期刊文献+

基于共生特性的G.729A基音调制信息隐藏的检测

G.729A Pitch Modulation Information Hiding Detection Based on Symbiotic Characteristics
在线阅读 下载PDF
导出
摘要 提出了一种G.729A自适应码本分组基音调制信息隐藏的检测算法.对语音码流的分析发现,通过基音预测进行信息隐藏将改变相邻语音帧中基音周期估计值的共生特性.通过量化这种共生特性,并经过PCA(Principal Component Analysis,主成分分析)降维获得对隐写检测敏感的特征向量.最后基于特征向量和SVM(Support Vector Machine,支持向量机)构建隐写检测器.对不同语音样本数据集的检测表明,当语音长度在2s及以上时,检测正确率均超过96%.此检测算法是一种有效的压缩域信息隐藏检测方法. A detection algorithm of pitch modulation information hiding in G. 729A low bit-rate speech codec is proposed. The analysis of speech stream showed that pith modulation information biding would change the pitch symbiotic characteristics of adjacent speech frames. We designed a model to quantify these pitch symbiotic characteristics for steganalysis. However, the dimension of quantitative feature vector of pitch symbiotic characteristics was too bigh,so PCA (Principal Component Analysis) was employed to reduce the dimension of the feature vector. Finally, we built a pitch modulation information biding detector based on the dimension reduced feature vector and SVM (Support Vector Macbine) classifier. Experiments on different speech datasets show that the proposed steganalysis algorithm is very effective: the accuracy is more than 96 % when speech length equals to or is greater than 2s. So this paper gives an effective method for compression domain information hiding detection.
出处 《电子学报》 EI CAS CSCD 北大核心 2015年第8期1513-1517,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.61303249) 海南省自然科学基金(No.614236) 海南省重大科技项目课题(No.JDJS2013006)
关键词 基音调制信息隐藏 共生特性 隐写检测 主成分分析 支持向量机 pitch modulation information biding symbiotic characteristics steganography detection principal component analysis (PCA) support vector machine (SVM)
  • 相关文献

参考文献1

二级参考文献24

  • 1Avcibas, I., 2006. Audio steganalysis with contentindependent distortion measure. IEEE Signal Process. Lett., 13(2):92-95. [doi:10.1109/LSP.2005.862152].
  • 2Chang, C.C., Lin, C.J., 2001. LIBSVM: a Library for Support Vector Machines. Available from http://www.csie.ntu. edu.tw/-cjlin/libsvm [Accessed on May 9, 2011].
  • 3Chen, B., Wornell, G.W., 2001. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf Theory, 47(4):1423-1443. [doi:10.1109/18.923725].
  • 4Hafiz, M., 2008. Steganalysis of QIM Steganography Using Irregularity Measure. Proc. 10th ACM Workshop on Multimedia and Security, p.149-158. [doi:10.11451 1411328.1411355].
  • 5Hafiz, M., 2010. Statistical Modeling of Footprints of QIM Steganography. IEEE Int. Conf. on Multi-media and Expo, p.1487 -1492. [doi: 1 0.11 09/1CME.201 0.5582954].
  • 6Hafiz, M., Subbalakshmi, K.P., Chandramouli, R., 2008. Nonparametric steganalysis of QIM data hiding using approximate entropy. SPIE, 6819:681914. [doi:10.11171 12.767313].
  • 7Huang, Y., Xiao, B., 2008. Implementation of Covert Communication Based on Steganography. Proc. 4th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, p.1512-1515. [doi:10.1109/I1H-MSP.2008.174].
  • 8Huang, Y., Tang, S., Zhang, Y., 2011a. Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis. lET Commun., 5(7): 929-936. [doi: 1 0.1 049/iet-com.201 0.0348].
  • 9Huang, Y., Tang, S., Bao, C., Yip, Y.J., 2011b. Steganalysis of compressed speech to detect covert voice over Internet protocol channels. lET In! Secur., 5(1):26-32. [doi:10. 1 049/iet-ifs.201 0.0032].
  • 10ITU-T, 1996a. ITU-T Recommendation G.723.1: Dual Rate Speech Coder for Multimedia Communications Transmitting at 5.3 and 6.3 kbit/s. ITU-T, Geneva.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部