共查询到19条相似文献,搜索用时 203 毫秒
1.
语音信息隐藏一直是信息安全领域内研究的热点和难点。本文基于掩蔽效应和扩频码理论,提出了一种新的基于跳变分数傅里叶变换的高透明语音信息隐藏模型,首先从时频域掩蔽出发,提出了分数傅里叶变换域上的隐秘信息嵌入算法,并提出了在分数相关倒谱域上的隐秘信息提取算法。同时又提出了一种宽间隔多进制伪随机序列来控制分数阶因子α。理论分析和实验结果表明,该模型具有很强的透明性,在时域、频域和倒谱域都无法发现隐秘信息的存在,同时能够抗信道噪声的影响。研究表明该模型在语音信息隐藏领域具有较高的应用价值和广阔的应用前景。 相似文献
2.
3.
基于离散余弦变换的复值加密图像隐藏技术 总被引:6,自引:0,他引:6
提出了一种基于宿主图像离散余弦变换(DCT)的复值加密图像隐藏技术,待隐藏图像经双随机相位编码后的复值加密图像按一定规律隐藏在放大的宿主图像的离散余弦变换系数中.在提取隐藏图像过程中,利用相邻像素相减(NPVS)算法对藏有信息的宿主图像离散余弦变换系数进行运算,提取出隐藏的复值加密图像.经过正确的双随机相位解码,可获得原隐藏图像.研究了不同嵌入权重因子ω下藏有信息的宿主图像和解码后隐藏图像的各自相关度,分析了在ω=0.2情况下藏有信息的宿主图像的剪切对提取的隐藏图像质量的影响和基于数字全息的三维物体信息隐藏,结果表明该图像隐藏技术隐藏信息量大,抗剪切能力强,保密性好. 相似文献
4.
5.
6.
7.
文章提出一种基于小波变换的新颖的鲁棒语音扩谱水印算法。算法对原始语音进行离散小波变换.利用扩谱水印技术将水印隐藏到小波域。根据检测与估计理论,运用新的检测统计量进行相关检测。同时,通过引入抗异步攻击的机制和倒谱滤波,增强了算法的鲁棒性。实验结果表明,该算法对噪声、中值滤波、低通滤波、异步攻击等有较强的鲁棒性。 相似文献
8.
重放语音欺骗攻击是自动说话人验证系统(Automatic Speaker Verification,ASV)面临的严重威胁。目前,基于常数Q变换倒谱系数(Constant Q Cepstral Coefficients,CQCC)和梅尔频率倒谱系数(Mel Frequency Cepstrum Coefficient,MFCC)的检测模型存在检测性能不理想、泛化能力差等问题。对此,提出一种基于分数阶傅里叶变换(Fractional Fourier Transformation,FrFT)和K-均值聚类的无监督重放语音检测模型。首先利用FrFT将语音信号转换至分数域,然后提取分数域双谱特征构成特征向量,并利用K-均值聚类算法进行聚类分析,实现重放语音检测。基于ASVspoof2019公开数据集的试验结果表明,所提方法相对于CQCC和MFCC两种传统方法在t-DCF和EER两项指标方面分别提升超过6.52%和7.76%,并且作为一种无监督模型,不需要训练样本即可实现检测,在少样本情况下仍然能够获得较高的检测性能,泛化能力更强。 相似文献
9.
10.
11.
12.
In this paper, a Covert Speech Telephone (CST) is designed and implemented based on the information hiding technique, which works on the internet. To solve the large embedding capacity problem for real-time information hiding, a steganographic system combined with a watermarking scheme is proposed, which skillfully transfers the secret speech into watermarking information. The basic idea is to use the speech recognition to significantly reduce the size of information that has to be transmitted in a hidden way. Furthermore, an improved DFT watermarking scheme is proposed which adaptively chooses the embedding locations and applies the multi-ary modulation technique. Based on the GUI (Graphical User Interface) software, the CST operates on both ordinary and secure mode. It is a completely digital system with high speech quality. Objective and subjective tests show that the CST is robust against normal signal processing attacks and steganalysis. The proposed scheme can be used in terms of military applications. 相似文献
13.
LPC parameters substitution for speech information hiding 总被引:1,自引:0,他引:1
Information hiding techniques adopted in secret communication should meet the requirements of high hiding capacity, real-time and high robustness. For the purpose of real-time speech secure communication, an information hiding algorithm based on the analysis-by-synthesis (ABS) speech coding scheme is presented in this article. This algorithm substitutes secret speech data bits for linear predictive coefficients (LPCs) in linear predictive coding (LPC). Statistics show that the change of voiced signal track is slow and the codebook for LPCs vector is large in ABS coding scheme. Therefore, a new concept, filter similarity, is proposed to determine the LPC parameters for substituting with secret speech information, and to generate multi-codebook for saving storage space to store secret speech information. To achieve the best effects of information hiding, a dynamic threshold is built to make an optimal trade-off among hiding-capacity, security, robustness, transparence and real time. Experiments show that the proposed approach meets the requirements of information hiding and secret communication speech quality. The test results indicate that this approach reaches high hiding capacity with an excellent speech quality and complicating speakers'recognition. 相似文献
14.
信息隐匿技术是信息安全研究的一个新领域,为了确保隐匿信息安全,研究了一种利用压缩编码作为载体的信息隐藏技术,给出了基于压缩编码思想的通用信息隐匿模型的具体实现方案。讨论了该模型的两种关键技术:数据变换和数据选择技术。运用文中所给的通用模型,通过实验得出图像嵌入量和图像质量的关系。 相似文献
15.
16.
VoIP以语音流为传输媒介,具有传输数据量大和应用广泛的优点。但VoIP系统也面临数据安全和隐私泄露的安全威胁。针对编码标准G.729固定码本搜索的非遍历特性和具有一定冗余性的特点,该文提出基于G.729语音编码非零脉冲位置信息的隐藏算法。该算法在固定码本搜索过程中,利用秘密信息控制码本的搜索过程,并在非零脉冲位置和秘密信息之间构建函数进行信息隐藏。在搜索过程中利用最不重要脉冲替换思想并采用最小化失真准则控制由秘密信息的嵌入带来的音质失真。实验结果表明:算法隐藏容量可达400 bit/s,算法具有良好的隐蔽性(PESQ平均值约为3.45)。 相似文献
17.
Piva A. Barni M. Bartolini F. De Rosa A. 《Vision, Image and Signal Processing, IEE Proceedings -》2005,152(5):604-610
Research on data hiding is demonstrating every day that several applications can benefit from this technology; among these, medical data management. In particular, embedding patient information into a medical image through data hiding could improve the level of security and confidentiality that is essential for the diffusion of medical information systems. The design of a data hiding system for such an application has to take into account specific requirements, the most important are: high payload to identifying reliably a patient; quality preservation of the watermarked image; robustness to content modification. According to this analysis, a comparison between different data hiding approaches is presented, to evaluate the most suitable algorithms for embedding patient information into digital radiographs. In particular two algorithms based on statistical decision theory have been compared with schemes following the new approach of modelling data hiding as communication with side-information at the transmitter. These methods have been tested and compared in the framework of digital radiographies management in order to identify their benefits and drawbacks. 相似文献
18.
A. Ouled Zaid A. Makhloufi A. Bouallegue C. Olivier 《Signal, Image and Video Processing》2010,4(1):11-21
Digital watermarking can be used as data hiding technique to interleave medical images with patient information before transmitting
and storing applications. While digital image watermarking and lossy compression methods have been widely studied, much less
attention has been paid to their application in medical imaging situations, due partially to speculations on loss in viewer
performance caused by degradation of image information. This article describes an hybrid data hiding/compression system, adapted
to medical imaging. The central contribution is to integrate blind watermarking, based on turbo trellis-coded quantization,
to JP3D encoder. The latter meets conformity condition, with respect to its antecedents JPEG2000 coders. Thus, the watermark
embedding can be applied on two-dimensional as well as volumetric images. Results of our method applied to magnetic resonance
and computed tomography medical images have shown that our watermarking scheme is robust to JP3D compression attacks and can
provide relative high data embedding rate whereas keep a relative lower distortion. 相似文献
19.
基于分块最佳预测的可逆数据隐藏 总被引:2,自引:2,他引:0
为了提高嵌入算法的性 能,提出一种基于分块最佳预测和直方图平移的灰度图像可逆数据隐藏算法。根据嵌 入阈值,统计 每一图像块中4种预测方案的嵌入容量,选择最大容量对应的预测方案作为该图像块的最佳 预测方案。嵌 入算法充分利用像素值局部相关性,自适应地选择最佳预测方案,有效提高嵌入容量。实验 结果表明,本 文算法在保证图像质量的同时有效提高嵌入容量,算法的整体性能比其它同类算法更优。 相似文献