifier can achieve up to 98% correct detection towards G.729A encoded speech stream with detection time less than 30 milliseconds.
出处 《电子学报》 EI CAS CSCD 北大核心 2012年第4期842-846,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.60970148) 国家863高技术研究发展计划(No.2011AA010704) 清华大学自主科研计划(No.2011THZ0)
关键词 信息隐藏 隐写分析 G.729A 量化索引调制 码字分布特性 information hiding steganalysis G.729A quantization index modulation codeword distribution characteristics
  • 相关文献

参考文献10

  • 1Y Huang, S Tang, J Yuan. Steganography in inactive frames of VolP streams encoded by source codec[J]. IEEE Transactions on Information Forensics and Security, 2011,6(2):296- 306.
  • 2谭良,吴波,刘震,周明天.一种基于混沌和小波变换的大容量音频信息隐藏算法[J].电子学报,2010,38(8):1812-1818. 被引量:22
  • 3白剑,景晓军,杨榆,徐迎晖,钮心忻,杨义先.语音信息隐藏中的AERA算法[J].电子学报,2005,33(9):1541-1544. 被引量:3
  • 4Chen B, Womell G W. Quantization index modulation: a class of provably good methods for digital watermarking and infor- marion embedding[J]. IEEE Transactions on Information The- ory,2001,47(4) : 1423 - 1443.
  • 5Xiao Bo, Huang Yongfeng, Shanyu Tang. An approach to infor- mation hiding in low bit-rate speech stream[ A ]. IEEE Globe- Com2008 [ C] .New Orleans, USA,2008. 1940 - 1944.
  • 6Malik Hafiz. Statistical modeling of footprints of QIMsteganography [ A ]. 2010 1F, EE International Conference on Multimedia and Expo[ C]. IEEE,2010. 1487 - 1492.
  • 7Malik Hafiz, K P Subbalakshmi, R Chandramouli. Nonparamet- ric steganalysis of QIM data hiding using approximate entropy EA]. Proc SPIE, Vol 6819 [ C]. CA, USA, 2008. 681914 - 681921.
  • 8Malik Hafiz. Steganalysis of QIM steganography using irregu- larity measure [ A]. Proceedings of the 10th ACM Workshop on Multimedia and Security[ C]. ACM,2008.149 - 158.
  • 9Qinxia Wu, Weiping Li, Xiao Yi Yu. Revisit steganalysis on QIM-based data hiding [ A]. The 5th International Conference on Intelligent Information Hiding and Multimedia Signal Pro- cessing [C]. IEEE, 2009.929 - 932.
  • 10吴頔,张勇,李岳楠,牛夏牧.VQ域信息隐藏检测算法[J].电子学报,2005,33(B12):2549-2551. 被引量:1

二级参考文献34

  • 1孔涛,张亶.Arnold反变换的一种新算法[J].软件学报,2004,15(10):1558-1564. 被引量:83
  • 2郭云彪,胡岚,尤新刚,张春田.针对二值图像信息隐藏的攻击方法[J].中山大学学报(自然科学版),2004,43(A02):176-179. 被引量:5
  • 3李赵红,侯建军.基于Logistic混沌映射的DCT域脆弱数字水印算法[J].电子学报,2006,34(12):2134-2137. 被引量:38
  • 4全笑梅,张鸿宾.基于小波包域听觉感知分析的统计音频水印算法[J].电子学报,2007,35(4):673-678. 被引量:11
  • 5R G van Schyndel,et al.A digital watermark .Proceedings 1994 International Conference on Image Processing .Austin,Texas,USA:IEEE Computer Society,1994.2.86-89.
  • 6Nedeljko Cvejic,Tapio Seppanen.Increasing the capacity of LSB-based audio steganography .Proceedings of IEEE Workshop on Multimedia Signal Processing,2002,St .Thomas,Virgin Islands,2002.336-338.
  • 7XINL,YUHH.Transparent and robust audio data hiding in cepstrum domain .IEEE International Conference on Multimedia and Expo (ICME) .New York,USA,2000.1.397-400.
  • 8KIM H J,CHOI Y H.A novel echo-hiding scheme with backward and forward kernels .Circuits and Systems for Video Technology,2003,13:885-889.
  • 9Nedeljko Cvejic,Tapio Seppanen.Spread spectrum audio watermarking using frequency hopping and attack characterization .Signal Processing .Elsevier North-Holland,2004.84.207-213.
  • 10Kirovski D,Malvar H.Robust spread-spectrum audio watermarking .Proceeding of IEEE ICASSP .Salt Lake City,USA,2001.3.1345-1348.

共引文献23

同被引文献15

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部