[1]郭舒婷,田晖.一种基于G.729a语音的信息隐藏方法[J].华侨大学学报(自然科学版),2014,35(3):277-282.[doi:10.11830/ISSN.1000-5013.2014.03.0277]
 GUO Shu-ting,TIAN Hui.An Information Hiding Method Based on G.729a Speech[J].Journal of Huaqiao University(Natural Science),2014,35(3):277-282.[doi:10.11830/ISSN.1000-5013.2014.03.0277]
点击复制

一种基于G.729a语音的信息隐藏方法()
分享到:

《华侨大学学报(自然科学版)》[ISSN:1000-5013/CN:35-1079/N]

卷:
第35卷
期数:
2014年第3期
页码:
277-282
栏目:
出版日期:
2014-05-16

文章信息/Info

Title:
An Information Hiding Method Based on G.729a Speech
文章编号:
1000-5013(2014)03-0277-06
作者:
郭舒婷 田晖
华侨大学 计算机科学与技术学院, 福建 厦门 361021
Author(s):
GUO Shu-ting TIAN Hui
College of Computer Science and Technology, Huaqiao University, Xiamen 361021, China
关键词:
信息隐藏 隐写 IP语音 G.729a 矩阵编码
Keywords:
information hiding steganography voice over internet protocol G.729a matrix encoding
分类号:
TP309.2;TP309.7
DOI:
10.11830/ISSN.1000-5013.2014.03.0277
文献标志码:
A
摘要:
针对VoIP系统普遍使用G.729a语音编码,采用逐帧按位取反的方式对G.729a语音进行全面测试,以客观的语音质量感知评价(PESQ)标准为依据,总结G.729a语音帧中可隐藏位(最低有效位).结合矩阵编码算法,提出一种基于G.729a语音的信息隐藏方法,以大量的语音样本为载体,对该方法进行测试分析.实验结果表明:该方法能提供可观的隐藏容量(8 bit·帧-1),较高的嵌入效率(2.678),很好的不可感知性(平均PESQ值为3.593),且很好地符合了VoIP通信的实时性要求.
Abstract:
For G.729a speech codec widely used in VoIP systems, a one-by-one bit flipping test for G.729a speech is carried out, and the available bits for steganography(least significant bits)are correspondingly obtained based on perceptual evaluation of speech quality. To combine with matrix encoding, an information hiding approach based on G.729a speech is proposed. The approach is tested and evaluated with a large number of speech samples as the carriers. Experimental results demonstrate that the proposed approach can provide a relatively high hiding capacity(8 bits/frame), higher embedding efficiency(2.678), good imperceptibility(the average PESQ score is 3.593)and nice real-time performance that meets the requirement of VoIP systems well.

参考文献/References:

[1] GU Chun-ying,GAO Xiao-li.Research on information hiding technology[C]// Proceedings of the 2nd International Conference on Consumer Electronics, Communications and Networks(CECNet).Yichang:IEEE Press,2012:2035-2037.
[2] MAZURCZYK W.VoIP steganography and its detection: A survey[J].ACM Computing Surveys,2013,2(46):20.
[3] FRACZEK W,MAZURCZYK W,SZCZYPIORSKI K.Hiding information in a stream control transmission protocol[J].Computer Communications,2012,2(35):159-169.
[4] XU Er-chi,LIU Bo,XU Li-yang.Adaptive VoIP steganography for information hiding within network audio streams[C]//Proceedings of the 14th International Conference on Network-Based Information Systems(NBiS).Tirana:IEEE Press,2011:612-617.
[5] MIAO Rui,HUANG Yong-feng.An approach of covert communication based on the adaptive steganography scheme on voice over IP[C]//Proceedings of the 46th IEEE International Conference on Communications(ICC).Kyoto:IEEE Press,2011:1-5.
[6] LIU Jin,ZHOU Ke,TIAN Hui.Least-significant-digit steganography in low bitrate speech[C]//Proceedings of the 47th IEEE International Conference on Communications(ICC).Ottawa:IEEE Press,2012:1109-1112.
[7] TIAN Hui,JIANG Hong,ZHOU Ke,et al.Adaptive partial-matching steganography for voice over IP using triple m sequences[J].Computer Communications,2011,34(18):2236-2247.
[8] XU Ting-ting,YANG Zhen.Simple and effective speech steganography in G.723.1 low-rate codes[C]//Proceedings of the 1st International Conference on Wireless Communications & Signal Processing.Nanjing:IEEE Press,2009:1-4.
[9] 杨俊,柏森,朱桂斌,等.G.723.1高速率语音流的信息隐藏算法[J].计算机工程,2011,37(22):114-115,118.
[10] LIU Li-hua,LI Ming-yu,LI Qiong,et al.Perceptually transparent information hiding in G.729 bitstream[C]//Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing.Harbin:IEEE Press,2008:406-409.
[11] HUANG Yong-feng,TANG Shan-yu.Steganography in inactive frames of VoIP streams encoded by source codec[J].IEEE Transactions on Information Forensics and Security,2011,6(2):296-306.
[12] HUANG Yong-feng,LIU Cheng-hao,TANG Shan-yu.Steganography integration into a low-bit rate speech codec[J].IEEE Transactions on Information Forensics and Security,2012,7(6):1865-1875.
[13] 刘程浩,柏森,黄永峰,等.一种基于基音预测的信息隐藏算法[J].计算机工程,2013,39(2):137-140.
[14] TIAN Hui,ZHOU Ke,FENG Dan.Dynamic matrix encoding strategy for voice-over-IP steganography[J].Journal of Central South University of Technology,2010,17(6):1285-1292.
[15] 贾俊,王朔中.基于LabVIEW平台的ABX测试系统[J].声学技术,2005,24(1):46-49.

备注/Memo

备注/Memo:
收稿日期: 2013-07-17
通信作者: 田晖(1982-),男,副教授,主要从事网络与多媒体信息安全、信息隐藏理论与技术的研究.E-mail:htian@hqu.edu.cn.
基金项目: 国家自然科学基金资助项目(61302094, 61370007, 61202468); 福建省科技创新平台建设基金资助项目(2012H2002); 福建省自然科学基金资助项目(2011J05151, 2013J01241); 福建省中青年教师教育科研资助项
更新日期/Last Update: 2014-05-20