用户名: 密码: 验证码:
语音隐藏分析方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着信息隐藏技术在网络和数字通信方面不断发展与应用,其被非法利用的危险性也相应增加。信息隐藏分析可用于网络信息的监控、分析甚至破解等,以保护网络的安全及社会的稳定。本文针对基于数字语音信息的隐藏分析作了研究,其主要内容和创新点如下:
     分析了信息隐藏前后语音质量统计上的变化,给出了两种语音信息隐藏盲检测方法:基于多元线性回归分类器的检测法和基于支持向量机的检测法。两者都是通过方差分析度量不同质量评估参数的可分性,选择能反映藏有信息的数字语音和未藏信息的数字语音在统计上差异的质量评估参数,用于训练学习分类器的建模和检测。前者采用多元线性回归分类器模型,后者采用支持向量机模型。实验结果表明,两种方法可以有效检测目前常见的变换域信息隐藏方法,如DFT域、DCT频、DWT域等,检测正确率均较高,使用支持向量分类器的检测效果更好。
     在研究质量评估参数之间相关性的基础上,提出了一种基于组合质量评估参数的语音隐藏盲检测方法。通过多维特征选取法,选择能较好区分藏有信息的数字语音和未藏信息的数字语音在统计上差异的组合参数,建立质量评估参数的支持向量机分类模型并进行检测。与不经组合特征选取的同类方法相比,提高了正确检测率,也降低了运算量。
     在较深入细致地研究回声隐藏方法基础上,提出了一种基于统计特征的检测策略。通过对原始语音样本和藏密语音样本复倒谱偏度和峰度的学习和训练,分别得到偏度和峰度阈值,并将其用于回声隐藏的盲检测。实验结果表明,该方法能够有效地检测出经典回声核、双极性回声核、双向回声核、双极性双向回声核等四种回声隐藏方法,运算简便,且检测率较高。
     设计并完成了相应的盲检测系统,进行了实验验证,取得了良好的实验结果。
The development of steganography in networks and communication arises the danger for illegal activities. Stegalysis can be used for watching, analyzing and deciphering of information to protect networks and society. This paper gives some research of stegalysis based on digital audio data, and the detailed contents are as follows.
     After researching on the statistical discrepancy of audio quality before data embedding and after, two blind speech stegalysis methods: stegalysis based on multiple linear regression and SVM (Support Vector Machine) are proposed. They both measure quality evaluation methods depends on ANOVA (Analysis of Variance), choose some quality metrics which reflect statistical discrepancy of pure speech and stego speech well, then training classifier can be modeled. The former uses multiple linear regression classifier and latter is SVM. Simulation results indicated that they general do well in transform domain steganographic, such as DFT, DCT and DWT domain. Correct detection rate of method using SVM is higher.
     By analyzing the correlation of different quality metrics, an audio steganalysis based on integrated quality metrics is described. The blind detection simulating model with SVM is created with integrated audio quality metrics, which chosen by multi-dimension feature extraction, and the probably stego-audio can be detected. Simulation results indicated that multi-dimension feature extraction performs higher conect detection rate.
     After researching principle of echo hiding, a steganalysis for echo hiding based on statistics charcters is proposed.Coefficients of skewness and kurtosis, belonging to complex cepstrum coefficient of pure and stego speech, are compared and trained for thresholds,which used for blind steganalysis of echo hiding. Expermental results show that the presented strategy can effectively detect four kinds of echo hiding methods, including custom, positive and negative, backward and forward kernels etc.
     Blind stegalysis system has been designed and verified by experiment results.
引文
[1]Hans Delfs,Helmut Knebl.Introduction to cryptography:principles and applications[M].北京:清华大学出版社.2007.
    [2]Simmons G J.The prisoners'problem and the subliminal channel.Proc.CRYPTO'83,1983.51-67.
    [3]Simmons G J.The Subliminal Channels in the US Digital Signature A[gorithm(DSA).3rd Symposium of State and Progress of Research in Cryptography.Rome,Italy:Fondazione Ugo Bordoni,1993.35-54.
    [4]Simmons G J.Subliminal channels:Past and present.European Trans.Telecommunications,1994,5(4):459-473.
    [5]S H Low,N F Maxemchuk,J T Brassil,et al.Document marking and identification using both line and word shifting.Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies,2-6 April 1995,vol.2,853-860.
    [6]Shirali-Shahreza M H,Shirali-Shahreza M.A New Approach to Persian/Arabic Text Steganography.5th IEEE/ACIS International Conference on Computer and Information Science,2006,10-12 July 2006,310-315
    [7]A M Alattar and O M Alattar.Watermarking electronic text documents containing justified paragraphs and irregular line spacing.Proceedings of SPIE-Volume 5306,Security,Steganography,and Watermarking of Multimedia Contents Ⅵ,June 2004,685-695.
    [8]Y Kim,K Moon,I Oh.A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics.Proceedings of the Seventh International Conference on Document Analysis and Recognition(ICDAR'03),2003,775-779.
    [9]K.Rabah.Steganography-The Art of Hiding Data.Information Technology Journal,vol.3,Issue 3,2004,245-269.
    [10]D Huang,H Yan.Interword Distance Changes Represented by Sine Waves for Watermarking Text Images.IEEE Transactions on Circuits and Systems for Video Technology,vol.11,no.12,December 2001,1237-1245
    [11]徐迎晖,杨榆,钮心忻等.基于语义的文本隐藏方法.计算机系统应用.2006年06期.91-94.
    [12]Chang C C,Lin C Y.Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation.Information Forensics and Security.2006,1(4):493-501
    [13]Noda H,Spaulding J,Shirazi M N,et al.Application of bit-plane decomposition steganography to JPEG2000 encoded images.Signal Processing Letters.2002,9(12):410-413
    [14]Po Chyi Su,Kuo C C J.Steganography in JPEG2000 compressed images.Consumer Electronics.2003,49(4):824-832
    [15]Satish K,Jayakar T,Tobin C,et al.Chaos based spread spectrum image steganography.Consumer Electronics.2004,50(2):587-590
    [16]Zhou Z P,Ji Z C,Wang Y.Z,et al.A New Algorithm of Steganography based on Palette Image.1ST IEEE Conference on Industrial Electronics and Applications,2006,1-4.
    [17]Raja K B,Chowdary C R,Venugopal K R,et al.A Secure Image Steganography using LSB,DCT and Compression Techniques on Raw Images.Third International Conference on Intelligent Sensing and Information Processing,2005,170-176
    [18]Tolba M F,Ghonemy M A S,Taha I A H,et al.High capacity image steganography using wavelet-based fusion.Ninth International Symposium on Computers and Communications,2004,Vol.1,430-435
    [19]Tong Liu,Zheng-ding Qiu.A DWT-based color image steganography scheme.6th International Conference on Signal Processing,2002,vol.2,1568-1571
    [20]Chih-Wei Tang,Hsueh-Ming Hang.A feature-based robust digital image watermarking scheme.IEEE Transactions on Signal Processing,[see also IEEE Transactions on Acoustics,Speech,and Signal Processing].2003,51(4):950-959
    [21]Yah Liu,Jiying Zhao.A robust RST invariant image watermarking method based on locally detected features.IEEE International Workshop on Haptic Audio Visual Environments and their Applications,2005,132-137
    [22]林代茂,郭云彪,胡岚等。一种安全的信息隐藏范式及其在二值图像上的实现.电子学报.2005,09:1537-1540
    [23]R Machado.EZStego.[Online].Available:http://www.ezstego.com
    [24]D Upham.Jsteg.[Online].Available:ftp.funet.fi
    [25]S Hetzl.Steghide.[Online].Available:http://steghide.sourceforge.net
    [26]A Latham.JPEG Hide-and-Seek.[Online].Available:http://linux01.gwdg.de/alatham/stego
    [27] N Provos. Outguess. [Online]. Available: http://www.outguess.org
    
    [28] Steganos, http://www.demcom.com/deutsch/index.htm
    
    [29] S-Tools, ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip
    
    [30] Cvejic, N., Seppanen, T. Increasing the capacity of LSB-based audio steganography[C]. Multimedia Signal Processing, 2002 IEEE Workshop on. 2002,336-338.
    [31] Byeong-Seob Ko, Nishimura R, Suzuki Y. Time-spread echo method for digital audio watermarking. IEEE Transactions on Multimedia. 2005, 7(2): 212-221
    [32] Chou S A, Hsieh S F. An Echo-Hiding Watermarking Technique Based on Bilateral Symmetric Time Spread Kernel. IEEE International Conference on Acoustics, Speech and Signal Processing, 2006, Vol.3, III-1100 - III-1103
    [33] Wen-Chih Wu, Chen O T C. An analysis-by-synthesis echo watermarking method [audio watermarking]. IEEE International Conference on Multimedia and Expo, 2004, Vol.3,1935- 1938.
    [34] Esmaili, S., Krishnan, S., Raahemifar, K. Audio watermarking time-frequency characteristics [J]. Electrical and Computer Engineering, Canadian Journal of. 2003,28(2):57-61
    [35] Wang, X.-Y., Zhao, H. A Novel Synchronization Invariant Audio Watermarking Scheme Based on DWT and DCT [J]. IEEE Transactions on Signal Processing. 2006,54(12):4835-4840.
    [36] Rang-Ding Wang; Da-Wen Xu; Qian Li. Multiple audio watermarks based on lifting wavelet transform [C]. Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on. 2005,4(4): 1959-1964
    [37] Chin-Su Ko, Ki-Young Kim, Rim-Wo Hwang, et al. Robust audio watermarking in wavelet domain using pseudorandom sequences[C]. Computer and Information Science, 2005. Fourth Annual ACIS International Conference on . 2005:397 - 401
    [38] Sang-Kwang Lee, Yo-Sung Ho. Digital audio watermarking in the cepstrum domain [J]. IEEE Transactions on Consumer Electronics,2000,46(3):744-750
    [39]Ingemar J.Cox,Joe Kilian,F.Thomson Leighton,et al.Secure Spread Spectrum Watermarking for Multimedia[J].IEEE transactions on image processing,1997,6(12):1673-1687
    [40]Takahashi A.Nishimura R,Suzuki Y.Multiple watermarks for stereo audio signals using phase-modulation techniques.Signal Processing.2005,53(2):806-815
    [41]Matsuoka H.Spread Spectrum Audio Steganography Using Sub-band Phase Shifting.International Conference on Intelligent Information Hiding and Multimedia Signal Processing.2006,3-6
    [42]Shyh-shiaw Kuo,Johnston,J.D,Turin,W,et al.Covert audio watermarking using perceptually tuned signal independent multiband phase modulation.IEEE International Conference on Acoustics,Speech,and Signal Processing,2002,1753-1756
    [43]Wen-Nung Lie,Li-Chun Chang.Robust and high-quality time-domain audio watermarking based on low-frequency amplitude modification.IEEE Transactions on Multimedia.2006,8(1):46-59
    [44]Nishimura A.Audio Watermarking Based on Sinusoidal Amplitude Modulation,IEEE International Conference on Acoustics,Speech and Signal Processing,2006,Vol.4,Ⅳ-797-Ⅳ-800
    [45]Robie D.L,Ning Wu,Mersereau R M.The use of steganography to enhance error detection and correction in MPEG-2 video.Conference Record of the Thirty-Sixth Asilomar Conference on Signals,Systems and Computers,2002,Vol.2,1204-1209
    [46]Wang Y,Pearmain A.Blind MPEG-2 video watermarking in DCT domain robust against scaling.Vision,Image and Signal Processing.2006,153(5):581-588
    [47]Barni M,Bartolini F,Checcacci N.Watermarking of MPEG-4 video objects.Multimedia.2005,7(1):23-32
    [48]戴侃斐,黄文勇,陈真勇等.基于生命游戏置乱的mpeg-4运动矢量水印算法.中山大学学报(自然科学版).2004年S2期,192-195
    [49]Gkizeli M,Pados D A,Medley M J.Optimal Signature Design for Spread-Spectrum Steganography.Image Processing.2007,16(2):391-405
    [50]Mihai P Mitrea,Titus B Zaharia,Francoise J Preteux,et al.Video watermarking based on spread spectrum and wavelet decomposition.Proc.SPIE 5607,2004,156-164
    [51]Chen B,Wornell G.Quantization index modulation:a class of provably good method for watermarking and information embedding.IEEE Transactions on Information Theory,2001,47(4):1423-1443.
    [52]Licks V,Ourique F,Jordan R,et al.An Exact Expression for the Bit Error Probability in Angle QIM Watermarking Under Simultaneous Amplitude Scaling and AWGN Attacks.IEEE International Conference on Acoustics,Speech,and Signal Processing,2005,Vol.2,801-804
    [53]熊淑华,卜云,周激流等.一种基于小波变换的非均匀量化索引调制水印算法.四川大学学报(工程科学版).2006年03期,40-143
    [54]Fridrich J,Soukal D.Matrix embedding for large payloads.Information Forensics and Security.2006,1(3):390-395
    [55]Yu-Chee Tseng,Yu-Yuan Chen,Hsiang-Kuang Pan.A secure data hiding scheme for binary images.IEEE Transactions on Communications,2002,50(8):1227-1231
    [56]何平,周辉,常向锋.隐写分析技术研究.装备制造技术.2007年第07期,80-82
    [57]Westfeld A,Pfitzmann A.Attacks on Steganographic Systems.In Processing of Information Hiding,Third International Workshop.Dresden,Germany.Springer Verlag.1999,61-75
    [58]Fridrich J,Goljan M.Detecting LSB steganography in color and gray-scale images.IEEE Transactions on Multimedia.2001,8(4):22-28.
    [59]Dumitrescu S,Wu X L,Wang Z.Detection of LSB steganography via sample pair analysis.IEEE Transactions on Signal Processing.2003,51(7):1995-2007
    [60]Avcibas I,Memon N,Sankur B.Steganalysis using image quality metrics.IEEE Transactions on Image Processing.2003,12(2):221-229.
    [61]Altun O,Sharma G,Celik M,et al.Morphological Steganalysis of Audio Signals and the Principle of Diminishing Marginal Distortions.IEEE International Conference on Acoustics,Speech,and Signal Processing,2005,Vol.2,21-24
    [62]S Geetha,Siva S,Sivatha Sindhu.Stegobreaker:Audio steganalysis using ensemble autonomous multi-agent and genetic algorithm[C].Annual India Conference,2006,(9):1-6
    [63]Ru Xue-min,Zhuang Yue-ting,Wu Fei.Audio steganalysis based on "negative resonance phenomenon" caused by steganographic tools.Journal of Zhejiang University-Science A.2006,7(4):577-583
    [64]A Ker.Steganalysis of LSB Matching in Grayscale Images.IEEE Signal Processing Letters.2005,12(6),441-444.
    [65]Qingzhong Liu,Sung A H,Jianyun Xu,et al.Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography.18th International Conference on Pattern Recognition,2006.Vol.2,267-270
    [66]Rongrong Ji,Hongxun Yao,Shaohui Liu,et al.A new steganalysis method for adaptive spread spectrum steganography.Intelligent Information Hiding and Multimedia Signal Processing,2006,365-368.
    [67]于小亿,谭铁牛,王蕴红.基于模型的信息隐藏检测研究.中山大学学报(自然科学版).第43卷增刊(2),2004,184-187.
    [68]Sullivan K,Bi Z,Madhow U,et al.Steganalysis of quantization index modulation data hiding.Image Processing.2004.ICIP.Vol.2,24-27.
    [69]何灿芝,罗汉.应用统计学[M].长沙:湖南大学出版社.2004.
    [70]孙即祥,王晓华,钟山等.模式识别中的特征提取与计算机视觉不变量[M].北京:国防工业出版社.2001.
    [71]马开玉,张耀存,陈星.现代应用统计学[M].北京:气象出版社.2004.
    [72]Filip Mulier.Vapnik-Chervonenkis(VC)Learning Theory and Its Applications.IEEE Trans.on Neural Networks.Vol.10,No.5,Sep 1999
    [73]Olvi L.Mangasarian,David R.Musicant.Successive Overrelaxation for Support Vector Machines[C].IEEE Trans.on Neural Networks.10(5),Sep 1999.
    [74]Nello Cristianini,John Shawe-Taylor著.李国正,王猛,曾华军 译.支持向量机导论[M].北京:电子工业出版社.2004.
    [75]IEEE.IEEE recommended practice for speech quality measurement[J].IEEE Trans.On Audio and Electroacoust.,Sep.1969:227-246.
    [76]N.Kitawaki,M.honda,K.itoh.Speech quality assessment methods for speech coding systems[J].IEEE Communications Magazine,Oct 1984,22(10):26-33.
    [77]W.D.Voiers.Diagnostic Evaluation of Speech Intelligility[M].in M E.Hawley(Ed.),Benchmark Papers in Acoustics,Stroudsburg,PA Dowden,Hutchenson and Ross,1977.
    [78]W.D.Voiers.Diagnostic acceptability measure for speech communication systems[A].Proc.1977IEEEICASSP[C],1977:204-207.
    [79]陈国,胡修林,张蕴玉等.语音质量客观评价方法研究进展[J].电子学报.2001,29(4),548-552.
    [80]S.R.Quackenbush,T.P.Barnwell Ⅲ,M.A.Clements.Objective Measures of Speech Quality[M].Englewood Cliffs,NJ:PrenticeHall 1988.
    [81]N.Kitawaki,H.Negabuchi,K.Itoh.Objective quality evalution for low-bit-rate speech coding systems[J].IEEE Journal on Sel.Areas in Communications,1988,6(2):242-248.
    [82]吴淑珍,LouisC.W.Pols.汉语通信系统客观音质评价方法[J].声学学报(中文版).1998,23(2):170-174
    [83]黄惠明,王瑛,赵思伟等.语音系统客观音质评价研究[J].电子学报,2000,28(4):112-114
    [84]R.Kubichek.Mel-cepstral distance measure for objective speech quality assessment[A],in Proc.IEEE Pacific Rim Conf[C].Communications,Computers,and Signal Processing,1993:125-128.
    [85]S.Wang,A.Sekey,A.Gersho.An objective measure for predicting subjective quality of speech coders[J].IEEE Journal on Sel.Areas in Communications,June 1992,10(5):819-829.
    [86]S.Voran.Objective estimation of perceived speech quality-partⅡ:Evaluation of the measuring normalizing block technique[J].IEEE Trans.on Speech and Audio Processing,1999,7(4):383-390.
    [87]Bell Northern Research.Re-evaluatin of the Objective Method for Measurement of Non-linear Distortion[M].Contribution to CCITT,COM Ⅻ 175 E,June1987.
    [88]J.Lalou.The information index:An objective measure of speech transmission performance[J].Ann.Telecommun.1990,45(1-2):47-65
    [89]R.Kubichek,E.A.Quincy,L.L.Kiser.Speech quality assessment using expert pattern recognition techniques[J].IEEE Pacific Rim Conference on Computers,Communication,and Signal Processing,Jun 1989:216-219.
    [90]韩纪庆,张磊,郑铁然.语音信号处理[M].北京:清华大学出版社.2004.(第四章完)
    [91]Bender W,Gruhl D,Morimoto N,et al.Techniques for data hiding[J].IBM Systems Journal, 1996,35(Nos3&4)313-336.
    [92]Gruhl D,Lu A,Bender W.Echo hiding[C],in Proc.Information Hiding Workshop (University of Cambridge,U.K.),1996:295-315.
    [93]Xu C,Wu J,Sun Q,et al.Applications of watermarking technology in audio signals[J],Journal Audio Engineering Society,1999,47(10):1995-2007.
    [94]Oh H O,SEOK J W,HONG J W,et al.New echo embedding technique for Robust and imperceptible audio watermarking[C].CD-ROM,International Conference on Acoustic,Speech and Signal Processing,Salt lake City,Utah,U.S.A,May 9-13,2001.
    [95]Oh H O,Kim H W,Seok J W.Transparent and Robust audio watermarking with a new echo embedding technique[M].Multimedia and Expo,2001:317-320.
    [96]Kim H J,Chio Y H.A novel echo-hiding scheme with backward and forward kernels[J].Circuits and Systems for Video Technology,2003,13:885-889.
    [97]Wen-chin Wu,Oscal T.-C.Chen.Analysis-by-synthesis Echo Hiding Scheme using Mirrored Kernels[C].ICASSP,2006,Ⅱ325-328
    [98]Foo S W,Yeo T H,Huang D Y.An adaptive audio watermarking system[C].Proceedings of IEEE Region 10,2001,2:509-513.
    [99]赵朝阳,刘振华,王挺.数字音频信号的回声隐藏技术[J].计算机应用研究,2000,17(2):42-44.
    [100]Ko B S,Nishimura R,Suzuki Y.Time-spread echo method for digital audio watermarking using pn sequences[C].IEEE International Conference on Acoustic,Speech,and Signal Processing,2002,2:2001-2004.
    [101]Jae-Won Cho,Ha-Joong Park,Young Huh,et al.Echo watermarking in sub-band domain[M].IWDW,2003:447-455.
    [102]Yah Bin,Sun Sheng-he,Lu Zhe-ming.Improved echo hiding using power cepstrum and simulated annealing based synchronization technique[C].Machine Learning and Cybernetics,2003 International Conference,Xi'an,Shan Xi,China,Nov 2-5,4:2142-2147.
    [103]杨榆,白剑,徐迎晖等.回声隐藏的研究与实现[J].中山大学学报(自然科学版),2004,43(2):50-53.
    [104]戚银城,苑津莎.语音回声信息隐藏技术研究[J].数据采集与处理,2006,21(4):418-422

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700