期刊文献+

基于高阶统计量和功率倒谱的语音回声隐藏分析

Steganalysis for Speech Echo Hiding Based on High Order Statistics and Power Cepstrum
下载PDF
导出
摘要 文章提出了一种基于功率倒谱和结合两种高阶统计量——偏度和峰度的语音回声隐藏盲检测方法。根据回声隐藏时对载体语音引入回声的特点,通过分析语音的功率倒谱,提取并结合语音功率倒谱的高阶统计量——偏度和峰度。通过对原始语音样本和藏密语音样本功率倒谱偏度-峰度值的学习和训练,提取得到偏度-峰度阈值,可用于回声隐藏的盲检测分析。实验结果表明,该方法能够对四种回声隐藏方法同时生效,且检测率较高。 An improved steganalysis method for speech echo hiding based on power cepstrum and high order statistics is proposed.According to echo in stego speech,power cepstrum coefficient of speech is analyzed and its high order statistics including coefficients of skewness and kurtosis are computed in combination.By training the combinatorial skewness and kurtosis in power cepstrum of pure speech and stego speech,we obtain combinatorial skewness-kurtosis thresholds,which can be used for blind steganalysis of echo hiding.Experimental results show that our proposed steganalysis does well in detecting 4 kinds of echo hiding.
出处 《大众科技》 2012年第7期1-4,6,共5页 Popular Science & Technology
关键词 回声隐藏 隐藏分析 功率倒谱 偏度 峰度 echo hiding steganalysis power cepstrum skewness kurtosis
  • 相关文献

参考文献12

  • 1Gkizeli M, Pados D.A, Medley M.J. Optimal Signature Design for Spread-Spectrum Steganography[J].IEEE Transactions on Image Processing,2007,16(2): 391-405.
  • 2Fridrich J,Lisonek P. Grid Colorings in Steganography[J].IEEE Transactions on Information Theory,2007,53(4):1547-1549.
  • 3Avcibas I,Memon N, Sankur B. Steganalysis using image quality metrics[J]. IEEE Transactions on Image Processing, 2003,12(2):221-229.
  • 4Kocal O H,Yuruklu E, Avcibas I. Chaotic-Type Features for Speech Steganalysis[J].IEEE Transactions on Information Forensics and Security,2008,3(4):651-661.
  • 5Cairong Li,Wei Zeng, Haojun Ai,etc al.. Steganalysis of Spread Spectrum Hiding Based on DWT and GMM.International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009,1:240-243.
  • 6Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding[J].IBM Systems Journal,1996,35(3&4): 313- 336.
  • 7Oh H O,Kim H W,Seok J W. Transparent and Robust audio watermarking with a new echo embedding technique[J]. Multimedia and Expo,2001:317-320.
  • 8Kim H J, Choi Y H. A novel echo-hiding scheme with backward and forward kemels[J].Circuits and Systems for Video Technology,2003,13:885-889.
  • 9Wen-chin Wu, Oscal T.-C.Chen.Analysis-by-synthesis Echo Hiding Scheme using Mirrored Kernels.ICASSP, 2006,II 325-328.
  • 10Wei Zeng, Haojun Ai, etc. An Algorithm of Echo Steganalysis based on Bayes Classifier[C].IEEE International Conference on Information and Automation, 2008, 1667-1670.

二级参考文献27

  • 1宋华,幸丘林,李维奇,戴一奇.MP3Stego信息隐藏与检测方法研究[J].中山大学学报(自然科学版),2004,43(A02):221-224. 被引量:9
  • 2唐升,侯榆青,卢艳玲,克兢.回声隐藏技术研究进展[J].电声技术,2006,30(3):37-41. 被引量:6
  • 3DUMITRESCU S, WU X L,WANG Z. Detection of LSB steganography via sample pair analysis[J].IEEE Trans on Signal Processing, 2003 51 (7): 1995-2007.
  • 4AVCIBAS I, MEMON N, SANKUR B. Steganalysis using image quality metrics[J]. IEEE Trans on Image Processing, 2003, 12(2):221- 229.
  • 5LYU S W, FARID H. Steganalysis using higher-order image statistics[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(1):111-119.
  • 6ZENG W, AI H J, HU R M, et al. Steganalysis of LSB embedding in audio signals based on sample pair analysis[A]. WICOM2007[C]. 2007. 2960 - 2963.
  • 7OZER H, AVCIBACS I, SANKUR B, et al. Steganalysis of audio based on audio quality metrics[A]. Proceedings of SPIE, Security and Watermarking of Multimedia Contents V[C]. Santa Clara, CA, US, 2003.55-66.
  • 8AVCIBAS I. Audio steganalysis with content-independent distortion measures[J]. Signal Processing Letters, 2006, 13(2):92-95.
  • 9RU X M, ZHANG H J, HUANG X. Steganalysis of audio: attacking the Steghide[A]. Proceedings of 2005 International Conference on Machine Learning and Cybernetics[C]. 2005.3937-3942.
  • 10JOHNSONG M K, LYU S, FARID H. Steganalysis of recorded speech[A]. Security, Steganography, and Watermarking of Multimedia Contents Ⅶ[C]. CA, USA, 2005.664-672.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部