高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于随机位置选择和矩阵编码的语音信息隐藏方法

吴志军 李常亮 李荣

吴志军, 李常亮, 李荣. 基于随机位置选择和矩阵编码的语音信息隐藏方法[J]. 电子与信息学报, 2020, 42(2): 355-363. doi: 10.11999/JEIT181163
引用本文: 吴志军, 李常亮, 李荣. 基于随机位置选择和矩阵编码的语音信息隐藏方法[J]. 电子与信息学报, 2020, 42(2): 355-363. doi: 10.11999/JEIT181163
Zhijun WU, Changliang LI, Rong LI. Speech Information Hiding Method Based on Random Position Selection and Matrix Coding[J]. Journal of Electronics & Information Technology, 2020, 42(2): 355-363. doi: 10.11999/JEIT181163
Citation: Zhijun WU, Changliang LI, Rong LI. Speech Information Hiding Method Based on Random Position Selection and Matrix Coding[J]. Journal of Electronics & Information Technology, 2020, 42(2): 355-363. doi: 10.11999/JEIT181163

基于随机位置选择和矩阵编码的语音信息隐藏方法

doi: 10.11999/JEIT181163
基金项目: 国家自然基金委员会与中国民航局联合基金(U1933108),天津市 自然科学基金(17JCZDJC30900),天津市教委科研计划项目 (2019KJ117), 2018 年中央高校基本科研业务费项目(3122018D007, 3122018C003)
详细信息
    作者简介:

    吴志军:男,1965年生,教授,博士生导师,研究方向为网络和信息安全

    李常亮:男,1993年生,硕士生,研究方向为信息安全

    李荣:女,1995年生,硕士生,研究方向为信息安全

    通讯作者:

    吴志军 zjwu@cauc.edu.cn

  • 中图分类号: TN912.3

Speech Information Hiding Method Based on Random Position Selection and Matrix Coding

Funds: The Joint Funds of National Natural Science Foundation of China and Civil Aviation Administration of China (U1933108), The Key Program of Natural Science Foundation of Tianjin (17JCZDJC30900), The Scientific Research Project of Tianjin Municipal Education Commission (2019KJ117), The Fundamental Research Funds for the Central Universities of China (3122018D34007, 3122018C003)
  • 摘要:

    针对低速率语音编码问题,该文提出基于G.723.1编码标准的信息隐藏算法。在基音预测编码过程中,通过控制闭环基音周期(自适应码本)的搜索范围,该文结合随机位置选择方法(RPS)和矩阵编码方法(MCM),实现秘密信息的嵌入,在语音编码过程中实现了信息的隐藏。RPS方法的采用降低了载体码字之间的关联性,MCM方法的采用降低了载体的改变率。实验结果证明,该文算法下PESQ恶化率平均值最大为1.63%,隐蔽性良好。

  • 图  1  实验拓扑图

    图  2  隐藏算法实现框图

    图  3  载密语音与未载密语音对比图

    图  4  时长为3 s样本的PESQ值对比

    图  5  时长为10 s样本的PESQ值对比

    图  6  压缩语音码流在不同样本时长下的平均检测率

    图  7  压缩语音码流在不同嵌入率下的平均检测率

    表  1  发送方、接收方台式PC配置情况

    处理器内存声卡系统
    Intel(R) Core(TM) i5-4590 CPU @ 3.30 GHz4 GBRealtek High Definition AudioWindows 7专业版 Service Pack 1
    下载: 导出CSV

    表  2  本文隐藏算法的PESQ统计值

    载密语音样本未载密语音样本PESQ改变率(%)
    3 s语音样本
    CSMCSWESMESWCSMCSWESMESWCSMCSWESMESW
    平均值3.42373.34403.41653.47503.44293.39953.42593.5193–0.55–1.63–0.27–1.20
    最大值3.89993.78154.09954.10153.82623.74063.88633.94581.931.095.493.94
    最小值2.97562.96152.97562.90223.09303.17013.11603.1265–3.80–6.58–4.51–7.17
    10 s语音样本
    CSMCSWESMESWCSMCSWESMESWCSMCSWESMESW
    平均值3.40953.35283.39903.38223.42183.39003.41023.4362–0.37–1.09–0.33–1.50
    最大值3.79543.71023.76143.87143.74063.67833.74063.86321.470.872.120.21
    最小值2.99652.91133.10032.99653.05903.01803.11233.0590–2.00–3.53–1.20–2.00
    下载: 导出CSV

    表  3  隐藏算法的PESQ统计对比(%)

    隐藏算法3 s语音样本10 s语音样本
    CSMCSWESMESW均值CSMCSWESMESW均值
    文献[6]隐藏算法–0.49–1.05–0.93–1.37–0.96–0.62–1.44–0.29–1.22–0.89
    文献[10]隐藏算法–0.59–1.63–0.28–1.35–0.96–0.52–1.42–0.35–1.47–0.94
    本文隐藏算法–0.55–1.63–0.27–1.20–0.91–0.37–1.09–0.33–1.50–0.82
    下载: 导出CSV

    表  4  语音帧处理时间统计对比(ms)

    隐藏算法CSMCSWESMESW均值
    文献[6]隐藏算法7.438.488.248.948.27
    文献[10]隐藏算法 7.02 7.96 7.89 8.74 7.90
    本文隐藏算法6.677.647.558.327.56
    下载: 导出CSV

    表  5  在满嵌入率下两种隐藏算法检测率(%)

    隐藏方法语音种类样本时长(s)
    0.10.20.30.40.50.60.70.80.91.02.03.04.05.06.0
    文献[10]隐藏算法英文85.4088.0088.5089.2590.1091.4591.4092.4092.9593.7096.2096.9597.1597.6597.35
    中文86.8088.6590.2090.5091.2092.2593.1094.2594.7094.0596.8097.2098.1597.7597.95
    文献[11]隐藏算法英文87.6590.1190.8191.6592.8994.0094.1595.0195.2096.6497.2098.70100.00100.00100.00
    中文90.7092.9594.0094.5595.7996.8397.1698.2298.3098.8999.1699.99100.00100.00100.00
    本文隐藏算法英文43.2046.4346.9547.3348.3949.5149.4450.3651.6451.9354.6755.6855.9256.0455.94
    中文45.5146.9147.5647.4848.7249.7049.5352.1452.3752.8755.0655.8656.0956.3555.63
    下载: 导出CSV

    表  6  在不同嵌入率下3种隐藏算法检测率(%)

    隐藏方法语音种类嵌入率(%)
    102030405060708090100
    文献[10]隐藏算法英文50.6157.6475.5380.2982.8185.6386.3590.5894.3297.35
    中文51.9358.4975.2880.5682.4985.2787.9292.5695.6397.95
    文献[11]隐藏算法英文53.9460.8978.6683.4985.9188.6989.3593.7497.25100.00
    中文54.5361.6779.5584.8886.7789.5591.8395.6698.55100.00
    本文隐藏算法英文16.3217.5230.8739.4841.1644.1545.6248.1252.6155.94
    中文15.2217.3530.5639.5241.7444.1644.5949.3152.3855.63
    下载: 导出CSV
  • PETITCOLAS F A P, ANDERSON R J, and KUHN M G. Information hiding - a survey[J]. The IEEE, 1999, 87(7): 1062–1078. doi: 10.1109/5.771065
    丁琦, 平西建. 基于脉冲位置参数统计特征的压缩域语音隐写分析[J]. 计算机科学, 2011, 38(1): 217–220. doi: 10.3969/j.issn.1002-137X.2011.01.051

    DING Qi and PING Xijian. Steganalysis of compressed speech based on statistics of pulse position parameters[J]. Computer Science, 2011, 38(1): 217–220. doi: 10.3969/j.issn.1002-137X.2011.01.051
    DITTMANN J, HESSE D, and HILLERT R. Steganography and steganalysis in voice-over IP scenarios: Operational aspects and first experiences with a new steganalysis tool set[J]. SPIE, 2005, 5681: 607–618.
    TIAN Hui, SUN Jun, CHANG C C, et al. Detecting bitrate modulation-based covert voice-over-IP communication[J]. IEEE Communications Letters, 2018, 22(6): 1196–1199. doi: 10.1109/LCOMM.2018.2822804
    TIAN Hui, SUN Jun, CHANG C C, et al. Hiding information into voice-over-IP streams using adaptive bitrate modulation[J]. IEEE Communications Letters, 2017, 21(4): 749–752. doi: 10.1109/LCOMM.2017.2659718
    XIAO Bo, HUANG Yongfeng, and TANG Shanyu. An approach to information hiding in low bit-rate speech stream[C]. 2008 IEEE Global Telecommunications Conference, New Orleans, USA, 2008: 1–5.
    TIAN Hui, LIU Jin, and LI Songbin. Improving security of quantization-index-modulation steganography in low bit-rate speech streams[J]. Multimedia Systems, 2014, 20(2): 143–154. doi: 10.1007/s00530-013-0302-8
    CHIANG Y K, TSAI P, and HUANG Fenglong. Codebook partition based steganography without member restriction[J]. Fundamenta Informaticae, 2008, 82(1/2): 15–27.
    LI Songbin, JIA Yizhen, and KUO C C J. Steganalysis of QIM steganography in low-bit-rate speech signals[J]. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 2017, 25(5): 1011–1022. doi: 10.1109/TASLP.2017.2676356
    HUANG Yongfeng, LIU Chenghao, TANG Shanyu, et al. Steganography integration into a low-bit rate speech codec[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(6): 1865–1875. doi: 10.1109/TIFS.2012.2218599
    LIU C, BAI S, and HUANG Y. An information hiding algorithm in G. 729a based on pith prediction[C]. The 10th National Academic Conference on Information Hiding and Multimedia Information Security, Beijing, China, 2012: 15–18.
    LIN Zinan, HUANG Yongfeng, and WANG Jilong. RNN-SM: Fast steganalysis of VoIP streams using recurrent neural network[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7): 1854–1868. doi: 10.1109/TIFS.2018.2806741
    YANG Wanxia, TANG Shanyu, LI Miaoqi, et al. Steganalysis of low embedding rates LSB speech based on histogram moments in frequency domain[J]. Chinese Journal of Electronics, 2107, 26(6): 1254–1260. doi: 10.1049/cje.2017.09.026
    WU Zhijun, Gao Wei, and YANG Wei. LPC parameters substitution for speech information hiding[J]. The Journal of China Universities of Posts and Telecommunications, 2009, 16(6): 103–112. doi: 10.1016/S1005-8885(08)60295-2
    HUANG Yongfeng, TANG Shanyu, and YUAN Jian. Steganography in inactive frames of VoIP streams encoded by source codec[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(2): 296–307. doi: 10.1109/TIFS.2011.2108649
    李松斌, 贾已真, 付江云, 等. 基于码书关联网络的基音调制信息隐藏检测[J]. 计算机学报, 2014, 37(10): 2107–2117. doi: 10.3724/SP.J.1016.2014.02107

    LI Songbin, JIA Yizhen, FU Jiangyun, et al. Detection of pitch modulation information hiding based on codebook correlation network[J]. Chinese Journal of Computers, 2014, 37(10): 2107–2117. doi: 10.3724/SP.J.1016.2014.02107
    TIAN Hui, JIANG Hong, ZHOU Ke, et al. Transparency-orientated encoding strategies for voice-over-IP steganography[J]. The Computer Journal, 2012, 55(6): 702–716. doi: 10.1093/comjnl/bxr111
    WESTFELD A. F5-A steganographic algorithm: High capacity despite better steganalysis[C]. The 4th International Workshop on Information Hiding, Pittsburgh, USA, 2001: 289–302.
    ITU-T. ITU-T P.862 Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs[S]. Geneva, Switzerland: International Telecommunications Union, 2001.
  • 加载中
图(7) / 表(6)
计量
  • 文章访问数:  2688
  • HTML全文浏览量:  952
  • PDF下载量:  93
  • 被引次数: 0
出版历程
  • 收稿日期:  2018-12-18
  • 修回日期:  2019-07-20
  • 网络出版日期:  2019-09-20
  • 刊出日期:  2020-02-19

目录

    /

    返回文章
    返回