期刊文献+
共找到3,035篇文章
< 1 2 152 >
每页显示 20 50 100
Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images 被引量:4
1
作者 Yanping Zhang Juan Jiang +2 位作者 Yongliang Zha Heng Zhang Shu Zhao 《International Journal of Intelligence Science》 2013年第2期77-85,共9页
Generally speaking, being an efficient information hiding scheme, what we want to achieve is high embedding capacity of the cover image and high visual quality of the stego image, high visual quality is also called em... Generally speaking, being an efficient information hiding scheme, what we want to achieve is high embedding capacity of the cover image and high visual quality of the stego image, high visual quality is also called embedding efficiency. This paper mainly studies on the information hiding technology based on gray-scale digital images and especially considers the improvement of embedding capacity and embedding efficiency. For the purpose of that, two algorithms for information hiding were proposed, one is called high capacity of information hiding algorithm (HCIH for short), which achieves high embedding rate, and the other is called high quality of information hiding algorithm (HQIH for short), which realizes high embedding efficiency. The simulation experiments show that our proposed algorithms achieve better performance. 展开更多
关键词 information hiding embedding Capacity embedding EFFICIENCY Security Peak-Signal-to-Noise-Rate(PSNR)
下载PDF
Robust Information Hiding Based on Neural Style Transfer with Artificial Intelligence 被引量:1
2
作者 Xiong Zhang Minqing Zhang +3 位作者 Xu AnWang Wen Jiang Chao Jiang Pan Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期1925-1938,共14页
This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designe... This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission.The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data.This process effectively enhances the concealment and imperceptibility of confidential information,thereby improving the security of such information during transmission and reducing security risks.Furthermore,we have designed a specialized attack layer to simulate real-world attacks and common noise scenarios encountered in practical environments.Through adversarial training,the algorithm is strengthened to enhance its resilience against attacks and overall robustness,ensuring better protection against potential threats.Experimental results demonstrate that our proposed algorithm successfully enhances the concealment and unknowability of secret information while maintaining embedding capacity.Additionally,it ensures the quality and fidelity of the stego image.The method we propose not only improves the security and robustness of information hiding technology but also holds practical application value in protecting sensitive data and ensuring the invisibility of confidential information. 展开更多
关键词 information hiding neural style transfer ROBUSTNESS
下载PDF
Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption
3
作者 Zongbao Jiang Minqing Zhang +2 位作者 Weina Dong Chao Jiang Fuqiang Di 《Computers, Materials & Continua》 SCIE EI 2024年第10期1123-1155,共33页
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed... With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data. 展开更多
关键词 Ciphertext-policy attribute-based encryption complex data access structure reversible data hiding large embedding space
下载PDF
A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography 被引量:5
4
作者 Ruohan Meng Zhili Zhou +2 位作者 Qi Cui Xingming Sun Chengsheng Yuan 《Journal of Information Hiding and Privacy Protection》 2019年第1期43-48,共6页
At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity ... At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity of coverless information hiding.At the same time,the steganography algorithm based on object detection only hides secret information in foreground objects,which contribute to the steganography capacity is reduced.Since object recognition contains multiple objects and location,secret information can be mapped to object categories,the relationship of location and so on.Therefore,this paper proposes a new steganography algorithm based on object detection and relationship mapping,which integrates coverless information hiding and steganography.In this method,the coverless information hiding is realized by mapping the object type,color and secret information in object detection method.At the same time,the object detection method is used to find the safe area to hide secret messages.The proposed algorithm can not only improve the steganographic capacity of the two information hiding methods but also make the coverless information hiding more secure and robust. 展开更多
关键词 STEGANOGRAPHY faster R-CNN coverless information hiding
下载PDF
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
5
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2011年第2期77-81,共5页
This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmeti... This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmetic with complex modulus and another on an elliptic curve modular equation. The proposed algorithm is illustrated in a numerical example. 展开更多
关键词 Complex MODULUS Cryptanalytic Protection DECOMPOSITION GAUSSIAN MODULAR ARITHMETIC information hiding Key Exchange MODULAR ELLIPTIC Curve Secure Communication
下载PDF
Information Hiding Method Based on Block DWT Sub-Band Feature Encoding
6
作者 Qiudong SUN Wenxin MA +1 位作者 Wenying YAN Hong DAI 《Journal of Software Engineering and Applications》 2009年第5期383-387,共5页
For realizing of long text information hiding and covert communication, a binary watermark sequence was obtained firstly from a text file and encoded by a redundant encoding method. Then, two neighboring blocks were s... For realizing of long text information hiding and covert communication, a binary watermark sequence was obtained firstly from a text file and encoded by a redundant encoding method. Then, two neighboring blocks were selected at each time from the Hilbert scanning sequence of carrier image blocks, and transformed by 1-level discrete wavelet transformation (DWT). And then the double block based JNDs (just noticeable difference) were calculated with a visual model. According to the different codes of each two watermark bits, the average values of two corresponding detail sub-bands were modified by using one of JNDs to hide information into carrier image. The experimental results show that the hidden information is invisible to human eyes, and the algorithm is robust to some common image processing operations. The conclusion is that the algorithm is effective and practical. 展开更多
关键词 Sub-Band Feature ENCODING REDUNDANT ENCODING Visual Model Discrete WAVELET TRANSFORMATION information hiding
下载PDF
Tufting Carpet Machine Information Model Based on Object Linking and Embedding for Process Control Unified Architecture
7
作者 GUO Xiang CHI Xinfu SUN Yize 《Journal of Donghua University(English Edition)》 CAS 2021年第1期43-50,共8页
In view of the lack of research on the information model of tufting carpet machine in China,an information modeling method based on Object Linking and Embedding for Process Control Unified Architecture(OPC UA)framewor... In view of the lack of research on the information model of tufting carpet machine in China,an information modeling method based on Object Linking and Embedding for Process Control Unified Architecture(OPC UA)framework was proposed to solve the problem of“information island”caused by the differentiated data interface between heterogeneous equipment and system in tufting carpet machine workshop.This paper established an information model of tufting carpet machine based on analyzing the system architecture,workshop equipment composition and information flow of the workshop,combined with the OPC UA information modeling specification.Subsequently,the OPC UA protocol is used to instantiate and map the information model,and the OPC UA server is developed.Finally,the practicability of tufting carpet machine information model under the OPC UA framework and the feasibility of realizing the information interconnection of heterogeneous devices in the tufting carpet machine digital workshop are verified.On this basis,the cloud and remote access to the underlying device data are realized.The application of this information model and information integration scheme in actual production explores and practices the application of OPC UA technology in the digital workshop of tufting carpet machine. 展开更多
关键词 tufting carpet machine digital workshop information model Object Linking and embedding for Process Control Unified Architecture(OPC UA) INTERCONNECTION
下载PDF
Image Hiding Algorithm in Discrete Cosine Transform Domain Based on Grey Prediction and Grey Relational Analysis 被引量:4
8
作者 黄海平 黄世超 +1 位作者 陈九天 王汝传 《China Communications》 SCIE CSCD 2013年第7期57-70,共14页
Traditional information hiding algorithms cannot maintain a good balance of capacity,invisibility and robustness.In this paper,a novel blind colour image information hiding algorithm based on grey prediction and grey ... Traditional information hiding algorithms cannot maintain a good balance of capacity,invisibility and robustness.In this paper,a novel blind colour image information hiding algorithm based on grey prediction and grey relational analysis in the Discrete Cosine Transform(DCT) domain is proposed.First,this algorithm compresses the secret image losslessly based on the improved grey prediction GM(1,1)(IGM) model.It then chooses the blocks of rich texture in the cover image as the embedding regions using Double-dimension Grey Relational Analysis(DGRA).Finally,it adaptively embeds the compressed secret bits stream into the DCT domain mid-frequency coefficients,which are decided by those blocks' Double-Dimension Grey Correlation Degree(DGCD) and Human Visual System(HVS).This method can ensure an adequate balance between invisibility,capacity and robustness.Experimental results show that the proposed algorithm is robust against JPEG compression(46.724 6 dB when the compression quality factor is 90%),Gaussian noise(45.531 3 dB when the parameter is(0,0.000 5)) etc.,and it is a blind information hiding algorithm that can be extracted without an original carrier. 展开更多
关键词 image information hiding IGM DGRA blind information hiding DCT
下载PDF
An Information Hiding Algorithm Based on Bitmap Resource of Portable Executable File 被引量:2
9
作者 Jie Xu Li-Jun Feng Ya-Lan Ye Yue Wu 《Journal of Electronic Science and Technology》 CAS 2012年第2期181-184,共4页
An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some trad... An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some traditional ones because of integrating secret data and bitmap resources together. Through analyzing the principle of bitmap resources parsing in an operating system and the layer of resource data in PE files, a safe and useful solution is presented to solve two problems that bitmap resources are incorrectly analyzed and other resources data are confused in the process of data embedding. The feasibility and effectiveness of the proposed algorithm are confirmed through computer experiments. 展开更多
关键词 Bitmap resources data embedding information hiding portable executable file.
下载PDF
Coverless Information Hiding Based on the Molecular Structure Images of Material 被引量:10
10
作者 Yi Cao Zhili Zhou +1 位作者 Xingming Sun Chongzhi Gao 《Computers, Materials & Continua》 SCIE EI 2018年第2期197-207,共11页
The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the carrier.In this way,it is hard to resist the detection of steg... The traditional information hiding methods embed the secret information by modifying the carrier,which will inevitably leave traces of modification on the carrier.In this way,it is hard to resist the detection of steganalysis algorithm.To address this problem,the concept of coverless information hiding was proposed.Coverless information hiding can effectively resist steganalysis algorithm,since it uses unmodified natural stego-carriers to represent and convey confidential information.However,the state-of-the-arts method has a low hidden capacity,which makes it less appealing.Because the pixel values of different regions of the molecular structure images of material(MSIM)are usually different,this paper proposes a novel coverless information hiding method based on MSIM,which utilizes the average value of sub-image’s pixels to represent the secret information,according to the mapping between pixel value intervals and secret information.In addition,we employ a pseudo-random label sequence that is used to determine the position of sub-images to improve the security of the method.And the histogram of the Bag of words model(BOW)is used to determine the number of subimages in the image that convey secret information.Moreover,to improve the retrieval efficiency,we built a multi-level inverted index structure.Furthermore,the proposed method can also be used for other natural images.Compared with the state-of-the-arts,experimental results and analysis manifest that our method has better performance in anti-steganalysis,security and capacity. 展开更多
关键词 Coverless information hiding molecular structure images of material pixel value inverted index image retrieval bag of words model
下载PDF
A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states 被引量:1
11
作者 徐淑奖 陈秀波 +2 位作者 王连海 钮心忻 杨义先 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第5期231-238,共8页
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an... Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. 展开更多
关键词 quantum information hiding quantum covert'channel entanglement swapping high-level Bell states
下载PDF
An Efficient Information Hiding Scheme Based on Closest Paired Tree Structure Vector Quantization 被引量:1
12
作者 Zhi-Hui Wang Chin-Chen Chang Ting-Yu Lin 《Journal of Electronic Science and Technology》 CAS 2013年第1期15-19,共5页
Information hiding schemes based on vector quantization (VQ) usually require lengthy VQ encoding and decoding processes. In this paper, we propose an efficient information hiding method based on closest paired tree ... Information hiding schemes based on vector quantization (VQ) usually require lengthy VQ encoding and decoding processes. In this paper, we propose an efficient information hiding method based on closest paired tree structure vector quantization (CPTSVQ). The simulation result shows that the execution time of the proposed scheme is much shorter than that attained by previous approaches. 展开更多
关键词 Digital image information hiding tree structure vector quantization vector quantization.
下载PDF
Reversible Data Hiding in Encrypted Images Based on Prediction and Adaptive Classification Scrambling 被引量:1
13
作者 Lingfeng Qu Hongjie He +1 位作者 Shanjun Zhang Fan Chen 《Computers, Materials & Continua》 SCIE EI 2020年第12期2623-2638,共16页
Reversible data hiding in encrypted images(RDH-EI)technology is widely used in cloud storage for image privacy protection.In order to improve the embedding capacity of the RDH-EI algorithm and the security of the encr... Reversible data hiding in encrypted images(RDH-EI)technology is widely used in cloud storage for image privacy protection.In order to improve the embedding capacity of the RDH-EI algorithm and the security of the encrypted images,we proposed a reversible data hiding algorithm for encrypted images based on prediction and adaptive classification scrambling.First,the prediction error image is obtained by a novel prediction method before encryption.Then,the image pixel values are divided into two categories by the threshold range,which is selected adaptively according to the image content.Multiple high-significant bits of pixels within the threshold range are used for embedding data and pixel values outside the threshold range remain unchanged.The optimal threshold selected adaptively ensures the maximum embedding capacity of the algorithm.Moreover,the security of encrypted images can be improved by the combination of XOR encryption and classification scrambling encryption since the embedded data is independent of the pixel position.Experiment results demonstrate that the proposed method has higher embedding capacity compared with the current state-of-the-art methods for images with different texture complexity. 展开更多
关键词 Reversible data hiding classification scrambling prediction error multi-bits embedding
下载PDF
A Survey of Image Information Hiding Algorithms Based on Deep Learning
14
作者 Ruohan Meng Qi Cui Chengsheng Yuan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2018年第12期425-454,共30页
With the development of data science and technology,information security has been further concerned.In order to solve privacy problems such as personal privacy being peeped and copyright being infringed,information hi... With the development of data science and technology,information security has been further concerned.In order to solve privacy problems such as personal privacy being peeped and copyright being infringed,information hiding algorithms has been developed.Image information hiding is to make use of the redundancy of the cover image to hide secret information in it.Ensuring that the stego image cannot be distinguished from the cover image,and sending secret information to receiver through the transmission of the stego image.At present,the model based on deep learning is also widely applied to the field of information hiding.This paper makes an overall conclusion on image information hiding based on deep learning.It is divided into four parts of steganography algorithms,watermarking embedding algorithms,coverless information hiding algorithms and steganalysis algorithms based on deep learning.From these four aspects,the state-of-the-art information hiding technologies based on deep learning are illustrated and analyzed. 展开更多
关键词 STEGANOGRAPHY DEEP learning STEGANALYSIS WATERMARKING coverless information hiding.
下载PDF
On Hiding Secret Information in Medium Frequency DCT Components Using Least Significant Bits Steganography
15
作者 Sahib Khan M A Irfan +4 位作者 Arslan Arif Syed Tahir Hussain Rizvi Asma Gul Muhammad Naeem Nasir Ahmad 《Computer Modeling in Engineering & Sciences》 SCIE EI 2019年第3期529-546,共18页
This work presents a new method of data hiding in digital images,in discrete cosine transform domain.The proposed method uses the least significant bits of the medium frequency components of the cover image for hiding... This work presents a new method of data hiding in digital images,in discrete cosine transform domain.The proposed method uses the least significant bits of the medium frequency components of the cover image for hiding the secret information,while the low and high frequency coefficients are kept unaltered.The unaltered low frequency DCT coefficients preserves the quality of the smooth region of the cover image,while no changes in the high DCT coefficient preserve the quality of the edges.As the medium frequency components have less contribution towards energy and image details,so the modification of these coefficients for data hiding results in high quality stego images.The distortion due to the changes in the medium frequency coefficients is insignificant to be detected by the human visual system.The proposed methods demonstrated a hiding capacity of 43:11%with the stego image quality of a peak signal to the noise ration of 36:3 dB,which is significantly higher than the threshold of 30 dB for a stego image quality.The proposed technique is immune to steganalysis and has proved to be highly secured against both spatial and DCT domain steganalysis techniques. 展开更多
关键词 DCT STEGANOGRAPHY IMAGE processing information SECURITY data hiding steganalyisis
下载PDF
A Block Mean Insertion and Dual Stego Generation Based Embedding Strategy
16
作者 Md. Habibur Rahman A. H. M. Kamal 《Journal of Computer and Communications》 2021年第3期70-87,共18页
In reversible data hiding, pixel value ordering is an up-to-the-minute research idea in the field of data hiding. Secret messages are embedded in the maximum or the minimum value among the pixels in a block. Pixel val... In reversible data hiding, pixel value ordering is an up-to-the-minute research idea in the field of data hiding. Secret messages are embedded in the maximum or the minimum value among the pixels in a block. Pixel value ordering helps identify the embeddable pixels in a block but suffers from fewer embedding payloads. It leaves many pixels in a block without implanting any bits there. The proposed scheme in this paper resolved that problem by allowing every pixel to conceive data bits. The method partitioned the image pixels in blocks of size two. In each block, it first orders these two pixels and then measures the average value. The average value is placed in the middle of these two pixels. Thus, the scheme extends the block size from two to three. After applying the embedding method of Weng <i><span>et al</span></i><span>., the implantation task removed the average value from the block to reduce its size again to two. These two alive pixels are called stego pixels, which produced a stego image. A piece of state information is produced during implanting to track whether a change is happening to the block’s cover pixels. This way, after embedding in all blocks, a binary stream of state information is produced, which has later been converted to decimal values. Thus, image data were assembled in a two-dimensional array. Considering the array as another image plane, Weng </span><i><span>et al</span></i><span>.’s method is again applied to embed further to produce another stego image. Model validation ensured that the proposed method performed better than previous work </span><span>i</span><span>n this field.</span> 展开更多
关键词 Reversible Data hiding Stego Image Multilayer embedding Block Partition embedding Payload
下载PDF
Reversible Data Hiding in Encrypted Images Based on Adaptive Prediction and Labeling
17
作者 Jiaohua Qin Zhibin He +1 位作者 Xuyu Xiang Neal N.Xiong 《Computers, Materials & Continua》 SCIE EI 2022年第11期3613-3628,共16页
Recently,reversible data hiding in encrypted images(RDHEI)based on pixel prediction has been a hot topic.However,existing schemes still employ a pixel predictor that ignores pixel changes in the diagonal direction dur... Recently,reversible data hiding in encrypted images(RDHEI)based on pixel prediction has been a hot topic.However,existing schemes still employ a pixel predictor that ignores pixel changes in the diagonal direction during prediction,and the pixel labeling scheme is inflexible.To solve these problems,this paper proposes reversible data hiding in encrypted images based on adaptive prediction and labeling.First,we design an adaptive gradient prediction(AGP),which uses eight adjacent pixels and combines four scanning methods(i.e.,horizontal,vertical,diagonal,and diagonal)for prediction.AGP can adaptively adjust the weight of the linear prediction model according to the weight of the edge attribute of the pixel,which improves the prediction ability of the predictor for complex images.At the same time,we adopt an adaptive huffman coding labeling scheme,which can adaptively generate huffman codes for labeling according to different images,effectively improving the scheme’s embedding performance on the dataset.The experimental results show that the algorithm has a higher embedding rate.The embedding rate on the test image Jetplane is 4.2102 bpp,and the average embedding rate on the image dataset Bossbase is 3.8625 bpp. 展开更多
关键词 Reversible data hiding adaptive gradient prediction huffman coding embedding capacity
下载PDF
Information hiding scheme for vector maps based on fingerprint certification
18
作者 门朝光 孙建国 曹刘娟 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第6期766-770,共5页
An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted in... An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted into a character string as the watermark, and then the watermark will be embedded into the coordinate descriptions of the attribute file by the "0-bit value" programming method. This programming algorithm ensures that the accuracy is lossless and the graphics is unchanged for any vector map. Experiments show that the presented hiding scheme has stable robustness, the average similarity rate is 97.2% for fingerprints matching and the false non-match rate is 1.38% in the blocking test. In the opening test, the former reaches 84.46% and the latter reaches 5.56%. 展开更多
关键词 information hiding digital watermarking vector map FINGERPRINT AUTHENTICATION
下载PDF
AN OPTIMAL INFORMATION HIDING ALGORITHM FOR SPEECH IN THE FRACTIONAL FOURIER TRANSFORM DOMAIN
19
作者 Xi Ji Zou Cairong +1 位作者 Bao Yongqiang Wang Qingyun 《Journal of Electronics(China)》 2010年第4期564-570,共7页
With the increasing requirement of military and security, the technology of information hiding for speech becomes a hotspot and difficulty in the fields of speech signal processing and in-formation security, which is ... With the increasing requirement of military and security, the technology of information hiding for speech becomes a hotspot and difficulty in the fields of speech signal processing and in-formation security, which is developing rapidly. In order to stand against the stegano-analysis, the paper proposed an optimal information hiding algorithm for speech in the Fractional Fourier Transform (FrFT) domain based on the Minimum Mean Square Error (MMSE) criterion. The results of simulation and experiments show that speech modified by the proposed algorithm has no remarkable changes both in time and frequency domains, which can effectively resist the time and frequency analysis, Otherwise, the algorithm is robust to general signal process attack, and the difference is imperceptible between the original and modified speech. 展开更多
关键词 Practional Fourier Transform (FrFT) Speech information hiding Minimum Mean Square Error (MMSE)
下载PDF
STUDY ON AUDIO INFORMATION HIDING METHOD BASED ON MODIFIED PHASE PARTITION
20
作者 TongMing HaoChongyang +1 位作者 LiuXiaojun ChenYanpu 《Journal of Electronics(China)》 2005年第3期307-311,共5页
Hiding efficiency of traditional audio information hiding methods is always low since the sentience similarity cannot be guaranteed. A new audio information hiding method is proposed in this letter which can impose th... Hiding efficiency of traditional audio information hiding methods is always low since the sentience similarity cannot be guaranteed. A new audio information hiding method is proposed in this letter which can impose the insensitivity with the audio phase for auditory and realize the information hiding through specific algorithm in order to modify local phase within the auditory perception. The algorithm is to introduce the operation of "set 1" and "set 0" for every phase vectors, then the phases must lie on the boundary of a phase area after modified. If it lies on "1" boundary, it comes by set 1 operation. If it lies on "0" boundary, it comes by set 0 operation. The results show that, compared with the legacy method, the proposed method has better auditory similarity, larger information embedding capacity and lower code error rate. As a kind of blind detect method, it fits for application scenario without channel interference. 展开更多
关键词 Audio signal information hiding Auditory perception Phase coding
下载PDF
上一页 1 2 152 下一页 到第
使用帮助 返回顶部