期刊文献+
共找到314篇文章
< 1 2 16 >
每页显示 20 50 100
A NOVEL APPROACH OF SECURE COMMUNICATION BASED ON THE TECHNIQUE OF SPEECH INFORMATION HIDING
1
作者 Wu Zhijun Duan Haixin Li Xing 《Journal of Electronics(China)》 2006年第2期304-309,共6页
The proposed secure communication approach adopts the proposed algorithm of Analysis-By- Synthesis (ABS) speech information hiding to establish a Secret Speech Subliminai Channel (SSSC) for speech secure communica... The proposed secure communication approach adopts the proposed algorithm of Analysis-By- Synthesis (ABS) speech information hiding to establish a Secret Speech Subliminai Channel (SSSC) for speech secure communication over PSTN (Public Switched Telephone Network), and employs the algorithm of ABS speech information extracting to recovery the secret information, This approach is more reliable, covert and securable than traditional and chaotic secure communication. 展开更多
关键词 secure communication speech information hiding Subliminal channel Analysis-By-Synthesis(ABS)
下载PDF
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
2
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2011年第2期77-81,共5页
This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmeti... This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmetic with complex modulus and another on an elliptic curve modular equation. The proposed algorithm is illustrated in a numerical example. 展开更多
关键词 Complex MODULUS Cryptanalytic Protection DECOMPOSITION GAUSSIAN MODULAR ARITHMETIC information hiding Key Exchange MODULAR ELLIPTIC Curve secure Communication
下载PDF
AN OPTIMAL INFORMATION HIDING ALGORITHM FOR SPEECH IN THE FRACTIONAL FOURIER TRANSFORM DOMAIN
3
作者 Xi Ji Zou Cairong +1 位作者 Bao Yongqiang Wang Qingyun 《Journal of Electronics(China)》 2010年第4期564-570,共7页
With the increasing requirement of military and security, the technology of information hiding for speech becomes a hotspot and difficulty in the fields of speech signal processing and in-formation security, which is ... With the increasing requirement of military and security, the technology of information hiding for speech becomes a hotspot and difficulty in the fields of speech signal processing and in-formation security, which is developing rapidly. In order to stand against the stegano-analysis, the paper proposed an optimal information hiding algorithm for speech in the Fractional Fourier Transform (FrFT) domain based on the Minimum Mean Square Error (MMSE) criterion. The results of simulation and experiments show that speech modified by the proposed algorithm has no remarkable changes both in time and frequency domains, which can effectively resist the time and frequency analysis, Otherwise, the algorithm is robust to general signal process attack, and the difference is imperceptible between the original and modified speech. 展开更多
关键词 Practional Fourier Transform (FrFT) speech information hiding Minimum Mean Square Error (MMSE)
下载PDF
Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images 被引量:4
4
作者 Yanping Zhang Juan Jiang +2 位作者 Yongliang Zha Heng Zhang Shu Zhao 《International Journal of Intelligence Science》 2013年第2期77-85,共9页
Generally speaking, being an efficient information hiding scheme, what we want to achieve is high embedding capacity of the cover image and high visual quality of the stego image, high visual quality is also called em... Generally speaking, being an efficient information hiding scheme, what we want to achieve is high embedding capacity of the cover image and high visual quality of the stego image, high visual quality is also called embedding efficiency. This paper mainly studies on the information hiding technology based on gray-scale digital images and especially considers the improvement of embedding capacity and embedding efficiency. For the purpose of that, two algorithms for information hiding were proposed, one is called high capacity of information hiding algorithm (HCIH for short), which achieves high embedding rate, and the other is called high quality of information hiding algorithm (HQIH for short), which realizes high embedding efficiency. The simulation experiments show that our proposed algorithms achieve better performance. 展开更多
关键词 information hiding EMBEDDING Capacity EMBEDDING EFFICIENCY security Peak-Signal-to-Noise-Rate(PSNR)
下载PDF
On Hiding Secret Information in Medium Frequency DCT Components Using Least Significant Bits Steganography
5
作者 Sahib Khan M A Irfan +4 位作者 Arslan Arif Syed Tahir Hussain Rizvi Asma Gul Muhammad Naeem Nasir Ahmad 《Computer Modeling in Engineering & Sciences》 SCIE EI 2019年第3期529-546,共18页
This work presents a new method of data hiding in digital images,in discrete cosine transform domain.The proposed method uses the least significant bits of the medium frequency components of the cover image for hiding... This work presents a new method of data hiding in digital images,in discrete cosine transform domain.The proposed method uses the least significant bits of the medium frequency components of the cover image for hiding the secret information,while the low and high frequency coefficients are kept unaltered.The unaltered low frequency DCT coefficients preserves the quality of the smooth region of the cover image,while no changes in the high DCT coefficient preserve the quality of the edges.As the medium frequency components have less contribution towards energy and image details,so the modification of these coefficients for data hiding results in high quality stego images.The distortion due to the changes in the medium frequency coefficients is insignificant to be detected by the human visual system.The proposed methods demonstrated a hiding capacity of 43:11%with the stego image quality of a peak signal to the noise ration of 36:3 dB,which is significantly higher than the threshold of 30 dB for a stego image quality.The proposed technique is immune to steganalysis and has proved to be highly secured against both spatial and DCT domain steganalysis techniques. 展开更多
关键词 DCT STEGANOGRAPHY IMAGE processing information security data hiding steganalyisis
下载PDF
密文域可逆信息隐藏研究进展及技术难点分析 被引量:1
6
作者 涂广升 孔咏骏 +1 位作者 宋哲超 叶康 《广西师范大学学报(自然科学版)》 CAS 北大核心 2024年第2期1-15,共15页
密文域可逆信息隐藏技术融合了加密技术和信息隐藏技术的双重优势,旨在实现公开信道上数据内容的隐私保护和信息的可逆嵌入功能,以应对云环境下日益复杂的用户应用需求。本文从密态数据管理、情报隐蔽通信、军事协同作战、技术融合创新... 密文域可逆信息隐藏技术融合了加密技术和信息隐藏技术的双重优势,旨在实现公开信道上数据内容的隐私保护和信息的可逆嵌入功能,以应对云环境下日益复杂的用户应用需求。本文从密态数据管理、情报隐蔽通信、军事协同作战、技术融合创新4个应用场景分析密文域可逆信息隐藏的研究价值,根据信息嵌入与数据加密的操作关系对密文域可逆信息隐藏分类,对不同嵌入框架下的技术发展进行阐述和总结。同时,从嵌入性能提升、可分离性实现、图像的加密安全性、满足云环境下的应用需求4个方面对密文域可逆信息隐藏的技术难点进行剖析,并对后续研究方向进行分析和展望。 展开更多
关键词 信息安全 可逆信息隐藏 云环境 图像处理 密文域
下载PDF
基于相邻像素差值的可逆图像信息隐藏软件
7
作者 邓淑钇 马继梁 孙容海 《信息技术》 2024年第11期92-97,104,共7页
针对当前秘密信息在网络传输中仍存在非法窃取和内容篡改等现状,文中利用相邻像素差值的方法以及直方图平移技术,设计并开发出一款可逆图像信息隐藏软件。该软件是在PyCharm开发环境下使用Python语言实现,具有对BMP和TIFF等格式的载体... 针对当前秘密信息在网络传输中仍存在非法窃取和内容篡改等现状,文中利用相邻像素差值的方法以及直方图平移技术,设计并开发出一款可逆图像信息隐藏软件。该软件是在PyCharm开发环境下使用Python语言实现,具有对BMP和TIFF等格式的载体图像进行秘密信息隐藏、提取以及载体图像还原等功能。经软件测试,其结果显示该软件运行正常且稳定,各功能操作简单方便。 展开更多
关键词 信息安全 可逆信息隐藏 相邻像素差值 直方图平移 图像加密
下载PDF
一种基于NEQR模型的高效的量子图像水印协议
8
作者 孙文韬 魏战红 +1 位作者 韩孟迪 尹惠娟 《北方工业大学学报》 2024年第2期45-57,共13页
量子水印以量子图像为载体,能够实现秘密信息的安全传输。本文基于新型增强量子图像表示模型(Novel Enhanced Quantum Representation of Digital Images,NEQR)提出了一种高容量的量子水印协议,该协议将大小为2^(n)×2^(n)的载体图... 量子水印以量子图像为载体,能够实现秘密信息的安全传输。本文基于新型增强量子图像表示模型(Novel Enhanced Quantum Representation of Digital Images,NEQR)提出了一种高容量的量子水印协议,该协议将大小为2^(n)×2^(n)的载体图像分割成2^(2n-2)个不重叠的像素块,该像素块中的像素点两两进行灰度值差值计算,依据所得差值对像素块进行分类,并对不同类别的像素块设置标志位。协议在水印嵌入前,需将2^(n-1)×2^(n-1)大小的水印图像扩大4倍,然后将扩大后的水印依据标志位的不同嵌入不同的载体图像最低有效位(Least Significant Bit,LSB)中。本文给出了协议实现的量子线路,合法的接收方将提取水印的量子线路作用于嵌入水印的载体图像即可获取水印信息。同时,本文在量子计算仿真环境下对协议进行了仿真实验,仿真结果说明协议具有良好的不可见性,嵌入容量较好。 展开更多
关键词 量子水印 NEQR 安全性 LSB 量子信息隐藏
下载PDF
Survey of information security 被引量:40
9
作者 SHEN ChangXiang ZHANG HuangGuo +2 位作者 FENG DengGuo CAO ZhenFu HUANG JiWu 《Science in China(Series F)》 2007年第3期273-298,共26页
The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive ... The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of information security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc. 展开更多
关键词 information security CRYPTOLOGY trusted computing network security information hiding
原文传递
A New Images Hiding Scheme Based on Chaotic Sequences 被引量:2
10
作者 LIUNian-sheng GUODong-hui +1 位作者 WUBo-xi ParrG 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期303-306,共4页
We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use different chaotic random sequences multiplied by multiple sensitive imag... We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit). 展开更多
关键词 information hiding chaotic sequence information security image transform
下载PDF
Provably Secure Information Hiding via Short Text in Social Networking Tools 被引量:2
11
作者 Wei Ren Yuliang Liu Junge Zhao 《Tsinghua Science and Technology》 EI CAS 2012年第3期225-231,共7页
Utilizing OnLine Short Text (OLST) in social networking tools such as microblogs, instant messag- ing platforms, and short message service via smart phones has become a routine in daily life. OLST is ap- pealing for... Utilizing OnLine Short Text (OLST) in social networking tools such as microblogs, instant messag- ing platforms, and short message service via smart phones has become a routine in daily life. OLST is ap- pealing for personal covert communication because it can hide information in a very short carrier text, and this concealment is hard to detect due to the diversity of normal traffic. However, designing appropriate schemes confronts several challenges: they need to be provably secure, and their performance needs to maintain high efficiency and handy usability due to the short length of OLST messages. In this paper, we propose a family of customized schemes known as HiMix, HiCod, HiOpt, and HiPhs for text steganography in OLST. These schemes are evaluated in terms of their security and their performance with regard to two metrics that address the particular characteristics of OLST: hiding rate and hiding ease. All proposed schemes are proved to be at least computationally secure, and their performance in terms of hiding rate and hiding ease justifies their applicability in social networking tools that utilize OLST. 展开更多
关键词 information hiding provable security text steganography covert communication
原文传递
Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model
12
作者 Khalid A.El Drandaly Walid Khedr +1 位作者 Islam S.Mohamed Ayman Mohamed Mostafa 《Computers, Materials & Continua》 SCIE EI 2022年第6期5253-5270,共18页
Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protectin... Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protecting data from intruders.This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness.Protection of digital content is a major issue in maintaining the privacy and secrecy of data.Toward this end,digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark in an efficient manner.Recent methodologies in the research on digital watermarking result in data distortion after embedding the watermark.This scenario can reduce the efficiency of detecting watermarks as well as violate data confidentiality.This study adapts a robust reversible histogram shifting(HS)technique for textual data in relational databases.Furthermore,the study presents a digital watermarking scheme intended for document copyright protection and proof of ownership.The major advantage of the proposed watermarking scheme is that it can protect digital data and preserve data quality.To the best of our knowledge,this research methodology is promising for use in the HS expansion model for watermarking data on nonnumeric databases.In addition,the results showed that despite exposing the database to an insertion attacks at 50%and 75%of the watermark,the proposed algorithm can recovermore than half of the embedded watermark in all addition and alteration attacks cases.As a result,the watermark information can be retained and restored completely. 展开更多
关键词 information security digital watermarking information hiding histogram shifting technique
下载PDF
A NOVEL COVERT SPEECH COMMUNICATION SYSTEM AND ITS IMPLEMENTATION
13
作者 Deng Zongyuan Shao Xi +1 位作者 Yang Zhen Zheng Baoyu 《Journal of Electronics(China)》 2008年第6期737-745,共9页
In this paper, a Covert Speech Telephone (CST) is designed and implemented based on the information hiding technique, which works on the internet. To solve the large embedding capacity problem for real-time informatio... In this paper, a Covert Speech Telephone (CST) is designed and implemented based on the information hiding technique, which works on the internet. To solve the large embedding capacity problem for real-time information hiding, a steganographic system combined with a watermarking scheme is proposed, which skillfully transfers the secret speech into watermarking information. The basic idea is to use the speech recognition to significantly reduce the size of information that has to be transmitted in a hidden way. Furthermore, an improved DFT watermarking scheme is proposed which adaptively chooses the embedding locations and applies the multi-ary modulation technique. Based on the GUI (Graphical User Interface) software, the CST operates on both ordinary and secure mode. It is a completely digital system with high speech quality. Objective and subjective tests show that the CST is robust against normal signal processing attacks and steganalysis. The proposed scheme can be used in terms of military applications. 展开更多
关键词 STEGANOGRAPHY information hiding speech recognition Covert speech Telephone (CST)
下载PDF
基于预测误差与位平面编码的密文域可逆信息隐藏算法
14
作者 王海勇 吉梦凝 《网络与信息安全学报》 2023年第6期34-45,共12页
随着云计算技术的发展,越来越多的用户使用云备份的方式存储一些重要文件,与此同时,人们对于隐私保护的要求日益增长。密文域可逆信息隐藏是一种可以在密文图像中嵌入秘密信息,保证无错提取秘密信息以及无损恢复原始图像的技术,该技术... 随着云计算技术的发展,越来越多的用户使用云备份的方式存储一些重要文件,与此同时,人们对于隐私保护的要求日益增长。密文域可逆信息隐藏是一种可以在密文图像中嵌入秘密信息,保证无错提取秘密信息以及无损恢复原始图像的技术,该技术既保护了载体图像的安全性,又有效地在网络中传递隐私信息,能够应用于云环境实现对用户的隐私保护,受到研究者的广泛关注。针对现有密文域可逆信息隐藏算法嵌入率较低的问题,提出了基于预测误差与位平面编码的密文域可逆信息隐藏算法,该算法重点研究如何在保证安全性和可逆性的同时,实现高嵌入容量。所提算法对图像进行预处理,根据位平面分布的不同分别使用不同的方式编码,在图像中预留出大量空间,通过重排列将预留的空间放在低位平面中;使用密钥生成随机矩阵,对图像进行加密,以保证图像的安全性;将秘密信息嵌入预留的空间中。在接收端,合法接收者能够根据密钥可分离来实现秘密信息的无错提取以及原始图像的无损恢复。与现有算法相比,所提算法具有更高的嵌入率,在BOWS-2、BOSSBase和UCID这3个数据集上平均嵌入率分别达到了3.769 bit/pixel、3.874bit/pixel和3.148bit/pixel,分别比同类算法中性能最好的算法提升了12.5%、6.9%和8.6%。实验结果表明,所提算法能够充分利用图像的冗余性,有效提升嵌入率。 展开更多
关键词 可逆信息隐藏 密文域 游程编码 分离 信息安全
下载PDF
预测误差与中值扩展的可逆信息隐藏研究
15
作者 肖敏 郭美 朱卫平 《福建电脑》 2023年第6期69-72,共4页
可逆信息隐藏技术可为云服务、医学、司法等特殊场合的安全应用提供保证,该技术不仅能实现对机密的信息的隐藏,而且能完整地恢复出原始载体。本文针对图像的可逆信息隐藏技术,提出了预测误差与中值扩展的可逆信息隐藏算法。该算法通过Z... 可逆信息隐藏技术可为云服务、医学、司法等特殊场合的安全应用提供保证,该技术不仅能实现对机密的信息的隐藏,而且能完整地恢复出原始载体。本文针对图像的可逆信息隐藏技术,提出了预测误差与中值扩展的可逆信息隐藏算法。该算法通过Z字窗口预测误差,通过预测误差直方图的峰值点与中值点进行秘密信息嵌入。实验结果表明,该算法的性能评价指标隐藏容量大、透明性较好,鲁棒性强。 展开更多
关键词 网络安全 云服务 可逆信息隐藏 预测误差
下载PDF
Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing 被引量:1
16
作者 Adnan Gutub 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第2期440-452,共13页
This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting-based secret sharing.The trustfulness of shares utilised secret-sharing as an applicable priv... This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting-based secret sharing.The trustfulness of shares utilised secret-sharing as an applicable privacy creation tool for the authentication of real-life complex platforms.This research adjusts embedding the watermarking data over the images by innovative redistribution of shares to be embedded spread over all the images.The anticipated watermarking technique guaranteed to scatter the share bits implanting at different least significant bits of image pixels as boosting up the trust overall authentication practicality.The paper experimentation performance analysis shows that this improved image watermarking authentication(capacity)is averagely better by 33%–67%than other related exclusive-OR oriented and octagon approaches.Interestingly,these measurement improvements did not degrade the robustness and security of the system,inspiring our research for opening novel track of related future counting-based secret-sharing authentication progresses to come. 展开更多
关键词 counting-based secret-sharing data hiding fair data spreading image watermarking information security secret sharing
下载PDF
语音欺骗检测研究与分析
17
作者 夏玮江 彭海朋 李丽香 《信息安全与通信保密》 2023年第3期21-35,共15页
语音作为一种常用的生物特征,往往会被用于通过性安全认证。随之而来的就是ASV系统安全问题,攻击者会试图通过伪装成另一个已注册说话人的声音来通过ASV系统的检测。随着AI的发展,使用语音合成和语音转换等手段后的欺骗攻击都可以呈现... 语音作为一种常用的生物特征,往往会被用于通过性安全认证。随之而来的就是ASV系统安全问题,攻击者会试图通过伪装成另一个已注册说话人的声音来通过ASV系统的检测。随着AI的发展,使用语音合成和语音转换等手段后的欺骗攻击都可以呈现出其他特定说话人的高质量、可信的语音信号,从而对ASV构成威胁。与欺骗攻击相对应,语音欺骗检测是一种识别防御技术,国内外相关人员进行了最新的研究。基于此,介绍了最前沿挑战的欺骗检测技术,并对这些技术的局限性和未来进行分析。 展开更多
关键词 语音欺骗检测 自动说话人识别欺骗 信息安全 人工智能
下载PDF
A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation
18
作者 Al-Hussien Seddik Mohammed Salah +5 位作者 Gamal Behery Ahmed El-harby Ahmed Ismail Ebada Sokea Teng Yunyoung Nam Mohamed Abouhawwash 《Computers, Materials & Continua》 SCIE EI 2023年第3期5087-5103,共17页
The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency.Recently,researchers have tried to generate a new natural image driven from only t... The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency.Recently,researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it;this is called the stego image.This paper proposes a new secured coverless steganography system using a generative mathematical model based on semi Quick Response(QR)code and maze game image generation.This system consists of two components.The first component contains two processes,encryption process,and hiding process.The encryption process encrypts secret message bits in the form of a semi-QR code image whereas the hiding process conceals the pregenerated semi-QR code in the generated maze game image.On the other hand,the second component contains two processes,extraction and decryption,which are responsible for extracting the semi-QR code from the maze game image and then retrieving the original secret message from the extracted semi-QR code image,respectively.The results were obtained using the bit error rate(BER)metric.These results confirmed that the system achieved high hiding capacity,good performance,and a high level of robustness against attackers compared with other coverless steganography methods. 展开更多
关键词 Coverless steganography data hiding information security QR code maze game
下载PDF
Comparative Analysis of Execution of CNN-Based Sanguine Data Transmission with LSB-SS and PVD-SS
19
作者 Alaknanda S.Patil G.Sundari Arun Kumar Sivaraman 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1707-1721,共15页
The intact data transmission to the authentic user is becoming crucial at every moment in the current era.Steganography;is a technique for concealing the hidden message in any cover media such as image,video;and audio... The intact data transmission to the authentic user is becoming crucial at every moment in the current era.Steganography;is a technique for concealing the hidden message in any cover media such as image,video;and audio to increase the protection of data.The resilience and imperceptibility are improved by choosing an appropriate embedding position.This paper gives a novel system to immerse the secret information in different videos with different methods.An audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image.A hidden message is first included in the audio from the multimedia file;using LSB Technique.The Stego-video is created in the second stage by merging the authorized user’s face into the frame of the video;by using PVD technology.Stego-audio is linked again with the stego-video in the third stage.The incorporated perspective techniques(LSB-SS and PVD-SS algorithms)with more significant data immersing capacity,good robustness and imperceptibility are proposed in this research work.The spread spectrum approach is used to increase the complexity of secret data recognition.Two different video files are tested with different voice files with the results such as PSNR,SSIM,RMSE and MSE as 52.3,0.9963,0.0024 and 0.0000059,respectively. 展开更多
关键词 Audio steganography data hiding information security pixel value differencing
下载PDF
一种基于奇偶相关性网络的基音周期隐写分析方法
20
作者 王嘉伟 楼芊驿 +1 位作者 戴望宇 杨洁 《现代信息科技》 2023年第20期92-95,99,共5页
由于基音周期参数在语音编码过程中具有不可预测性,因此,很多隐写算法都将隐藏信息嵌入到基音周期中。目前已有多种基于基音周期的检测方法,但是如何准确的做到信息隐藏检测仍是一项挑战。文章提出了一种基于奇偶相关性网络的基因周期... 由于基音周期参数在语音编码过程中具有不可预测性,因此,很多隐写算法都将隐藏信息嵌入到基音周期中。目前已有多种基于基音周期的检测方法,但是如何准确的做到信息隐藏检测仍是一项挑战。文章提出了一种基于奇偶相关性网络的基因周期隐写分析方法。实验结果表明,该方法可以有效地检测基于基音周期的隐写术。实验结果表明,提出的方法可以有效地检测基于基音周期的隐写术,具有良好的实时性和健壮性。 展开更多
关键词 信息隐藏检测 SVM 语音码流
下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部