IP语音隐写及隐写分析研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Survey for voice-over-IP steganography and steganalysis
  • 作者:刘小康 ; 田晖 ; 刘杰 ; 卢璥
  • 英文作者:LIU Xiaokang;TIAN Hui;LIU Jie;LU Jing;College of Computer Science and Technology,Huaqiao University;
  • 关键词:IP语音 ; 隐写 ; 隐写分析 ; 低速率语音编码
  • 英文关键词:voice over internet protocol;;steganography;;steganalysis;;low bit rate speech coding
  • 中文刊名:CASH
  • 英文刊名:Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
  • 机构:华侨大学计算机科学与技术学院;
  • 出版日期:2019-06-15
  • 出版单位:重庆邮电大学学报(自然科学版)
  • 年:2019
  • 期:v.31
  • 基金:国家自然科学基金(U1536115,U1405254);; 福建省高校新世纪优秀人才支持计划(MJK2016-23);; 福建省高校杰出青年科研人才培育计划(MJK2015-54);; 福建省自然科学基金(2018J01093)~~
  • 语种:中文;
  • 页:CASH201903017
  • 页数:13
  • CN:03
  • ISSN:50-1181/N
  • 分类号:127-139
摘要
随着IP语音(voice over IP,Vo IP)的快速发展,基于Vo IP的隐写及其隐写分析逐渐成为信息安全领域的研究热点。总结和分析了近年来的IP语音隐写和隐写分析相关研究,并探讨该领域未来的研究方向。IP语音隐写根据其隐藏信息位置不同,可分为基于协议的隐写及分析和基于语音载荷的隐写及分析。前者是利用IP语音中的各类协议为载体,将信息嵌入到协议头部中的某些字段或通过调制IP语音包的时序来实现;后者则是通过修改语音载荷实现信息隐藏,包括基于最低有效位(least significant bit,LSB)的隐写,基于量化索引调制(quantized index modulation,QIM)的隐写和基于语音变化域回声等隐写。从协议和语音载荷两方面对IP语音分析技术进行了分类介绍。前者可分为协议头分析、时间序列分析、编码调制分析3类。后者包括基于特点语音参数(如线性预测参数、固定码本参数、自适应码本参数和所有参数)的隐写分析和基于语音信号处理的隐写分析方法。
        With the rapid development of internet protocol voice,voice over internet protocol( Vo IP)-based steganography and steganalysis have grown as a hot research topic in the field of information security in recent years. This paper summarizes and analyzes the recent researches on IP voice steganography and steganalysis,and discusses the future research directions in this field. According to the location of the hidden information,IP voice steganography can be divided into protocolbased steganography and steganalysis,and voice payload-based steganography and steganalysis. The former is realized by embedding secret information into free or redundant areas of the protocol header or modulating the timing of IP voice packets with various protocols as carriers. The latter can hide secret information by modifying the voice payload,which can be divided into two categories,including steganography based on least significant bit( LSB) and steganography based on quantized index modulation( QIM). Correspondingly,the steganalysis of Vo IP is classified into two aspects: the protocol-based steganography can be divided into three categories: protocol head analysis,time series analysis,and coded modulation analysis.The payload-based steganography includes steganalysis based on characteristic speech parameters( such as linear prediction parameters,fixed codebook parameters,adaptive codebook parameters,and other parameters) and steganalysis based on speech signal processing.
引文
[1]SIMMONS G J.The Prisoners’Problem and the Subliminal Channel[M].Boston:Springer,Advances in Cryptology Proc Crypto,1984:51-67.
    [2]中国互联网协会.中国互联网发展报告2018[EB/OL].(2018-08-20)[2018-09-13].http://www.isc.org.cn/zxzx/xhdt/listinfo36076.html.Chinese Internet Association.China Internet Development Report 2018[EB/OL].(2018-08-20)[2018-09-13].http://www.isc.org.cn/zxzx/xhdt/listinfo36076.html.
    [3]MIMOSO Michael.Stegoloader Malware Uses Steganography to Hide Itself[EB/OL].(2015-06-16)[2018-09-05].https://threatpost.com/informationstealing-stegoloadermalware-hides-in-images/113337/.
    [4]BIZJOURNAL Boston,ZHENG Xiaoqing.Complaint[EB/OL].(2018-08-01)[2018-09-01].https://www.scribd.com/document/385387724/Xiaoqing-Zheng-complaint.
    [5]MAZURCZYK W,SZCZYPIORSKI K.Covert Channels in SIP for Vo IP Signalling[C]//Proceedings of International Conference on Global e-Security.Berlin,Heidelberg:Springer,2008:65-72.
    [6]BAI L Y,HUANG Y,HOU G,et al.Covert Channels Based on Jitter Field of the RTCP Header[C]//Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing.New York:IEEE Press,2008:1388-1391.
    [7]HUANG Y F,TANG S Y.Covert voice over internet protocol communications based on spatial model[J].Science China Technological Sciences,2016,59(1):117-127.
    [8]MAZURCZYK W,SMOLARCZYK M,SZCZYPIORSKIK.Retransmission steganography and its detection[J].Soft Computing,2011,15(3):505-515.
    [9]TIAN H,SUN J,CHANG C C,et al.Hiding Information into Voice-over-IP Streams Using Adaptive Bitrate Modulation[J].IEEE Communications Letters,2017,21(4):749-725.
    [10]LIANG C,TAN Y A,ZHANG X,et al.Building packet length covert channel over mobile Vo IP traffics[J].Journal of Network and Computer Applications,2018(118):144-153.
    [11]XU E,LIU B,XU L,et al.Adaptive Vo IP Steganography for Information Hiding within Network Audio Streams[C]//Proceedings of International Conference on Network-Based Information Systems.Tirana,Albania:IEEEComputer Society,2011:612-617.
    [12]MIAO R,HUANG Y.An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP[C]//Proceedings of IEEE International Conference on Communications.New York:IEEE Press,2011:1-5.
    [13]TIAN H,JIANG H,ZHOU K,et al.Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography[J].Computer Journal,2012,55(6):702-716.
    [14]XIAO B,HUANG Y,TANG S.An Approach to Information Hiding in Low Bit-Rate Speech Stream[C]//Proceedings of Global Telecommunications Conference,2008.IEEE GLOBECOM.New York:IEEE Press,2008:1-5.
    [15]GEISER B,VARY P.High rate data hiding in ACELPspeech codecs[C]//Proceedings of IEEE International Conference on Acoustics,Speech and Signal Processing.New York:IEEE Press,2008:4005-4008.
    [16]HUANG Y,LIU C,TANG S,et al.Steganography Integration Into a Low-Bit Rate Speech Codec[J].IEEETransactions on Information Forensics&Security,2012,7(6):1865-1875.
    [17]FOROUZAN B A,FEGAN S C.TCP/IP protocol suite[M].Beijing:Tsinghua University Press,2013:4783-4784.
    [18]MURDOCH S J,LEWIS S.Embedding Covert Channels into TCP/IP[C]//Proceedings of the 7th International Workshop on Information Hiding.Berlin,Heidelberg:Springer,2005:247-261.
    [19]CAUICH E,CRDENAS R G,WATANABE R.Data Hiding in Identification and Offset IP Fields[C]//Proceedings of International Symposium and School on Advancex Distributed Systems.Berlin,Heidelberg:Springer,2005:118-125.
    [20]FRACZEK W,MAZURCZYK W,SZCZYPIORSKI K.Hiding information in a Stream Control Transmission Protocol[J].Computer Communications,2012,35(2):159-169.
    [21]XUE P F,HU J S,LIU H L,et al.A new network steganographic method based on the transverse multi-protocol collaboration[J].Journal of Information Hiding&Multimedia Signal Processing,2017,8(2):445-459.
    [22]ELATAWY A,ALSHAER E.Building Covert Channels over the Packet Reordering Phenomenon[C]//Proceedings of the IEEE INFOCOM 2009.Rio de Janeiro,Brazil:IEEE Press,2009:2186-2194.
    [23]HAMDAQA M,TAHVILDARI L.Re LACK:A Reliable Vo IP Steganography Approach[C]//Proceedings of the5th IEEE International Conference on Secure Software Integration and Reliability Improvement.Jeju Island,South Korea:IEEE Press,2011:189-197.
    [24]MAZURCZYK W.Lost audio packets steganography:the first practical evaluation[J].Security&Communication Networks,2012,5(12):1394-1403.
    [25]MAZURCZYK W,KARAS M,SZCZYPIORSKI K.Sky De:a Skype-based Steganographic Method[J].International Journal of Computers Communications&Control,2013,8(3):432-443.
    [26]ELATAWY A,DUAN Q,ALSHAER E.A Novel Class of Robust Covert Channels Using Out-of-Order Packets[J].IEEE Transactions on Dependable&Secure Computing,2017,14(2):116-129.
    [27]LIANG C,WANG X,ZHANG X,et al.A payload-dependent packet rearranging covert channel for mobile Vo IP traffic[J].Information Sciences,2018(465):162-173.
    [28]MAZURCZYK W,SZAGA P,SZCZYPIORSKI K.Using transcoding for hidden communication in IP telephony[J].Multimedia Tools&Applications,2014,70(3):2139-2165.
    [29]LIU J,TIAN H T,ZHOU K.Frame-bitrate-change based steganography for voice-over-IP[J].Journal of Central South University,2014,21(12):4544-4552.
    [30]ARCHIBALD R,GHOSAL D.Design and analysis of a model-based Covert Timing Channel for Skype traffic[C]//Proceedings of 2015 IEEE Conference on Communications and Network Security(CNS).Florence,Italy:IEEE Press,2015:236-244.
    [31]LU X,HUANG L,YANG W,et al.Concealed in the Internet:A Novel Covert Channel with Normal Traffic Imitating[C]//Proceedings of International IEEE Conferences on Ubiquitous Intelligence Computing,Advanced and Trusted Computing,Scalable Computing and Communications,Cloud and Big Data Computing,Internet of People,and Smart World Congress(UIC/ATC/Scal Com/CBDCom/Io P/Smart World).Toulouse,France:IEEEPress,2017:285-292.
    [32]NAIR A S,KUMAR A,SUR A,et al.Length based network steganography using UDP protocol[C]//Proceedings of IEEE 3rd International Conference on Communication Software and Networks.New York:IEEE Press,2011:726-730.
    [33]JIANG Y,TANG S,ZHANG L,et al.Covert Voice over Internet Protocol Communications with Packet Loss Based on Fractal Interpolation[J].ACM Transactions on Multimedia Computing Communications&Applications,2016,12(4):54.
    [34]SCHMIDT S,MAZURCZYK W,KULESZA R,et al.Exploiting IP telephony with silence suppression for hidden data transfers[J].Computers&Security,2018(79):17-32.
    [35]DITTMANN J,HESSE D.Steganography and steganalysis in voice-over IP scenarios:operational aspects and first experiences with a new steganalysis tool set[C]//Proceedings of Security,Steganography,and Watermarking of Multimedia Contents VII.San Jose,California,United States:International Society for Optics and Photonics,2005:607-618.
    [36]WANG C,WU Q.Information Hiding in Real-Time Vo IPStreams[C]//Proceedings of 9th IEEE International Symposium on Multimedia(ISM 2007).Taichung,Taiwan,China:IEEE Press,2007:255-262.
    [37]AOKI N.A Semi-lossless Steganography Technique for G.711 Telephony Speech[C]//Proceedings of 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing.Darmstadt,Germany:IEEEPress,2010:534-537.
    [38]SU Y M,HUANG Y F,LI X.Steganography-Oriented Noisy Resistance Model of G.729a[C]//Proceedings of Computational Engineering in Systems Applications,IMACS Multiconference on.New York:IEEE Press,2007:11-15.
    [39]LIU L,LI M,LI Q,et al.Perceptually Transparent Information Hiding in G.729 Bitstream[C]//Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing.Harbin,China:IEEEComputer Society,2008:406-409.
    [40]TIAN H,ZHOU K,JIANG H,et al.An M-Sequence Based Steganography Model for Voice over IP[C]//Proceedings of IEEE International Conference on Communications.New York:IEEE Press,2009:1-5.
    [41]XU T,YANG Z.Simple and effective speech steganography in G.723.1 low-rate codes[C]//Proceedings of International Conference on Wireless Communications&Signal Processing.New York:IEEE Press,2009:1-4.
    [42]HUANG Y,XIAO B,XIAO H.Implementation of Covert Communication Based on Steganography[C]//Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing.Harbin,China:IEEE Computer Society,2008:1512-1515.
    [43]ZHOU K,LIU J,TIAN H,et al.State-based steganography in low bit rate speech[C]//Proceedings of ACM International Conference on Multimedia.New York:ACM,2012:1109-1112.
    [44]WEI Z,ZHAO B,LIU B,et al.A novel steganography approach for voice over IP[J].Journal of Ambient Intelligence&Humanized Computing,2014,5(4):601-610.
    [45]JANICKI A.Novel Method of Hiding Information in IPTelephony Using Pitch Approximation[C]//Proceedings of International Conference on Availability,Reliability and Security.Toulouse,France:IEEE Computer Society,2015:429-435.
    [46]TIAN H,QIN J,GUO S,et al.Improved adaptive partial-matching steganography for Voice over IP[J].Computer Communications,2015,70(C):95-108.
    [47]TIAN H,QIN J,HUANG Y,et al.Optimal matrix embedding for Voice-over-IP steganography[J].Signal Processing,2015,117(C):33-43.
    [48]PENG X,HUANG Y,LI L,A steganography scheme in a low-bit rate speech codec based on 3D-sudoku matrix[C]//Proceedings of 8th IEEE International Conference on Communication Software and Networks(ICCSN).Beijing,China:IEEE Press,2016:13-18.
    [49]PENG X,HUANG Y,LI F.A steganography scheme in a low-bit rate speech codec based on 3D-sudoku matrix[C]//Proceedings of IEEE International Conference on Communication Software and Networks.New York:IEEEPress,2016:13-18.
    [50]CHANG P C,YU H M.Dither-like data hiding in multistage vector quantization of MELP and G.729 speech coding[C]//Proceedings of Conference Record of the ThirtySixth Asilomar Conference on Signals,Systems and Computers.Pacific Grove,CA,USA,USA:IEEE Press,2002:1199-1203.
    [51]LIN C,PAN J S,LIAO B Y.Robust VQ-Based Digital Image Watermarking for Mobile Wireless Channel[C]//Proceedings of IEEE International Conference on Systems,Man and Cybernetics.New York:IEEE Press,2006:2380-2384.
    [52]WANG F H,JAIN L C,PAN J S.VQ-based watermarking scheme with genetic codebook partition[J].Journal of Network&Computer Applications,2007,30(1):4-23.
    [53]TIAN H,LIU J,LI S.Improving security of quantizationindex-modulation steganography in low bit-rate speech streams[J].Multimedia Systems,New York,2014,20(2):143-154.
    [54]LIU P,LI S,WANG H.Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec[J].Multimedia Systems,2017,23(4):485-497.
    [55]LIU P,LI S,WANG H.Steganography integrated into linear predictive coding for low bit-rate speech codec[J].Multimedia Tools&Applications,2017,76(2):2837-2859.
    [56]HUANG Y,TAO H,XIAO B,et al.Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys[J].Science China Technological Sciences,2017,60(10):1585-1596.
    [57]MIAO H,HUANG L,CHEN Z,et al.A new scheme for covert communication via 3G encoded speech[J].Computers&Electrical Engineering,2012,38(6):1490-1501.
    [58]LIU J,TIAN H,LU J,et al.Neighbor-index-division steganography based on QIM method for G.723.1 speech streams[J].Journal of Ambient Intelligence&Humanized Computing,2016,7(1):139-147.
    [59]YAN S,TANG G,CHEN Y.Incorporating data hiding into G.729 speech codec[J].Multimedia Tools&Applications,2016,75(18):11493-11512.
    [60]REN Y,WU H,WANG L.An AMR adaptive steganography algorithm based on minimizing distortion[J].Multimedia Tools&Applications,2017(6):1-16.
    [61]NISHIMURA A.Data Hiding in Pitch Delay Data of the Adaptive Multi-Rate Narrow-band Speech Codec[C]//Proceedings of International Conference on Intelligent Information Hiding&Multimedia Signal Processing.Kyoto,Japan:IEEE Computer Society,2009:483-486.
    [62]余迟,黄刘生,杨威,等.一种针对基音周期的3G信息隐藏方法[J].小型微型计算机系统,2012,33(7):1445-1449.YU Chi,HUANG Lliusheng,YANG Wei,et al.A 3GSpeech Data Hiding Method Based on Pitch Period[J].Journal of Chinese Computer Systems,2014,33(7):1445-1449.
    [63]刘程浩,柏森,黄永峰,等.一种基于基音预测的信息隐藏算法[J].计算机工程,2013,39(2):137-140.LIU C H,BAI S,HUANG Y F,et al.An Information Hiding Algorithm Based on Pitch Prediction[J].Computer Engineering,2013,39(2):137-140.
    [64]严书凡,汤光明,孙怡峰.基于基音周期预测的低速率语音隐写[J].计算机应用研究,2015,32(6):1774-1777.YAN Shufan,TANG Guangming,SUN Yifeng.Steganography for low bit-rate speech based on pitch period prediction[J].Application Research of Computers,2015,32(6):1774-1777.
    [65]YAN S,TANG G,SUN Y,et al.A triple-layer steganography scheme for low bit-rate speech streams[J].Multimedia Tools&Applications,2015,74(24):11763-11782.
    [66]HUANG Y,TANG F.Detection of covert voice-over Internet protocol communications using sliding windowbased steganalysis[J].Iet Communications,2011,5(7):929-936.
    [67]ZHAO H,ZHANG X.SIP Steganalysis Using Chaos Theory[C]//Proceedings of International Conference on Computing,Measurement,Control and Sensor.New York:IEEE Press,2012:95-100.
    [68]ZHAO H AND SHI Y,Detecting Covert Channels in Computer Networks Based on Chaos Theory[J].IEEETransactions on Information Forensics and Security,2013,8(2):273-282.
    [69]ZHAO H,ANSARI N.Detecting covert channels within Vo IP[C]//Proceedings of 35th IEEE Sarnoff Symposium IEEE.New York:IEEE Press,2012:1-6.
    [70]JANICKI A,MAZURCZYK W,SZCZYPIORSKI K.Steganalysis of transcoding steganography[J].Annals of telecommunications-annales des télécommunications,2014,69(7-8):449-460.
    [71]TIAN H,SUN J,CHANG C C,et al.Detecting Bitrate Modulation Based Covert Voice-over-IP Communication[J].IEEE Communications Letters,2018,22(6):1196-1199.
    [72]LIN Z,HUANG Y,WANG J.RNN-SM:Fast Steganalysis of Vo IP Streams Using Recurrent Neural Network[J].IEEE Transactions on Information Forensics and Security,2018,13(7):1854-1868.
    [73]YANG J,LI S.Steganalysis of Joint Codeword Quantization Index Modulation Steganography Based on Codeword Bayesian Network[J].Neurocomputing,2018(313):316-323.
    [74]李松斌,贾已真,付江云,等.基于码书关联网络的基音调制信息隐藏检测[J].计算机学报,2014,37(10):2107-2117.LI S B,JIA Y Z,FU J Y,et al.Detection of Pitch Modulation Information Hiding Based on Codebook Correlation Network[J].Chinese Journal of Computers,2014,37(10):2107-2117.
    [75]REN Y,YANG J,WANG J,et al.AMR Steganalysis Based on Second-Order Difference of Pitch Delay[J].IEEE Transactions on Information Forensics&Security,2017,12(6):1345-1357.
    [76]REN Y,CAI T,TANG M,et al.AMR Steganalysis Based on the Probability of Same Pulse Position[J].IEEE Transactions on Information Forensics&Security,2015,10(9):1801-1811.
    [77]TIAN H,WU Y,CHANG C C,et al.Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs[J].Signal Processing,2017,134(C):9-22.
    [78]TIAN H,SUN J,HUANG Y,et al.Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate[J].Mobile Information Systems,2017,2017(3):1-18.
    [79]GARATEGUY G,ARCE G R,PELAEZ J.Covert channel detection in Vo IP streams[C]//Proceedings of 45th Annual Conference on Information Sciences and Systems.New York:IEEE Press,2011:1-6.
    [80]HUANG Y,TANG S,BAO C,et al.Steganalysis of compressed speech to detect covert voice over Internet protocol channels[J].Iet Information Security,2011,5(1):26-32.
    [81]TAO H,SUN D,HUANG Y,et al.A detection method of subliminal channel based on Vo IP communication[C]//Proceedings of the 1st International Workshop on Information Hiding and Its Criteria for Evaluation.New York:ACM Press,2014:37-41.
    [82]TIAN H,WU Y,CAI Y,et al.Distributed steganalysis of compressed speech[J].Soft Computing,2017,21(3):795-804.
    [83]YANG W,TANG S,LI M,et al.Markov bidirectional transfer matrix for detecting LSB speech steganography with low embedding rates[J].Multimedia Tools&Applications,2018,77(14):17937-17952.
    [84]LI S B,SUN D H,YUAN J,et al.A steganalysis method for G.729A compressed speech stream based on codeword distribution characteristics[J].Acta Electronica Sinica,2012,40(4):842-846.
    [85]LI S B,TAO H Z,HUANG Y F.Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis[J].Frontiers of Information Technology&Electronic Engineering,2012,13(8):624-634.
    [86]李松斌,黄永峰,卢记仓.基于统计模型及SVM的低速率语音编码QIM隐写检测[J].计算机学报,2013,36(6):1168-1176.LI S B,HUANG Y F,LU J C.Detection of QIM Steganography in Low Bit-Rate Speech Codec Based on Statistical Models and SVM[J].Chinese Journal of Computers,2013,36(6):1168-1176.
    [87]LI S,JIA Y,KUO C C J.Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals[J].IEEE/ACMTransactions on Audio Speech&Language Processing,2017,25(99):1854-1868.
    [88]DING Q,PING X.Steganalysis of Compressed Speech Based on Histogram Features[C]//Proceedings of 6th International Conference on Wireless Communications Networking and Mobile Computing(Wi COM).New York:IEEE Press,2010:1-4.
    [89]LU J,HUANG Y,LIU F,et al.Pulse position checkingbased steganalysis of G.723.1 compressed speech in Vo IP[J].International Journal of Multimedia Intelligence&Security,2011,2(3/4):225-237.
    [90]MIAO H,HUANG L,SHEN Y,et al.Steganalysis of Compressed Speech Based on Markov and Entropy[C]//Digital-Forensics and Watermarking.Berlin,Heidelberg:Springer,2014:63-76.
    [91]TIAN H,WU Y,CHANG C,et al.Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics[J].Security&Communication Networks,2016,9(15):2934-2944.
    [92]KRAETZER C,DITTMANN J.Mel-cepstrum-based steganalysis for Vo IP steganography[C]//Proceedings of Security,Steganography,and Watermarking of Multimedia Contents IX.Bellingham WA,USA:SPIE,2007:650505
    [93]ZENG W,AI H,AND HU R,A Novel Steganalysis Algorithm of Phase Coding in Audio Signal[C]//Proceedings of 6th International Conference on Advanced Language Processing and Web Information Technology(AL-PIT 2007).Luoyang,Henan,China:IEEE Press,2007:261-264.
    [94]KOCAL O H,YURUKLU E,AVCIBAS I.Chaotic-Type Features for Speech Steganalysis[J].IEEE Transactions on Information Forensics&Security,2008,3(4):651-661.
    [95]LIU Q,SUNG A H,QIAO M.Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis[J].IEEETransactions on Information Forensics&Security,2009,4(3):359-368.
    [96]YANG W,TANG S,LI M,et al.Steganalysis of Low Embedding Rates LSB Speech Based on Histogram Moments in Frequency Domain[J].Chinese Journal of Electronics,2017,26(6):1254-1260.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700