基于LDPC码的可靠自同步网络语音隐写
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Robust and Self-Synchronous Steganography for Voice-over-IP Based on LDPC Codes
  • 作者:高瞻瞻 ; 汤光明 ; 宋海涛
  • 英文作者:Gao Zhanzhan;Tang Guangming;Song Haitao;PLA Information and Technology University;
  • 关键词:网络语音 ; 自适应隐写 ; 分组丢失恢复 ; 隐写同步
  • 英文关键词:voice over IP;;adaptive steganography;;packet loss recovery;;steganographic synchronization
  • 中文刊名:XTFZ
  • 英文刊名:Journal of System Simulation
  • 机构:解放军信息工程大学;
  • 出版日期:2019-03-08
  • 出版单位:系统仿真学报
  • 年:2019
  • 期:v.31
  • 基金:国家自然科学基金(61272488);; 河南省科技攻关项目(122102210047);; 全军军事类研究生课题(2015JY125)
  • 语种:中文;
  • 页:XTFZ201903012
  • 页数:8
  • CN:03
  • ISSN:11-3092/V
  • 分类号:96-103
摘要
网络语音(Voice over IP,VoIP)建立在UDP/IP协议族上,网络分组丢失不可避免。VoIP隐写数据流无头无尾且实时性强,接收方难以准确提取秘密信息。提出一种可靠自同步的VoIP隐写框架,在兼顾隐蔽性的前提下解决了以上问题。利用LDPC(Low density parity check)码对秘密信息进行纠删预处理,再结合矩阵嵌入实现隐写,增强了隐蔽通信的可靠性;利用LDPC码的译码特性和校验约束关系建立编码辅助同步,实现秘密信息的自同步提取。实验结果表明,所提隐写框架可以有效同步收发双方,且抗分组丢失能力优于已有算法。
        VoIP(Voice over IP) is a kind of voice communication technology based on UDP/IP protocols,so packet loss will inevitably happen when the channel environment deteriorates. Besides that, stego VoIP data flows are real-time and have no head or tail, which pose more challenges to accurately extract the secret messages. This paper proposes a robust and self-synchronous VoIP steganography method, which solves the above two problems under the premise of maintaining good imperceptibility. In this method,low density parity check(LDPC) codes are introduced to preprocess the secret data, and the encoded data are embedded into voice packets with minimum distortion using matrix embedding. In this way, the erasure correcting capability for covert communication is enhanced. Based on the decoding characteristics and the check constraints of LDPC codes, a code-aided synchronization scheme is established, which is used in the new method to realize self-synchronous message extraction.Experimental results show that the novel method can effectively synchronize both the sender and the receiver, and its resistance to packet loss is better than existing methods.
引文
[1]Sirisha K,Ramana B V.A Reliable Image Steganography with Image Clustering and Robust Steganography Using IWT[J].International Journal of Research in Computer and Communication Technology(S2320-5156),2015,4(12):2082-2089.
    [2]Rajana A N,Eswaran P.High Capacity Robust Image Steganography in the DCT Domain Using Spread Spectrum Technique[J].International Journal of Applied Engineering Research(S0973-4562),2015,10(6):14489-14496.
    [3]李晓博,周诠.统计量移位的顽健无损图像信息隐藏[J].中国图象图形学报,2012,17(11):1359-1366.Li Xiaobo,Zhou Quan.Robust Lossless Image Data Hiding with Statistical Quantity Shifting[J].Journal of Image and Graphics,2012,17(11):1359-1366.
    [4]Sarkar A,Madhow U,Manjunath B S.Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography[J].IEEE Transactions on Information Forensics and Security(S1556-6013),2010,5(2):225-239.
    [5]Liu Weiwei,Liu Guangjie,Dai Yuewei.Damage Resistance Matrix Embedding Framework:the Contradiction between Robustness and Embedding Efficiency[J].Security&Communication Networks(S1939-0114),2015,8(9):1636-1647.
    [6]Tang Shanyu,Chen Qing,Zhang Wei,et al.Universal Steganography Model for Low Bit-Rate Speech Codec[J].Security&Communication Networks(S1939-0114),2016,9(8):747-754.
    [7]Tian Hui,Qin Jie,Guo Shuting,et al.Improved Adaptive Partial-Matching Steganography for Voice over IP[J].Computer Communications(S0140-3664),2015,70(C):95-108.
    [8]Wei Ziling,Zhao Baokang,Liu Bo,et al.A Novel Steganography Approach for Voice over IP[J].Journal of Ambient Intelligence and Humanized Computing(S1868-5145),2014,5(4):601-610.
    [9]范亚楠,王丽冲,姚秀娟,等.一种交叠的Shuffled-BPLDPC译码算法[J].电子与信息学报,2016,38(11):2908-2915.Fan Yanan,Wang Lichong,Yao Xiujuan,et al.An Overlapped Shuffled-BP LDPC Decoding Algorithm[J].Journal of Electronics&Information Technology,2016,38(11):2908-2915.
    [10]Luby M G,Mitzenmacher M,Shokrollahi M A.Analysis of Random Processes via And-Or Tree Evaluation[C]//Proc of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms,SODA 1998.1998:364-373.
    [11]Shokrollahi M A.New Sequences of Linear Time Erasure Codes Approaching the Channel Capacity[J].Lecture Notes in Computer Science(S0302-9743),1999,1719:65-76.
    [12]Liu Jin,Zhou Ke,Tian Hui.Frame-Bitrate-Change based Steganography for Voice-over-IP[J].Journal of Central South University(S2095-2899),2014,21(12):4544-4552.
    [13]Carnegie Mellon University,Language Technologies Institute.CMU ARCTIC database[DB/OL].[2017-02-12].http://festvox.org/cmu_arctic/index.html.
    [14]Hu X Y,Eleftheriou E,Arnold D M.Regular and Irregular Progressive Edge-Growth Tanner Graphs[J].IEEE Transactions on Information Theory(S0018-9448),2005,51(1):386-398.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700