期刊文献+

基于回声隐藏的VDSC隐写分析算法 被引量:8

VDSC steganalysis algorithm of echo hiding
在线阅读 下载PDF
导出
摘要 基于回声隐藏改变自然语言倒谱分布这一特点,提出了一种新的针对回声隐藏的隐写分析算法。该算法无需估计隐写分段大小,通过构造倒谱和差分方差统计量VDSC(variants of difference of sum of cepstrum)来反映隐写对自然语音音频的影响,从而判定该文件是否为回声隐藏文件。实验结果显示,该算法正确率为88%。 Based on the idea that echo hiding changing the cepstrum distribution of natural audio, a new audio steganalysis method was presented. The VDSC (variants of difference of sum of cepstrum) was constructed to decet echo hiding audio files without estimating the size of hiding fragment. Experiment results show the accuracy of detecting echo hiding audio files is 88%.
出处 《通信学报》 EI CSCD 北大核心 2009年第2期83-88,共6页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(2007CB311203) 国家自然科学基金资助项目(60821001 90604022) 高等学校博士学科点专项科研基金资助项目(20070013007)~~
关键词 信息隐藏 音频隐写分析 回声隐藏分析 information hiding audio steganalysis echo hiding steganalysis
  • 相关文献

参考文献16

  • 1DUMITRESCU S, WU X L,WANG Z. Detection of LSB steganography via sample pair analysis[J].IEEE Trans on Signal Processing, 2003 51 (7): 1995-2007.
  • 2AVCIBAS I, MEMON N, SANKUR B. Steganalysis using image quality metrics[J]. IEEE Trans on Image Processing, 2003, 12(2):221- 229.
  • 3LYU S W, FARID H. Steganalysis using higher-order image statistics[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(1):111-119.
  • 4ZENG W, AI H J, HU R M, et al. Steganalysis of LSB embedding in audio signals based on sample pair analysis[A]. WICOM2007[C]. 2007. 2960 - 2963.
  • 5宋华,幸丘林,李维奇,戴一奇.MP3Stego信息隐藏与检测方法研究[J].中山大学学报(自然科学版),2004,43(A02):221-224. 被引量:9
  • 6王朔中,张新鹏,张开文.数字密写和密写分析[M].北京:清华大学出版社,2005.
  • 7OZER H, AVCIBACS I, SANKUR B, et al. Steganalysis of audio based on audio quality metrics[A]. Proceedings of SPIE, Security and Watermarking of Multimedia Contents V[C]. Santa Clara, CA, US, 2003.55-66.
  • 8AVCIBAS I. Audio steganalysis with content-independent distortion measures[J]. Signal Processing Letters, 2006, 13(2):92-95.
  • 9RU X M, ZHANG H J, HUANG X. Steganalysis of audio: attacking the Steghide[A]. Proceedings of 2005 International Conference on Machine Learning and Cybernetics[C]. 2005.3937-3942.
  • 10JOHNSONG M K, LYU S, FARID H. Steganalysis of recorded speech[A]. Security, Steganography, and Watermarking of Multimedia Contents Ⅶ[C]. CA, USA, 2005.664-672.

二级参考文献1

共引文献28

同被引文献69

  • 1章熙春,曹燕,张军,韦岗.语音MFCC特征计算的改进算法[J].数据采集与处理,2005,20(2):161-165. 被引量:6
  • 2杨榆,雷敏,白剑,钮心忻,杨义先.回声隐藏DSP快速算法的研究与实现[J].计算机应用研究,2006,23(4):121-122. 被引量:1
  • 3唐升,侯榆青,卢艳玲,克兢.回声隐藏技术研究进展[J].电声技术,2006,30(3):37-41. 被引量:6
  • 4Moore B C J. Masking in the human auditory system [C]// Collected Papers on Digital Audio Bit-Rate Reduction. New York: Audio Engineering Society, 1996: 9-19.
  • 5Oh H O, Kim H W, Seok J W, et al. Transparent and Robust audio watermarking with a new echo embedding technique [C]//IEEE International Conference on Multimedia and Expo. Tokyo, Japan: IEEE, 2001: 317-320.
  • 6Kim H J, Choi Y H. A novel echo-hiding scheme with backward and forward kernels[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13: 885-889.
  • 7YAN Bin, SUN Sheng he, LU Zheming. Improved echo hiding using power cepstrum and simulated annealing based synchronization technique [C]// Proceedings of 2003 International Conference on Machine Learning and Cybernetics. Xi'an, China: IEEE, 2003:2 142-2 147.
  • 8Chang C C, Lin C J. LIBSVM: A library for support vector machines[EB/OL]. [2007-11-20]. http ://www. csie. ntu. edu. tw/-cjlin/libsvm.
  • 9Bender W, Gruhi D, Morimoto N, et al. Techniques for data hiding[J]. IBM Systems Journal, 1996, 35: 313-316.
  • 10Ozer H, Avcibas I, Sankur B, et al. Steganalysis of audio based on audio quality metrics[J]. Proceedings of the Society of Photo-Optical Instrumentation Engineers (SHE), 2003, 5 020: 55-66.

引证文献8

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部