期刊文献+

语音保密通信中的信息隐藏算法研究 被引量:7

Study of Information Hiding in Security Speech Communication
在线阅读 下载PDF
导出
摘要 基于信息隐藏技术 ,提出并实现了一种语音保密通信的新方法。首先将保密语音进行混合激励线性预测 (MELP)编码 ,形成隐藏信息。然后依据人耳的掩蔽效应 ,在公开语音 DCT域中频点嵌入隐藏信息。解码器在同样的嵌入点检测隐藏信息 ,并经 MELP解码恢复保密语音。实验结果表明该算法在隐藏信息后 ,信道中传输的公开语音具有透明性 ,并且在受到压缩、滤波等攻击时具有较高的鲁棒性。 Based on the method of information hiding, a novel algorithm for security speech communication is designed and implemented in this paper. First, Mix Excitation Linear Prediction (MELP) coding is used for security speech. Then according to masking effect, the hiding bit is embedded in the intermediate frequency point of Discrete Cosine Transform (DCT). Detector determines the embedded information, and recovers security speech by MELP decoder. Experiment results show the speech which is embedded with information has transparent feature, and algorithm is strongly robust to many attacks such as compression, filter and so on.
作者 陈亮 张雄伟
出处 《解放军理工大学学报(自然科学版)》 EI 2002年第6期1-5,共5页 Journal of PLA University of Science and Technology(Natural Science Edition)
基金 国家高等学校骨干教师资助计划
关键词 语音保密通信 信息隐藏 离散余弦变换 混合激励线性预测编码 掩蔽效应 DCT域 security speech communication information hiding DCT MELP
  • 相关文献

参考文献6

  • 1SCHYNDEL R G Van, TIRKEL A A, OSBOME C F. A digital watermark [A]. In: Proc of ICIPt 94[C]. Anstin, Texas, 1994.
  • 2COX I J, KILIAN J, LEIGHTON T. Secure spread spectrum watermark for multimedia [J]. IEEE Trans Image Processing, 1997,6(12) :1673-1687.
  • 3LUTOBOSKI A, BALDOZA A, VEGIS J. On wavelet-based method of watermarking digital images[R]. New York: Dept of Mathematics, Syacuse Univ, Multi-Sensor Exploitation Branch, Air Force Research Lab, 1998.
  • 4王秋生,孙圣和.一种在数字音频信号中嵌入水印的新算法[J].声学学报,2001,26(5):464-467. 被引量:58
  • 5SUPPLEE L M, McCree A V. MELP: the new federal standard at 2 400 bit/s [A]. In: Proc ICASSP'97 [C]. Munich, 1997.
  • 6徐军,叶澄清,向辉.基于神经网络分类的图像数字水印算法[J].模式识别与人工智能,2001,14(3):261-265. 被引量:4

二级参考文献7

  • 1向辉.基于信息重组思想的多媒体数据压缩和多媒体数据安全技术研究:博士学位论文[M].浙江大学,1996..
  • 2Podilchuk C I,IEEE J Select Areas Commun,1998年,16卷,4期,525页
  • 3Hui Xiang,Security and Watermarking of Multimedia Contents,1999年,3657卷,449页
  • 4向辉,博士学位论文,1996年
  • 5Zhao J,Proc of the Conference on Intellectual Property Rights and New Technologies,1995年,241页
  • 6焦李成,神经网络的应用与实现,1993年
  • 7钮心忻,杨义先.基于小波变换的数字水印隐藏与检测算法[J].计算机学报,2000,23(1):21-27. 被引量:130

共引文献60

同被引文献52

  • 1茹国宝,杨锐,张永强,孙洪,黄天锡.基于频率掩盖模型的自适应音频水印算法[J].信号处理,2003,19(z1):394-397. 被引量:1
  • 2杨榆,白剑,徐迎晖,钮心忻,杨义先.回声隐藏的研究与实现[J].中山大学学报(自然科学版),2004,43(A02):50-52. 被引量:6
  • 3白剑,景晓军,杨榆,徐迎晖,钮心忻,杨义先.语音信息隐藏中的AERA算法[J].电子学报,2005,33(9):1541-1544. 被引量:3
  • 4[1]Simmons G J. The prisoners' problem and the subliminal channel. Advances in Cryptology, Proc.Crypto ' 83, Springer- Verlag, 1984 : 51 ~ 66
  • 5[2]LI Xin, YU H H. Transparent and Robust Audio Data Hiding in Cepstrum Domain [A]. In: 2000 IEEE Inernation Conference on Multimedia and Expo[C]. 2000. 397~400
  • 6[3]Darko Kirovski and Henrique Malvar. Robust Covert Communication over a Public Audio Channel Using Spread Spectrum [J]. IEEE Journal on Select Ares in Communications, 2003,16 (4): 561 ~ 572
  • 7[8]Orr R, Pike C, Bates M, Tzannes M, Sandberg S.Covert Communications Employing Wavelet Technology in Proc[J]. IEEE International Conference on Acustics, Speech and Signal Processing,2002,6:3630~3633
  • 8[10]Bender W, Gruhl D, Morimoto N, Lu A. Techniques for data hiding[J]. IBM Systems Journal,1996,35(3): 313~336
  • 9[11]Boney L,Tewfik A,Hamdy K. Digital watermarks for audio singals[J]. IEEE Int. Conf. on Multimedia Computing and Systems, 1996(1):473~480
  • 10[12]Bassia P, Pitas I. Robust audio watermarking in the time domain. Signal Processing IX, theories and applications: proceedings of eusipo- 98, ninth European signal processing conference,1998. 25~28

引证文献7

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部