首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 453 毫秒
1.
以音频信号作为载体,对隐蔽性与嵌入量进行了研究,提出一种提升小波域的信息隐藏算法,算法利用矩阵编码来实现秘密数据的嵌入。该算法对载体音频帧作提升小波变换,采用人类听觉系统(HAS)的掩蔽特性来寻找合适的嵌入帧,提取宿主信号提升小波分解系数的LSB,矩阵编码实现秘密数据的嵌入。实验结果表明,该算法由于使用了人类听觉掩蔽特性,因此比普通小波域LSB算法具有更加高效、安全、隐蔽的性能,使得鲁棒性与不可感知性得到折中。  相似文献   

2.
基于频率掩蔽效应的自适应音频数字水印技术   总被引:4,自引:2,他引:4  
文章提出了一种基于频率掩蔽效应的自适应音频数字水印算法。嵌入的水印为视觉可辨的二值图像,水印能根据音频信号的频域掩蔽阈值进行自适应调整,水印的提取采用假设检验的方法。实验结果表明所嵌入的水印是不可感知的,该算法对大多数音频信号处理具有很强的鲁棒性,如重采样、MP3压缩和随机裁剪等操作。  相似文献   

3.
一种基于掩蔽效应的音频水印嵌入点寻找技术   总被引:4,自引:0,他引:4  
针对音频信号信息隐藏,提出了一种基于入耳掩蔽效应寻找适当嵌入点的方法。该方法在时域上对音频信号按一定大小进行分帧,计算每一帧若干个临界带宽的掩蔽阈值,然后通过与对应子带的能量进行比较来找到适当的嵌入点。当音频帧长度为数十毫秒数量级时取得了良好的效果。这种技术已成功地应用于一种高度稳健的音频数据隐藏方案中。  相似文献   

4.
提出了一种利用数字音频作载体、高嵌入量的信息隐藏算法,将音频信号划分为若干个包含相同采样点的片段,对每个片段前两个采样点的振幅进行比较,根据机密信息的比特位,结合人类听觉系统的掩蔽效应,采取不改变或缩小音频信号振幅的方法嵌入机密信息。实验证明,该算法听觉相似性好、稳健性较强、嵌入数据量大,能自恢复提取机密信息,可抵抗常见的信号处理及攻击,如重采样、添加高斯噪声、低通滤波等。  相似文献   

5.
一种用音频作载体的信息隐藏算法   总被引:2,自引:1,他引:1  
提出了一种利用数字音频作载体、高嵌入量的信息隐藏算法,将音频信号划分为若干个包含相同采样点的片段,对每个片段前两个采样点的振幅进行比较,根据机密信息的比特位,结合人类听觉系统的掩蔽效应,采取不改变或缩小音频信号振幅的方法嵌入机密信息。实验证明,该算法听觉相似性好、稳健性较强、嵌入数据量大,能自恢复提取机密信息,可抵抗常见的信号处理及攻击,如重采样、添加高斯噪声、低通滤波等。  相似文献   

6.
提出了一种关于能量比较的数字音频盲水印方案,该方案具有以下特点:根据人类听觉系统掩蔽特性,通过能量比较自适应地寻找最佳水印嵌入点;利用离散余弦变换(Discrete Cosine Transform,DCT)的能量压缩特性,提高数字水印的隐藏效果;实现音频数字水印的高透明性和高鲁棒性的同时,实现水印的盲检测。实验结果表明,算法不但保持了在各种攻击下较好的或更好的鲁棒性,定性和定量两方面的分析,也都显示了嵌入水印后的音频信号可以更好地保留原音频信号的感知质量。  相似文献   

7.
提出了一种基于小波变换的语音隐藏方法,把一段语音作为秘密信息嵌入一段数字音频信号中,其目的是用音频信号作伪装来传递秘密的语音信息或把语音信息作为一种标记来保护音频作品。这种方法根据人类听觉系统的特点,利用小波对语音信号进行压缩,增加了数据的嵌入量。载体音频信号小波变换后,选择部分小波系数用适当的嵌入参数嵌入信息。实验表明该算法的隐蔽性好,隐藏的数据量大,对常见的信号处理操作具有较强的稳健性,符合掩蔽通信的要求。  相似文献   

8.
马文君  陈砚圃  高悦  闵刚 《计算机应用》2010,30(8):2272-2274
基于扩频的音频隐藏算法一般都采用阈值相关法进行检测,但感知整形过程往往会破坏伪随机序列的正交性。为削弱盲提取时原始载体信号所导致相关噪声的影响,通过分析音频信号、伪随机序列和信道的统计特性,推导出接收信号的数学期望和方差,并给出了正确检测时各参数间的约束关系。最后,通过仿真实验验证了以上结论的正确性。  相似文献   

9.
对数字音频信号的回声数据隐藏技术进行了改进,应用人类听觉系统(HAS)的掩蔽效应对随机产生的回声更不易察觉的特点,将嵌入水印的回声用扩频方法作为其衰减系数,提高了音频数字水印的隐蔽性。实验表明该方法对多种攻击具有较好的抗干扰能力。  相似文献   

10.
基于m序列的音频水印隐藏算法   总被引:1,自引:0,他引:1  
该文提出基于m序列的音频信息隐藏算法,将需要隐藏的水印信息进行m序列的扩展;对数字音频信号进行分段离散小波变换,最后将经过调制的水印信号嵌入到二层小波变换的中频系数中。在接收端,利用盲检测可以精确地提取水印信号。实验仿真结果表明:算法对原始载体音频信号的影响极小,具有较好的鲁棒性和透明性。  相似文献   

11.
Highly Robust, Secure, and Perceptual-Quality Echo Hiding Scheme   总被引:1,自引:0,他引:1  
Audio watermarking using echo hiding has fairly good perceptual quality. However, security and the tradeoff between robustness and imperceptibility are still relevant issues. This paper presents the echo hiding scheme in which the analysis-by-synthesis approach, interlaced kernels, and frequency hopping are adopted to achieve high robustness, security, and perceptual quality. The amplitudes of the embedded echoes are adequately adapted during the embedding process by considering not only the characteristics of the host signals, but also cases in which the watermarked audio signals have suffered various attacks. Additionally, the interlaced kernels are introduced such that the echo positions of the interlaced kernels for embedding "zero" and "one" are interchanged alternately to minimize the influence of host signals and various attacks on the watermarked data. Frequency hopping is employed to increase the robustness and security of the proposed echo hiding scheme in which each audio segment for watermarking is established by combining the fractions selected from all frequency bands based on a pseudonoise sequence as a secret key. Experimental results indicate that the proposed analysis-by-synthesis echo hiding scheme is superior to the conventional schemes in terms of robustness, security, and perceptual quality.  相似文献   

12.
Steganography is the process of hiding information on a host signal. Transparency is referred to the ability to avoid suspicion about the existence of a secret message. The most popular mechanisms for hiding data in audio signals are the Least Significant Bit (LSB) substitution, Frequency Masking (FM), Spread Spectrum (SS), and Shift Spectrum Algorithm (SSA). In this paper, we adapt the Frequency Masking concept using an efficient sorting of the wavelet coefficients of the secret messages and use an indirect LSB substitution for hiding speech signals into speech signals. The experimental results show that the proposed model, the Efficient Wavelet Masking (EWM) scheme, has a hiding capacity significantly higher than the Spread and Shift Spectrum Algorithms and additionally a statistical transparency higher than all of the above mentioned mechanisms. Moreover, the transparency is not dependent of the host signal chosen because the wavelet sorting guarantees the adaptation of the secret message to the host signal.  相似文献   

13.
A novel technique is proposed for data hiding in digital audio that exploits the low sensitivity of the human auditory system to phase distortion. Inaudible but controlled phase changes are introduced in the host audio using a set of allpass filters (APFs) with distinct parameters of allpass filters, i.e., pole-zero locations. The APF parameters are chosen to encode the embedding information. During the detection phase, the power spectrum of the audio data is estimated in the z-plane away from the unit circle. The power spectrum is used to estimate APF pole locations, for information decoding. Experimental results show that the proposed data hiding scheme can effectively withstand standard data manipulation attacks. Moreover, the proposed scheme is shown to embed 5-8 times more data than the existing audio data hiding schemes while providing comparable perceptual performance and robustness  相似文献   

14.
Recently, a major problem faced by digital data providers and owners is protecting data from malicious falsification and distribution. As a solution to this problem, digital fingerprinting technique is now attracting attention as new method for integrity protection. According to frequency domain statistical characteristic, an efficient fingerprint-based audio authentication scheme is proposed in this paper. Initially, the host audio signal is equally divided into non-overlapping frames, moreover, each audio frame is then equally split into non-overlapping segments, and the DFT (discrete Fourier transform) domain relation of each audio segment is computed. Then DFT domain relations of each audio frame are adopted to generate the corresponding binary pattern using non-uniform quantization. Finally, the fingerprint is obtained by performing XOR operation between the binary pattern and binary pseudo-random sequence. Simulation results demonstrate the effectiveness of our scheme in terms of inaudibility, detection reliability, robustness against some non-malicious signal processing operations and vulnerability against malicious falsification.  相似文献   

15.
利用混沌系统广义同步定理,基于蔡电路系统构造了一个新的混沌系统,基于该系统设计了一个文本复合加密隐藏方案。该方案首先用复合系统产生的混沌码对明文加密,然后将密文隐藏到语音信号中。方案能够实现无失真解密。数值模拟显示新加密方案产生的混沌流具有良好的伪随机性。该方案对混沌系统的参数及初始条件极为敏感,表明该方案具有较高的安全性。数值模拟显示该方案能够有效地应用于网络通讯。  相似文献   

16.
《Digital Signal Processing》2013,23(4):1216-1227
A new perceptual audio hashing algorithm based on maximum-likelihood watermarking detection is proposed in this paper. The idea is justified by the fact that the maximum-likelihood watermark detector responds similarly to perceptually close audio using a non-embedded watermark (i.e. virtual watermark). The feature vector, which is composed of the total amplitude of low-order Zernike moments of each audio frame, is modeled by the Gaussian or Rayleigh distribution. Then, the maximum-likelihood watermark detection is performed on the feature vector with the virtual watermarks generated by pseudo-random number generator to construct the hash vector. Extensive experiments over three large audio databases of different type (speech, instrumental music, and sung voice) demonstrate the efficiency of the proposed scheme in terms of discrimination, perceptual robustness and identification rate. It is also verified that the proposed scheme outperforms state-of-the-art techniques in perceptual robustness and can be applied in content-based search, successfully.  相似文献   

17.
尹萍  闵乐泉 《计算机科学》2011,38(4):104-106
利用离散广义混沌同步定理,基于3D-Lorenz系统构造了一个新的离散混沌系统,并结合Arnold猫映射设计了一种音频复合加密方案。该方案首先用复合系统产生的混沌码对明文进行加密,然后将密文隐藏到wav语音信号中,解密过程能够实现无失真解密。数值模拟表明,新的离散混沌系统产生的混沌流具有良好的伪随机性,并且音频隐藏方案对混沌系统的参数及初始条件极为敏感,具有较高的安全性,能够有效地应用于网络通讯。  相似文献   

18.
将人眼的视觉特性和图像信息隐藏技术结合,文章提出了基于HVS特性的信息隐秘方法,设计实现了一种基于四边边缘匹配的自适应信息隐秘算法,利用嵌入信息像素相邻的四个像素信息估计嵌入容量,依据载体图像局部的不同特性自适应地隐藏秘密信息.实验结果表明,这种方法比最低有效位算法嵌入容量大,而且不会产生易觉察的失真.此外,隐蔽图像中嵌入数据的提取与原始图像无关.同时,采用伪随机机制的图像遍历顺序,提高了信息的隐蔽性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号