语音信息隐藏与分析技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
信息隐藏作为保障信息安全的新技术,吸引了国内外众多学者的关注,已成为信息安全领域的研究热点。信息隐藏是要隐藏信息的存在性,信息隐藏分析是对信息隐藏系统进行攻击的技术。论文围绕如何提高隐藏容量、透明性、鲁棒性和如何提高信息隐藏分析的准确性,对以语音为载体的信息隐藏与隐藏分析技术展开研究。
     针对回声信息隐藏方法隐藏容量小的不足,提出一种回声多进制信息隐藏系统。仿真研究了延时时间、分段长度、回声的衰减系数等关键参数对隐藏信息恢复率的影响。通过引入32种延时的前向-后向回声实现了32进制信息隐藏,在透明性较好的情况下,使隐藏信息的容量较单回声方法提高了5倍,恢复率达到99%。对隐藏系统的健壮性进行了仿真分析,如抗噪声、再抽样、滤波、ADPCM压缩等,具有较好的效果。
     提出了一种由语音质量评价和心理声学模型联合控制嵌入强度的语音隐藏方法,克服了对透明性进行评价时完全依靠主观试听的缺点。给出了由语音质量评价和心理声学模型联合控制嵌入强度的算法框架,并详细描述了该算法从秘密信息的嵌入到提取的全过程。最后从信息隐藏的嵌入容量、隐蔽性、鲁棒性三个方面验证了本文算法的性能,同时与采用单一嵌入强度的叠加法进行了比较。实验结果表明本文算法在隐藏容量、隐蔽性及鲁棒性方面均有较好的表现,且性能优于采用单一嵌入强度的叠加算法。
     针对常用的小波域语音信息隐藏方法,研究了对应的隐藏分析技术,利用隐藏信息前后语音载体统计特征的变化来区分语音信号中是否有隐藏信息。针对小波域加性噪声嵌入模型,提出两种有效的分类特征:语音信号小波子带系数直方图联合特征和小波域幅度共生矩阵特征。对于训练和测试语音集,完成了特征的提取并采用BP网络进行分类,实验结果验证了两种特征的有效性。对于小波域乘性嵌入模型,为了克服高阶矩特征、小波子带系数直方图联合特征和小波域幅度共生矩阵特征分类正确率低的不足,提出采用同态处理的方法,得到较好的分类效果。
     由于语音信号小波子带系数直方图联合特征和小波域幅度共生矩阵特征的维数较高,不利于分类,本文提出了一种基于特征选择技术的小波域语音隐藏分析系统模型。提取待分析语音信号的特征后,对特征进行主成分分析处理或因子分析处理,以降低特征的维数,再使用支持向量机作为分类器来对待分析语音信号进行分类检测。实验结果表明,对3种小波域常用的语音信息隐藏算法的检测正确率均大于95%。
Information Hiding (steganography), a new technology in information security fields, interests many researchers in the world. The goal of steganography is to hide the existence of information, steganalysis is a technology to attack the information hiding system and detect the hiding information. Audio steganography and steganalysis technology are studied in this paper. On the basis of the analysis of main theoretical problem and the research of some technology problems, some algorithms are proposed to improve the information hiding capacity, transparency, robustness and the accuracy of wavelet domain speech steganalysis.
     An echo multi-ary data hiding system is proposed to overcome the disadvantages of low hiding capacity of echo hiding system. The influence of key parameters of the system to the restoration rate of information is studied, such as delay time, segment length, and decay amplitude. By introducing forward-backward echo kernel with 32 time delays, a 32-ary information hiding system is realized and the hiding capacity is five times of single echo hiding system. When the sample rate of cover-audio is 8 kHz, restoration rate of information reaches to 99%. The robustness of the steganography system is simulated too, such as attacks of white noise, resampling (upsampling, down sampling), filtering (low pass filtering, high pass filtering), ADPCM compressing.
     An adaptive speech information hiding method, in which its embedding amplitude is controlled by audio quality assessments and psychology model, is proposed. This method can overcome the disadvantages of subjective listening in judging the transparency of stego-audio. The procedure of the algorithm from information embedding to information detecting is dressed in detail. At last, the embedding capacity, transparency, robustness performances are studied and compared with the constant amplitude embedding method. Simulation results show that this algorithm is effective.
     Audio steganalysis technologies for wavelet domain embedding methods are studied, the difference of characteristic features after information embedded is utilized to determine if information is embedded to the audio signal. Two effective classification features are proposed for additive noise embedding model in wavelet domain. They are speech wavelet subband coefficients histogram union features and wavelet domain amplitude co-occurrence matrix features. These two features are extracted and used to classify the audio signal by BP neural networks. Simulation results show the effectiveness of these two features. For multiplicative noise embedding model in wavelet domain, high order statistical moments features, wavelet subband coefficients histogram union features and wavelet domain amplitude co-occurrence matrix features have low accuracy in classification. Homomorphic processing is used to overcome the problem of low steganalysis accuracy. The test audio signal is firstly calculated its absolute value and logarithm. Multiplicative noise is changed to additive noise and the classification accuracy is improved.
     A wavelet domain audio steganalysis system based on feature selection technology is constructed. Classification features of audio signals to be analyzed are extracted. And then these features are processed by the principle component analysis or the factor analysis methods. The dimensions of these features are reduced evidently. Support vector machine is used as the classifier to classify the cover-audio and the stego-audio. Simulation results show that the detection rate reaches to 95% for three wavelet domain steganography methods.
引文
[1] Fabien A P Petitcolas,Ross J Anderson, Markus G Kuhn. Information hiding-a survey. Proceedings of the IEEE, special issue on protection of multimedia content, 1999, 87(7): 1062~1078
    [2] J Silman. Steganography and steganalysis: an overview. SANS Institute, 2001, http:// www.sans.org/rr/steg/overview.php
    [3] G J Simmons. The history of subliminal channels. IEEE journal on selected areas in communication, 1998,16(4): 452~462
    [4] C Cachin. An information theoretic model for steganography. in: Proceeding of the 2nd Workshop on Information Hiding, Lecture Notes in Computer Science, Portland, USA, Springer, 1998, (1525):306~318
    [5] C Cachin. An information theoretic model for steganography. Information and Compu- tation, 2004,192(1):41~56
    [6]杨义先,钮心忻.多媒体信息伪装综论.通信学报, 2002, 23(5): 32~38
    [7] P Moulin, J A O’Sullivan. Information-theoretic analysis of information hiding. IEEE Transactions on Information Theory, 2003,49(3): 563~593
    [8] A S Cohen, A Lapidoth. The gaussian watermarking game. IEEE Transaction on Information Theory, 2002, 48(6): 1639~1667
    [9] Anelia Somekh-Baruch, Neri Merhav. On the capacity game of public watermarking systems. IEEE Transactions on Information Theory, 2004, 20(3):511~524
    [10] M Costa. Writing on dirty paper. IEEE Transaction on Information Theory, 1983, 29(3): 439~441
    [11] W Bender, D Gruhl, N Morimoto, et al. Techniques for data hiding. IBM Systems Journal, 1996, 35(3, 4):313~336
    [12] H J Kim,Y H Choi. A novel echo-hiding scheme with backward and forward kernels. IEEE Transactions on Circuits and Systems for Video Technology, 2003,13(8):885~889
    [13] Hyen-O Oh, J W Seok, J W Hong, et al. New echo embedding technique for robust and imperceptible audio watermarking. in: Proc. Of Int. Conf. on Acoustics, Speech, and Signal Processing, 2001,(3):1341~1344
    [14] Hyen-O Oh, H W Kim, J W Seok, et al. Transparent and Robust Audio Watermarking with a New Echo Embedding Technique. IEEE Proceedings of International Conference on Multimedia and Expo. ICME, 2001, 317~320
    [15] Dongyan Huang, Theng Yee Yeo. Robust and inaudible multi-echo audio watermarking. IEEE Pacific Rim Conference on Multimedia 2002: 615~622.
    [16] B Ko, R Nishimura, Y Suzuki. Time-spread echo method for digital audio watermarking using PN sequences. in: Proceedings of the IEEE InternationalConference on Acoustics, Speech, and Signal Processing, Orlando, 2002, 2001~2004
    [17] B Ko, R Nishimura, Y Suzuki. Time-spread echo method for digital audio watermarking. IEEE Transactions on Multimedia, 2005,7(2):212~221
    [18] Bin Yan, Shenghe Sun, Zheming Lu. Improved echo hiding using power cepstrum and simulated annealing based synchronization technique. in: IEEE the 2th International Conference on Machine Learning and Cybernetics, November, 2003, 2142~2147
    [19] A Z Trikel, G A Rankin, R M Schyndel, et al. Electronic Watermarking. in: Proceeding of Digital Image Computing. Technology and Applications (DICTA’93), Macquarie University, Sidney, 1993, 666~673
    [20] Chr Neubauer, J Herre, K Brandenhurg. Continuous steganographic data transmission using uncompressed audio. International Workshop on Information Hiding’98,LNCS 1525, 1998, 208~217
    [21] K Gopalan, Purdue Univ, S J Wenndt, et al. Audio steganography by amplitude or phase modification. in: Proceedings of the SPIE- Security and Watermarking of Multimedia Contents, Santa Clara, California, USA, 2003, (5020): 67~76
    [22] Rufeng Chu, Xinggang You, Xtangwei Kong, et al. A dct-based image steganographic method resisting statistical attacks. in: Proceedings of Acoustics, Speech, and Signal Processing 2004 (ICASSP '04), 2004, (5): 953~956
    [23]陈琦,王炳锡.一种基于DCT变换的语音数字水印算法研究.信号处理, 2001, 17(3): 238~241
    [24] N Cvejic. Algorithm for audio watermarking and steganography:[博士学位论文]. in Department of Electric and Information Engineering, Information Processing Laboratory,University of Oulu, vol. PhD. Oulu,Finland: University of Oulu, 2004
    [25]钮心忻,杨义先.基于小波变换的数字水印隐藏与检测算法.计算机学报, 2000, 23(1): 21~27
    [26]彭静玉,赵鹤鸣.基于小波变换的语音伪装算法.微电子学与计算机,2004, 21(9):11~14.
    [27]李倩,王让定.一种小波域音频信息隐藏方法.宁波大学学报(理工版),2004, 17(3): 319~323
    [28]周克兰,张玉华.基于听觉掩蔽效应和小波变换的数字音频水印.微电子学与计算机,2005,22(3):185~188
    [29]梁华庆,赵丽丽,钮心忻,等.一种基于心理声学模型的小波包域音频数字水印算法.石油大学学报(自然科学版), 2003, 27(6): 112~115
    [30]汝学民.音频隐写与分析技术研究:[博士学位论文].杭州:浙江大学,2006
    [31] A Westfeld, A Pfitzmann. Attacks on steganographic systems. Lecture Notes in Computer Science, Springer-Verlag, Berlin, 2000, 1768: 61~75
    [32] J Fridrich, M Goljan, R Du. Detecting LSB steganography in color and gray-scale images. Magazine of IEEE Multimedia, Special Issue on Security, 2001: 22~28
    [33] H Farid. Detecting hidden messages using higher-order statistical models. in: Proceeding of the IEEE International Conference on Image Processing. New York, 2002, 2: 905~908
    [34] Micah K Johnson, Siwei Lyu, Hany Farid. Steganalysis of Recorded Speech. in: Proceeding of SPIE, 2005, 5681: 664~672
    [35] Hamza ?zer, Bülent Sankur, Nasir Memon, et al. Detection of audio covert channels using statistical footprints of hidden messages. Digital Signal Processing, 2006,16: 389~401
    [36]张开文,张新鹏,王朔中.图象及音频信号中隐蔽嵌入信息存在性的统计检验.电子与信息学报, 2003, 25(7):871~877
    [37] Oktay Altun, Sharma G. Morphological steganalysis of audio signals and the prince- ple of diminishing marginal distortions. ICASSP, 2005, 21-24
    [38] H Ozer, I Avcibas, B Sankur, et al. Steganalysis of audio based on audio quality metrics. in: Proceeding of SPIE Security Watermarking Multimedia Contents V, 2003, 5020: 55~66
    [39] ? Avc?ba?. Audio steganalysis with content independent distortion measures. IEEE Signal Processing Letters, 2006, 13, 92~95
    [40] F A P Petitcolas, R J Anderson, M G Kuhn. Attacks on copyright marking systems. LNCS 1525, Berlin: Springer-Verlag, 1998, 219~239
    [41] J J Harmsen, W A Pearlman. Steganalysis of additive noise modelable information hiding. in: Proceedings of SPIE Electronic Imaging, 2003, 5022:21~24
    [42] Daniel Gruhl, Anthony Lu, Walter Bender. Echo hiding. in: Proceedings of the First International Workshop on Information Hiding, Cambridge, UK, 1996, Lecture Notes In Computer Science, 1174: 293~315
    [43] K C Pohlmann.数字音频原理与应用.苏菲译.北京:电子工业出版社,2002
    [44] C Xu,J wu,Q sun, et al. Applications of watermarking technology in audio signals. Journal of Audio Engineering Society,1999, 47(10):1995~2007
    [45] H-O Oh, J W Seok, J W Hong, et al. New echo embedding technique for robust and imperceptible audio watermarking. In: Proc. Int. Conf. on Acoustics, Speech, and Signal Processing, 2001,(3): 1341~1344
    [46] H-O Oh, H W Kim, J W Seok, et al. Transparent and robust audio watermarking with a new echo embedding technique. In: IEEE Proceedings of International Conference on Multimedia and Expo. ICME, 2001, 317~320
    [47] Dongyan Huang, Theng Yee Yeo. Robust and inaudible multi-echo audio watermarking. IEEE Pacific Rim Conference on Multimedia, 2002: 615~622
    [48]赵朝阳,刘振华,王挺.数字音频信号的回声数据隐藏技术.计算机应用研究, 2000,17(7):42~44
    [49] Jae-Won Cho, Ha-Joong Park, Young Huh, et al. Echo watermarking in sub-banddomain. in: Second International Workshop on Digital Watermarking, Seoul, Korea, 2003, 10. 447~455
    [50]杨榆,白剑,徐迎晖,等.回声隐藏的研究与实现.中山大学学报(自然科学版),2004,43(s2):50~52
    [51]唐升,侯榆青,卢艳玲,克兢.回声隐藏技术研究进展.电声技术,2006,3:38~412
    [52]杨榆,雷敏,白剑.回声隐藏DSP快速算法的研究与实现.计算机应用研究,2006,23(4):121~122
    [53]彭静玉,赵鹤鸣.基于小波变换的语音伪装算法.微电子学与计算机, 2004, 21(9): 11~14
    [54]钮心忻,杨义先.基于小波变换的数字水印隐藏与检测算法.计算机学报, 2000, 23(1): 21~27
    [55]周克兰,张玉华.基于听觉掩蔽效应和小波变换的数字音频水印.微电子学与计算机, 2005, 22(3): 185~188
    [56]李倩,王让定.一种小波域音频信息隐藏方法.宁波大学学报(理工版), 2004, 17(3): 319~323
    [57]梁华庆,赵丽丽,钮心忻,等.一种基于心理声学模型的小波包域音频数字水印算法.石油大学学报(自然科学版), 2003, 27(6): 112~115
    [58]杨福生.小波变换的工程分析与应用.北京:科学出版社,1999
    [59]李如伟,鲍长春,窦慧晶.基于双正交小波包分解的自适应阈值语音增强.仪器仪表学报, 2008, 29(10): 2135~2139
    [60]王让定,柴佩琪.基于听觉模型的自适应音频数字水印盲检算法.同济大学学报(自然科学版), 2004, 32(1): 1516~1520
    [61] Litao Gang, A N Akansu, M Ramkumar. MP3 Resistant Oblivious Steganography. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, 2001, 1365~1368
    [62] J Johnston, K Brandenburg. Wideband coding perceptual considerations for speech and music. In: Advances in Speech Signal Processing’1992. 1992, 109~140
    [63]钟玉琢,乔秉新,祁卫译.运动图像及其伴音通用编码国际标准-MPEG-2.北京:清华大学出版社, 1997
    [64] N Nocerjno, F K Soong, L R Rabiner, et al. Comparative study of several distortion measures for speech recognition. in: IEEE International Conference on Acoustics, Speech, and Signal Processing, 1985: 25~28
    [65] N Kitawaki, M Honda, K Itoh. Speech quality assessment methods for speech coding systems. IEEE Communications Magazine, 1984, 22(10): 26~33
    [66] R Kubichek. Mel-cepstral distance measure for objective speech quality assessment. In: IEEE Pacific Rim Conference on Communications, Computers, and Signal Processing, 1993: 125~128
    [67] I J Cox, J Kilian, T Leighton, et al. Secure spread spectrum watermarking formultimedia. IEEE Transaction on Image Processing, 1997,6(12):1673~1687
    [68] A Westfeld, A Pfitzmann. Attacks on steganographic systems. In: Proceedings of the 3rd Information Hiding International Workshop, Springer Verlag, 2000, Lecture Notes in Computer Science, 1768, 61~76
    [69] I Avcibas, N Memon, B Sankur. Steganalysis based image quality metrics. In: Proceedings of IEEE Fourth Workshop on Multimedia Signal Processing, 2001, 517~522
    [70] I Avcibas, N Memon, B Sankur. Steganalysis using image quality metrics. IEEE Transaction on Image Processing, 2003, 12(2): 221~230
    [71] Y K Lee, L H Chen. An adaptive image steganographic model based on minimum-error LSB replacement. In: the Proceedings of the 9th National Conference on Information Security, Taichung, Taiwan, 1999, 8~15
    [72] J T Jackson, G H Gunsch, R L Claypoole, et al. Blind steganography detection using a computational immune system: a work in progress. International Journal of Digital Evidence, 2003,4(1): 1~18
    [73] J Fridrich, M Goljan. Practical steganalysis of digital images - state of the art. In: Proceedings of SPIE Photonics West 2002, Electronic Imaging, Security and Watermarking of Multimedia Contents IV, 4675: 1~13
    [74] J Fridrich, M Goljan, R Du. Steganalysis based on JPEG compatibility. SPIE Multimedia Systems and Applications IV, Denver, Aug 2001, 20~24
    [75] Guoshiang Lin, Wennung Lie. A study on detecting image hiding by feature analysis. In the 2001 IEEE International Symposium on Circuits and Sytems, May 6~9, 2001,(2): 149~152
    [76]黄聪,宣国荣,高建炯,施云庆.基于图像及其预测误差图小波频域矩的隐写分析.计算机应用,2006,26(8):1851~1853
    [77]张开文,张新鹏,王朔中.图像及音频信号中隐蔽嵌入信息存在性的统计检验.电子与信息学报, 2003,5(7):871~877
    [78] O Altun, G Sharma, M Celik, et al. Morphological steganalysis of audio signals and the principle of diminishing marginal distortional. IEEE International Conference on ICASSP 2005, March, 2005,(2): 21~24
    [79] S Geetha, S Sindhu, A Kannan. Audio steganalysis using ensemble of autonomous multi-agent and support vector machine paradigm. Third International Conference on Intelligent Sensing and Information Processing, 2005, 55~60
    [80]汝学民,庄越挺,吴飞.基于隐写工具的自相关特性进行音频隐写分析.通信学报,2006,27(4):101~106
    [81] Xuemin Ru, Hongjuan Zhang, Xiao Huang. Steganalysis of audio: attacking the Steghide. In: Proceeding of the Fourth International Conference on Machine Learning and Cybernetics, Guan gzhou, July 2005, 3937~3942
    [82] J Harmsen, W Pearlman. Steganalysis of additive noise modelable information hiding. in: Proceeding of SPIE Electronic Imaging, 2003, (5022): 131 ~142
    [83]高建炯,宣国荣,施云庆,等.基于直方图频域统计矩的图像隐写分析.计算机应用,2005,25(10):2370~2373
    [84]朱大奇,史慧.人工神经网络原理及应用.北京:科学出版社, 2006
    [85] CASIA98-99语音库,http://www.chineseldc.org/index.asp
    [86] R M Haralick, K Shanmugam, I Dinstein. Textural features for image classification. IEEE Transactions on Systems, Man, and Cybernetics, 1973, 3(6):610~621
    [87]姚天任.数字语音处理.武汉:华中科技大学出版社,2002
    [88]王松桂,陈敏,陈立萍.线性统计模型——线性回归与方差分析.北京:高等教育出版社,1999
    [89]陈丹,李京华,许俊峰,等.基于主分量分析的声信号特征提取及识别研究.声学技术,2005,54(1):39~41
    [90]张尧庭,方开泰.多元统计分析引论.北京:科学出版社,2003:328~339
    [91] Nello Cristianini, John Shawe-Taylor.支持向量机导论.北京:电子工业出版社,2006
    [92] SimpleSVM Toolbox, http://asi.insa-rouen.fr/~gloosli/simpleSVM.html
    [93]夏煜,郎荣玲,曹卫兵,戴冠中.基于图像的信息隐藏检测算法和实现技术研究综述.计算机研究与发展, 2004, 41(4): 728~736
    [94]郎荣玲,夏煜,郅艳,戴冠中.几类典型隐写术分析算法的分析与评价.中国图象图形学报,2004, 9(2): 249~256
    [95] Nan-I Wu, Min-Shiang Hwang. Data Hiding: Current Status and Key Issues. International Journal of Network Security, 2007, 4(1):1~9
    [96]陆佩忠,罗向阳,汤庆阳,沈利,邹艳.基于三次方程的LSB隐藏信息的盲检测.电子与信息学报, 2005, (27)3: 392~3963
    [97]梁小萍,何军辉,李健乾,黄继武.隐写分析——原理、现状与展望.中山大学学报(自然科学版),2004, 43(6): 93~96
    [98]戴志强,俞一彪,颜祥,袁冬梅.一种基于多重统计量分析的稳健语音信息隐藏算法.信号处理,2008,24(3):500~503
    [99]张晓明,殷雄.基于混沌序列的小波域语音信息隐藏方法.系统仿真学报,2007,19(9): 2113~2117
    [100]殷雄,张晓明.基于DWT域的同步音频信息隐藏算法.武汉大学学报(理学版),2006,52(S1):77~81