压缩域音频隐写与隐写分析中若干问题的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
信息隐藏作为信息安全中的一项重要技术,近年来已引起国内外学术界、业界和政府相关部门的广泛重视。数字隐写与隐写分析技术是信息隐藏中的两个重要分支。所谓数字隐写,是指以多媒体作品(如图像、音视频以及文本等)为掩蔽载体,把敏感或隐私数据通过指定算法嵌入到载体中,以不引起人类感知注意的方式通过公开信道(如互联网、公用电话网等)进行传输的过程。而隐写分析,则是与数字隐写相对抗的一种技术,其目的是通过对可疑的多媒体作品进行统计分析和检测,揭示其中秘密信息的存在。数字隐写与隐写分析技术两者之间相辅相成,相互促进。
     本学位论文研究的内容是以压缩音频为载体的数字隐写与隐写分析技术。在对目前本研究方向的主要理论问题和具体技术问题研究的基础上,围绕如何在保证隐写操作与编码标准兼容性的条件下,提高嵌入速率、不可感知性及不可检测性,提出了多种有效的压缩域音频数字隐写算法;围绕两种特定的压缩域隐写工具,提出了若干隐写分析算法;最后对论文工作作了总结,并提出了进一步研究的方向。
     本学位论文的研究工作,主要包括三个方面。
     1、压缩域音频数字隐写及隐写分析综述。对国内外该方向的主要研究进展进行了总结和归纳,给出了压缩域音频数字隐写的基本思路,剖析了目前典型压缩域隐写及隐写分析方法的基本思路、原理以及特点。
     2、压缩域音频数字隐写算法研究。通过挖掘编码器和编码数据的冗余,提出了两大类压缩域音频数字隐写算法:
     在分析主要模块编码参数的基础上,提出了三种压缩域音频数字隐写算法。第一种方法在秘密信息比特与时频转换模块中的窗口类型之间建立了映射关系,通过调整窗口切换机制,实现了秘密信息的嵌入;第二种方法借助了量化编码模块中循环的结束条件,成功地解决了MP3Stego隐写算法的缺陷,而且在保证嵌入速率的同时,算法的不可感知性和不可检测性得到了提高;第三种方法则是挖掘了编码器在选择哈夫曼码表时的灵活性,在秘密信息比特与哈夫曼码表索引之间建立了对应关系,实现了有效隐写。
     除了编码模块的参数之外,还利用编码数据本身实现了两种压缩域音频大容量数字隐写算法。第一种方法利用了人耳心理声学模型中的掩蔽效应,通过调整量化后MDCT系数的幅值,使得由编码器自身量化引入的失真与由隐写操作引入的失真之和始终保持在人耳听觉掩蔽阈值以下。仿真实验表明,该方法在保持不可感知性的同时,可获得很高的嵌入速率;第二种方法通过对哈夫曼码字空间进行配对扩展,结合混合进制系统,实现了大容量秘密信息的隐写。
     3、特定压缩域音频隐写算法的隐写分析研究。针对压缩域音频隐写领域中最典型的两种隐写工具,展开了被动和主动隐写分析算法的研究。
     首先,针对MP3Stego隐写方法,在隐写行为发生的编码环节提取量化步长和比特池长度的相关统计量,作为检测特征,实现了对MP3Stego的隐写分析。实验结果表明,相邻颗粒的编码参数进行差分操作可从一定程度上提高检测准确率。在此基础上,进一步研究了MP3Stego嵌入比例的估计问题,提出了基于重压缩的原始载体估计方法,结合三种典型的突变点检测技术,实现了对MP3Stego嵌入比例的准确估计。
     其次,针对UnderMP3Cover隐写方法,利用RS检测方法实现了对其进行了隐写分析的研究,并给出了具体的嵌入比例估计算法。实验结果表明,该算法能够较为准确地估计UnderMP3Cover隐写的嵌入比例,同时验证了相关参数与检测算法性能之间的相互关系。
As an important technology of information security, data hiding has attracted greatinterests and more attention. Steganography and steganalysis are two branches of data hiding.Steganography refers to the problem of sending messages hidden in “innocent looking”communication over a public channel so that an adversary eavesdropper cannot even detectthe presence of the hidden message. The countermeasure to steganography is steganalysis,and its aim is to reveal the hidden message by statistical analysis.
     This dissertation mainly focuses on the steganography and steganalysis of compresseddomain audio. First, to improve the performance of the stegographic algorithm in compresseddomain audio, some novel algorithms have been proposed. Then, to attack two specificcompressed domain steganographic tools, a number of steganalytic algorithms have beenproposed. Finally, a conclusuion with a discussion of the direction for future research is given.The dissertation includes three main parts:
     In the first part, review for steganography and steganalysis of compressed domain audiois given. With respect to the application background, the practical and theoretical values ofthe dissertation are described. The basic concepts, models of steganography and steganalysisare introduced briefly. The research progress of these two fields is surveyed in detail.
     In the second part, novel steganographic algorithms for compressed domain audio areproposed. Based on the parameters of the encoder, three compressed domainaudio steganographic algorithms are proposed. In the first algorithm, the window type ismapped with the parity of the secret bit. The secret message is embedded by adjustingthe window switching mechanism. The second algorithm successfully solves the defect of theMP3Stego algorithm. The flexibility of the choice of Huffman table is exploited in the thirdmethod. The experimental results show that the proposed algorithms are good atimperceptibility and undetectability. In addition to the encoder parameters, the audio data isused to achieve high capacity steganography. Through modifying the QMDCT coefficients,the secret message is embedded. The distortion of the stegnography can be always maintainedbelow the masking threshold with the psychoacoustic model of the encoder. The finalalgorithm expands the space of the Huffman codeword. Combined with the multibasesystem, a high capacity steganography is proposed.
     In the third part, specific steganalysis of compressed domain audio is studied. For twotypical compressed domain steganographic tools, passive and active steganalysis are carriedout. First, as for MP3Stego which is a typical MP3stego tool, the statsistics of quantizationstep and bit reservoir is extracted as the steganlytic features. The experimental results showthat the differential operation can improve the detection accuracy. Finally, the estimation ofembedding ratio of MP3Stego is studied. Recompression calibration is used to estimate thecover audio and change point detection methods are applied to locate the embedding position.For UnderMP3Cover, RS detection method is applied to estimate the embedding ratio.The experimental results show that the proposed algorithm can effectively attack theUnderMP3Cover. Meanwhile, the relationship between the parameters of RS method and theperformance of the proposed algorithm is verified.
引文
[1]沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学E辑:信息科学,2007,37(2):129-150.
    [2]杨义先,钮心忻.数字水印理论与技术[M].高等教育出版社,2006.
    [3] PROVOS N, HONEYMAN P. Hide and Seek: An introduction to steganography[J]. IEEE Securityand Privacy,2003,1(3):32-44.
    [4] LYU S, FARID H. Steganalysis using higher-order image statistics[J]. IEEE Transactions onInformation Forensics and Security,2006,1(1):111-119.
    [5] SciEngines. Break DES in less than a single day[N/OL]. http://www.sciengines.com/company/news-a-events/74-des-in-1-day.html,2008.
    [6] BIRYUKOV A, KHOVRATOVICH D. Related-key cryptanalysis of the full AES-192and AES-256[C]. International Conference on the Theory and Application of Cryptology and InformationSecurity: Advances in Cryptology,2009:1-18.
    [7] BRUCE S. Steganography Goes Digital[N/OL].http://www.nytimes.com/2001/12/09/magazine/09STEGANOGRAPHY.html,2001.
    [8] KELLEY J. Terrorist instructions hidden online[N/OL]. http://www.usatoday.com/tech/news/2001-02-05-binladen-side.htm,2001.
    [9]中国新闻网.美国FBI抓获10名俄罗斯“间谍”特工手法曝光[N/OL].http://www.chinanews.com/gj/2010/06-30/2371025.shtml,2010,6.
    [10] FRIDRICH J, GOLJAN M, SOUKAL D. Perturbed quantization stegnography[J]. ACMMultimedia and Security Journal,2005,11(2):98-107.
    [11] SU P, KUO C. Steganography in JPEG2000compressed images[J]. IEEE Transactions onConsumer Electronics,2003,49(4):824-832.
    [12] CAO Y, ZHAO X F, FENG D G, SHENG R N. Video Steganography with perturbed motionestimation[C]. International Conference on Information Hiding,2011, LNCS6958:193-207.
    [13] GOPALAN K. Audio steganography by cepstrum modification[C]. IEEE International Conferenceon Acoustics, Speech, and Signal Processing,2005:481-484.
    [14]钮心忻,杨义先.文本伪装算法研究[J].电子学报,2003,31(3):402-405.
    [15]孙星明,黄华军,王保卫.一种基于等价标记的网页信息隐藏算法[J].计算机研究与发展,2007,44(5):756-760.
    [16] ISO/IEC. Information technology–coding of moving pictures and associated audio for digitalstorage media at up to about1.5M bit/s–part3: audio IS11172-3[S].1993.
    [17] MATSUOKA H. Spread spectrum audio steganography using subband phase shifting[C].International Conference on Intelligent Information Hiding and Multimedia Signal Processing,2006:3-6.
    [18] SHAHADI H I, JIDIN R. High capacity and inaudibility audio steganography scheme[C].International Conference on Information Assurance and Security,2011:104-109.
    [19] WAKIYAMA M. An audio steganography by a low-bit coding method with wave files[C].International Conference on Intelligent Information Hiding and Multimedia Signal Processing,2010:530-533.
    [20] ZHANG Q Y. HUANG Y B. ZHENG L J. Audio steganography algorithm using PCMquantization coding in the DWT domain[J]. Journal of China Institute of Communications,2010,31(9):245-250.
    [21] CHEN T C, WU W C. Highly robust, secure, and perceptual-quality echo hiding scheme[J]. IEEETransactions on Audio, Speech&Language Processing,2008,16(3):629-638.
    [22] GANG L T, AKANSU A N, RAMKUMAR M. MP3resistant oblivious steganography[C]. IEEEInternational Conference on Acoustic, Speech, and Signal Processing,2001:1365-1368.
    [23] MOGHADAM N, SADEGHI H. Genetic content-based MP3audio watermarking in MDCTdomain[C]. Proceedings of world academy of science, engineering and technology,2005:348-351.
    [24]刘伟,王朔中,张新鹏.一种基于部分MP3编码原理的音频水印[J].中山大学学报(自然科学版),2004,43(2):26-28.
    [25]朱奎龙,侯丽敏.抗解压缩/压缩攻击的MP3压缩域音频水印[J].上海大学学报(自然科学版),2008,14(4):331-335.
    [26] ZENG W, HU R M, AI H J. Audio steganalysis of spread spectrum information hiding based onstatistical moment and distance metric[J]. Multimedia Tools and Applications,2011,55(3):525-556.
    [27] RU X M, ZHUANG Y T, WU F. Audio steganalysis based on “negative resonance phenomenon”caused by steganographic tools[J]. Journal of Zhejiang University SCIENCE A,2006,7(4):577-583.
    [28] KRAETZER C, DITTMAN J. Pros and cons of mel-cepstrum based on audio steganalysis usingSVM classification[C]. International Conference on Information Hiding,2007:359-377.
    [29] WANG C P, GUO L, WANG Y J. Audio steganalysis of DSSS based on statistical moments ofhistogram[J]. Journal of electronics (CHINA),2009,26(5):659-665.
    [30] QIAO M Y, SUNG A H, LIU Q Z. Feature Mining and Intelligent Computing for MP3Steganalysis[C]. International Joint Conferences on Bioinformatics, Systems Biology and IntelligentComputing,2009:627-630
    [31] DENG K Y. Steganalysis of the MP3steganographic algorithm based on Huffman coding[C].International Conference on Intelligent Computing and Integrated Systems,2010:79-82.
    [32] JULIO C, JUAN E, et al. Blind steganalysis of MP3Stego[J]. Journal of Information Science andEngineering,2010,26(5):1787-1799
    [33] QIAO M Y, SUNG A H, LIU Q Z. Steganalysis of MP3Stego[C]. International Joint Conferenceon Neural Networks,2009:2566-2571.
    [34] SIMMONS G J. The prisoner’s problem and the subliminal channel[C]. Proceedings of Advaces inCryptolopy,1983:51-67.
    [35] SOMEKH-BARUCH A, MERHAV N. On the capacity game of public watermarking systems[J].IEEE Transactions on Information Theory,2004,50(3):511-524.
    [36] MOULIN P, SULLIVAN J. Information-theoretic analysis of information hiding[J]. IEEETransactions on Information theory,2003,49(3):563-593.
    [37]伍宏涛,杨义先,钮心忻.改进的信息隐藏的信息论理论模型[J].计算机工程与应用,2004,40(6):34-36.
    [38]彭德云,王嘉祯,杨素敏.信息隐藏的空间概念模型构建[J].武汉大学学报(理学版),2006,52(5):560-564.
    [39]王也隽.信息隐藏技术及其军事应用[M].北京:国防工业出版社,2011.
    [40] ZOLLNER J, FEDERRATH H, KLIMANT H, et al. Modeling the security of steganographicsystems[C]. International Workshop on Information Hididng,1998:344-354.
    [41] CACHIN C. An information-theoretic model for steganography[J]. Information and Computation,2004,192(1):41-56.
    [42] MOSKOWITZ I S, LONGDON G E, CHANG L W. A new paradigm hidden in steganography[C].International Workshop on new security paradigms,2000:41-50.
    [43] CHANDRAMOULI R, LI G, MEMON N. Adaptive steganography[C]. Proceedings ofSPIE Conference on Security and Watermarking of Multimedia Contents,2002:69-78.
    [44] DIFFIE W. New directions in cryptography[J]. IEEE Transactions on InformationTheory,1976,22(6):644-654.
    [45] ELIZABETH D. Cryptography and data security[M]. Addison-Wesley LongmanPublishing Co., Inc.,1982.
    [46]陈丹,王育民.基于图像模型的掩密安全性定义[J].哈尔滨工业大学学报,2006,38(S):901-904.
    [47] FILLER T, FRIDRICH J. Fisher information determines capacity ofε-securitysteganography[C]. International Workshop on Information Hiding,2009:31-47.
    [48] WANG Y. Perfectly secure steganography: capacity, error exponents, and codeconstructions[J]. IEEE Transactions on Information Theory,2008,54(6):2706-2722.
    [49] BOHME R. An epistermological approach to steganography[C]. International Workshopon Informatio Hiding,2009:15-30.
    [50] BAILEY K, CURRAN K. An evaluation of image based steganography methods[J].Multimeida Tools and Applications,2006,30(1):55-88.
    [51] PEVNY T, FRIDRICH J. Bechmarking for steganography[C]. International Workshopon Information Hiding,2008:251-267.
    [52] KHARRAZI M, SENCAR H T, MEMON N. Benchmarking steganographic andsteganalysis techniques[C]. Proceedings of SPIE Conference on Security, Steganography,and Watermarking Contents,2005:252-263.
    [53] LI B, HE J H, HUANG J W, SHI Y Q. A survey on image steganography andsteganalysis[J]. Journal of Information Hiding and Multimedia Signal Processing,2011,2(2):142-171.
    [54] ITU. Subjective performance assessment of telephone-band and wideband digitalcodecs[S]. ITU-T Rec. P830,1996.
    [55] ITU. Methods for subjective assessment of small impairments in audio systemsincluding multichannel sound systems[S]. ITU-R Rec. BS.1116,1994.
    [56] WIKIPEDIA. Signal-to-noise ratio[EB/OL]. http://en.wikipedia.org/wiki/Signal-to-noise_ratio.
    [57] ITU. Methods for objective measurements of perceived audio quality[S]. ITU-R Rec. BS.1387,1998.
    [58] THIEDE T, TREUNIET W C, BITTO R, et al. PEAQ–The ITU standard for objectivemeasurement of perceived audio quality[J]. Journal of Audio Engineering Society,2000,48(1):3-29.
    [59] HUBER R, KOLLMEIER B. PEMO-Q–A new method for objective audio quality assessmentusing a model of auditory perception[J]. IEEE Transactions on Audio, Speech, and LanguageProcessing,2006,14(6):1902-1911.
    [60] PFITZMANN A, HANSEN M. Anonymity, unlinkability, undetectability, unobservability,pseudonymity, and identity management–a consolidated proposal for terminology[EB/OL].http://dud.inf.tu-dresden.de/Anon_Terminology.shtml,2008.
    [61]陈嘉勇,祝跃飞,张卫明,刘九芬.对随机LSB隐写术的选择密钥提取攻击[J].通信学报,2010,31(5):73-81.
    [62]张卫明,李世取,刘九芬.隐写术CPT的等价密钥分析[J].电子学报,2007,35(12):2258-2261.
    [63] FRIDRICH J, GOLJAN M, SOUKAL D, HOLOTYAK T. Forensic steganalysis: determining thestego key in spatial domain steganography[C]. Proceedings of SPIE Conference on Security,Steganography, and Watermarking of Multimedia Contents,2005:631-642.
    [64] RICHARD(著),李宏东(译).模式分类[M].北京:机械工业出版社,2003.
    [65] HAGAN(著),戴葵(译).神经网络设计[M].北京:机械工业出版社,2005.
    [66] WIKIPEDIA. Confusion matrix[EB/OL]. http://en.wikipedia.org/wiki/Confusion_matrix.
    [67] WIKIPEDIA. Receiver operating characteristic[EB/OL].http://en.wikipedia.org/wiki/Receiver_operating_characteristic.
    [68] FARAGGI D, REISER B. Estimation of the area under the ROC curve[J]. Statistics in Medicine,2002,21(20):3093-3106.
    [69]刘粉林,刘九芬,罗向阳.数字图像隐写分析[M].北京:机械工业出版社,2010.
    [70] FRIDRICH J, LISONEK P. Grid colorings in steganography[J]. IEEE Transactions on InformationTheory,2007,53(4):1547-1549.
    [71] PEVNY T, FRIDRICH J. Multi-Class Detector of Current Steganographic Methods for JPEGFormat[J]. IEEE Transactions on Information Forensics and Security,2008,3(4):635-650.
    [72] PEVNY T, BAS P, FRIDRICH J. Steganalysis by Subtractive Pixel Adjacency Matrix[J]. IEEETransactions on Information Forensics and Security,2010,5(2):215-224.
    [73] KODOVSKY J, FRIDRICH J. Quantitative Steganalysis of LSB Embedding in JPEG Domain[C].Proceedings of ACM Multimedia&Security Workshop,2010:187-198.
    [74] FRIDRICH J. Feature-Based Steganalysis for JPEG Images and its Implications for Future Designof Steganographic Schemes[C]. International Workshop on Information Hiding,2004:67-81.
    [75] KER A D. A capacity result for batch steganography[J]. IEEE Signal Processing Letters,2007,14(8):525-528.
    [76] KER A D. Derivation of error distribution in least squares steganalysis[J]. IEEE Transactions onInformation Forensics and Security,2007,2(2):140-148.
    [77] KER A D. Steganalysis of LSB matching in grayscale images[J]. IEEE Signal Processing Letters,2005,12(6):441-444.
    [78] WESTFELD, A. F5-a steganographic algorithm: High capacity despite better steganalysis[C].International Workshop on Information Hiding,2001:289-302.
    [79] BOHME R, WESTFELD A. Statistical characterization of MP3encoders for steganalysis[C].International Workshop on Multimedia and Security,2004:25-34.
    [80] LYU S, FARID H. Steganalysis using higher-order image statistics[J]. IEEE Transactions onInformation Forensics,2006,1(1):111-119.
    [81] LYU S, FARID H. Steganalysis using color wavelet statistics and one-class support vectormachines[C]. Proceedings of SPIE Conference on Security, Steganography, and Watermarking ofMultimedia Contents,2004:35-45.
    [82] JOHNSON M K, LYU S, FARID H. Steganalysis of recorded speech[C]. Proceedings of SPIESymposium on Electronic Imaging,2005:664-672.
    [83] PROVOS N, HONEYMAN P. Hide and seek: an introduction to steganography[J]. IEEE Security&Privacy,2003,1(3):32-44.
    [84]王朔中,张新鹏,张卫明.以数字图像为载体的隐写分析研究进展[J].计算机学报,2009,32(7):1247-1263.
    [85]张新鹏,王朔中.基于稀疏表示的密写编码[J].电子学报,2007,35(10):1892-1896.
    [86] ZHANG X P, WANG S Z. Efficient Steganographic Embedding by Exploiting ModificationDirection[J]. IEEE Communications Letters,2006,10(11):781-783.
    [87] ZHANG X P, WANG S Z, ZHOU Z Y. Multibit Assignment Steganography in PaletteImages[J]. IEEE Signal Processing Letters,2008,15:553-556.
    [88] HUANG F J, HUANG J W, SHI Y Q. An experimental study on the security performance ofYASS[J]. IEEE Transactions on Information Forensics and Security,2010,5(3):374-380.
    [89] HUANG F J, HUANG J W. Calibration based universal JPEG steganalysis[J]. Sciencein China Series F: Information Sciences,2009,52(2):260-268.
    [90] LUO W Q, HUANG F J, HUANG J W. A more secure steganography based on adaptive pixel-value differencing scheme[J]. Multimedia Tools and Applications,2011,52(2-3):407-430.
    [91] ZHANG T, PING X J, et al. Steganalysis of LSB matching based on statistical modeling of pixeldifference distributions[J]. Information Science,2010,180(23):4685-4694.
    [92] ZHANG T, PING X J. Reliable detection of spatial LSB steganography based on differencehistogram[J]. Journal of Software,2004,15(1):151-158.
    [93]罗纲,孙星明.基于文本剩余度的文本隐藏信息检测方法研究[J].通信学报,2009,30(6):19-25.
    [94] WENG S W,ZHAO Y, NI R R, PAN J S. Lossless data hiding based on prediction-error adjustment[J]. Science in China Series F: Information Sciences,2009,52(2):269-275.
    [95] YU L F, ZHAO Y, NI R R, LI T. Improved adaptive LSB steganography based on chaosand genetic algorithm[J]. EURASIP Journal of Advances in Signal Processing,2010.
    [96] CVEJIC N, SEPPANEN T. Increasing robustness of LSB audio steganography byreduced distortion LSB coding[J]. Journal of Universal Computer Science,2005,11(1):56-65.
    [97] DELFOROUZI A, POOYAN M. Adaptive digital audio steganography based on integer wavelettransform[J]. Circuits, Systems, and Signal Processing,2008,27(2):247-259.
    [98] CVEJIC N, SEPPANEN T. A wavelet domain LSB insertion algorithm for high capacity audiosteganography[C]. IEEE Digital Signal Processing Workshop,2002:53-55.
    [99] WANG C T, CHEN T S, CHAO W H. A new audio watermarking based on modified discretecosine transform of MPEG/Audio Layer III[C]. Proceedings of the2004IEEE International Conferenceon Network, Sensing&Control,2004:984-989.
    [100] MOGHADAM H, SADEGHI H. Genetic content-based MP3audio watermarking in MDCTdomain[C]. Proceedings of world academy of science, engineering and technology,2005,7:348-351.
    [101] WU G M, ZHUANG Y T. Adaptive audio watermarking based on SNR in localized regions[J].Journal of Zhejiang University Science A,20056:53-57.
    [102]刘伟,王朔中,张新鹏.一种基于部分MP3编码原理的音频水印[J].中山大学学报(自然科学版),2004,43(2):26-28.
    [103]朱奎龙,侯丽敏.抗解压缩/压缩攻击的MP3压缩域音频水印[J].上海大学学报(自然科学版),2008,14(4):331-335.
    [104] UPHAM D. JPEG–Jsteg[EB/OL]. http://zooid.org/~paul/crypto/jsteg/.
    [105] PETITCOLAS F A P. MP3Stego[EB/OL].http://www.petitcolas.net/fabien/steganography/mp3stego/.
    [106] QUAN X M, ZHANG H B. Data Hiding in MPEG Compressed Audio Using Wet PaperCodes[C]. International Conference on Pattern Recognition,2006:727-730.
    [107]王鹏军,徐淑正,张鹏,杨华中. MPEG-4AAC中信息隐藏的研究[C].第七届全国信息隐藏暨多媒体信息安全学术大会,2007.
    [108] QIAO L, NAHRSTEDT F. Non-Invertible Watermarking Methods for MPEG Encoded Audio[C].Proceedings of SPIE on Security and Watermarking of Multimedia Contents,1999:194-202.
    [109] KOUKOPOULAS D K, STAMATIOU Y C. A compressed-domain watermarking algorithm forMPEG audio layer3[C]. ACM Multimedia Conference,2001:7-10.
    [110] NEUBAUER C, HERRE J. Audio watermarking of MPEG-2AAC bitstreams[C].108th AESConvention,2000, Pairs, France. Audio Engineering Society Preprint:5101.
    [111] NEUBAUER C, HERRE J. Advanced Watermarking and its Applications[C].109th AESConvention,2000, California, USA, Audio Engineering Society Preprint:5176.
    [112]高海英.基于Huffman编码的MP3隐写算法[J].中山大学学报(自然科学版),2007,46(4):32-35.
    [113]肖蓉,杨扬,杨华.一种基于MPEG-2AAC编码的音频水印方法[J].有线电视技术,2008,25(3):84-88.
    [114] WESTFELD A, PFITZMANN A. Attacks on steganographic systems[C]. International Workshopon Information Hiding,1999:61-76.
    [115] FRIDRICH J, GOLJAN M, DU R. Detecting LSB steganography in color and gray-scaleimages[J]. IEEE Multimedia,2001,8(4):22-28.
    [116] DUMITRESCU S, WU X L, WANG Z. Detection of LSB steganography via sample pairanalysis[J]. IEEE Transactions on Signal Processing,2003,51(7):1995-2007.
    [117]陈铭,张茹,钮心忻,杨义先. Wav音频LSB隐藏算法的隐写分析技术[J].计算机工程,2008,34(4):151-153.
    [118] OZER H, SANKUR B, MEMON N, AVCIBAS I. Detection of audio covert channels usingstatistical footprints of hidden messages[J]. Digital Signal Processing,2006,16(4):389-401.
    [119]汝学民,庄越挺,吴飞.基于隐写工具的自相关特性进行音频隐写分析[J].通信学报,2006,27(4):101-106.
    [120] RU X M, ZHANG H J, HUANG X. Steganalysis of audio: attacking the Steghide[C]. Proceedingsof International Conference on Machine Learning and Cybernetics,2005:3937-3942.
    [121]尤娟,汤光明.基于Hide4PGP二次嵌入的音频隐写分析[J].计算机工程与应用,2009,45(30):135-142.
    [122]杨博,郭立等. MIDI音频的LSB匹配隐写分析方法[J].信息安全与保密通信,2010,5:87-89.
    [123]淦新富,郭立.基于核主元统计的音频隐写分析[J].计算机工程与应用.2007,43(26):114-115-118.
    [124]淦新富,郭立.基于独立分量统计的音频隐写分析[J].信息安全与保密通信.2007,6:169-173.
    [125]杨榆,雷敏,钮心忻,杨义先.基于回声隐藏的VDSC隐写分析算法[J].通信学报,2009,30(2):83-88.
    [126] LEI M, YANG Y X, NIU X X, LUO S S. Audio steganalysis in DCT domain[J]. Frontiers ofelectrical and electronic engineering in China,2010,5(2):203-206.
    [127]张开文,张新鹏,王朔中.图像及音频信号中隐蔽嵌入信息存在性的统计检验[J].电子与信息学报,2003,25(7):871-877.
    [128] WESTFELD A. Detecting low embedding rates[C]. International Workshop on InformationHiding,2003:324-339.
    [129] BOHME R, WESTFELD A. Feature-based encoder classification of compressed audio[J].Multimedia Systems,2005,11(2):108-120.
    [130] QIAO M Y, SUNG A H, LIU Q Z. Feature mining and intelligent computing for MP3steganalysis[C]. Proceedings of International Joint Conference on Bioinformatics, Systems Biology andIntelligent Computing,2009:627-630.
    [131] QIAO M Y, SUNG A H, LIU Q Z. Temporal derivative based spectrum and mel-cepstrum audiosteganalysis[J]. IEEE Transaction on Information Forensics and Security,2009,4(3):359-368.
    [132]梁敬弘,王道顺,黄连生,戴一奇.对MP3Stego的攻击研究[J].计算机辅助设计与图形学报,2003,15(8):954-959.
    [133]宋华,戴一奇等. MP3Stego信息隐藏与检测方法研究[J].中山大学学报(自然科学版),2004,43:221-224.
    [134] GAILLY J, ADLER M. Zlib[EB/OL].1995. http://zlib.net.
    [135] WIKIPEDIA. Triple DES[EB/OL]. http://en.wikipedia.org/wiki/Triple_DES.
    [136]8Hz Productions:8hz-mp3[EB/OL].1998. http://www.8hz.com/mp3/.
    [137] KATZENBEISSER S, PETITCOLAS F A P. Information hiding techniques for steganographyand digital watermarking[M]. London: Artech House.2000.
    [138] CHA A. Comprehensive survey on distance/similarity measures between probability densityfunctions[J]. International Journal of Mathematical Models and Methods in Applied Sciences,2004,1(4):300-307.
    [139] BENDER W, GRUHL D, MORIMOTO N, LU A. Techniques for data hiding[J]. IBM SystemJournal,1996,35(3-4):313-336.
    [140] ZHANG X P, WANG S Z. Steganography using multiple-base notational system and humanvision sensitivity[J]. IEEE Signal Processing Letters,2005,12(1):67-70.
    [141] WIKIPEDIA. Coefficient of variation[EB/OL].http://en.wikipedia.org/wiki/Coefficient_of_variation.
    [142] CHANG C C, LIN C J. LIBSVM: A library for support vector machines[EB/OL].http://www.csie.ntu.edu.tw/~cjlin/libsvm,2001.
    [143] WIKIPEDIA. F1score[EB/OL]. http://en.wikepedia.org/wiki/F1score.
    [144] YOUDEN W. Index for rating diagnostic tests[J]. Cancer,1950,3:32-35.
    [145] BASSEVILLE M, NIKIFOROV I V. Detection of abrupt changes: theory and application[M].Prentice Hall,1993.
    [146] KER A D, Bohme R. Revisiting weighted stego-image steganalysis. Proceedings of SPIE onSecurity, Forensics, Steganography, and Watermarking of Multimedia Contents,2008:5-17.
    [147] MALIK H. Steganalysis of QIM steganography using irregularity measure. Proceedings of ACMWorkshop on Multimedia and Security,2008:149-158.
    [148] WIKIPEDIA. F-test. http://en.wikipedia.org/wiki/F-test.
    [149] TAYLOR W A. Change-pointer analysis: A powerful new tool for detecting changes[EB/OL].http://www.variation.com/cpa/tech/changepoint.html,2000.
    [150] LAVIELLE M, LEBARBIE E. An application of MCMC methods to the multiple change-pointsproblem. Signal Processing,2001,81(1):39-53.
    [151] LAVIELLE M. Detection of multiple changes in a sequence of dependent variables. StochasticProcesses and their Applications,1999,83(1):79-102.
    [152] LAVIELLE M. Using penalized contrasts for the change-point problem. Signal Processing,2005,85(8):1501-1510.
    [153] PLAT C. UnderMP3Cover[EB/OL]. http://sourceforge.net/projects/ump3c/.
    [154] BOHME R, KER A D. A two-factor error model for quantitative steganalysis[C]. Proceedings ofSPIE Conference on Electronic Imaging, Security, Steganography, and Watermarking of MultimediaContents,2006:59-74.