期刊文献+

基于实时语音的信息隐藏技术的应用研究 被引量:1

Research on the Application of Information Hiding Technology Based on Real-time Voice
在线阅读 下载PDF
导出
摘要 利用实时语音传递秘密信息在隐蔽通信中具有重要意义。采用改进的LSB算法和同步技术,将秘密信息隐藏在传输的语音帧中。根据嵌入秘密信息的容量,将密文分段并对每段密文添加同步码,最终将含有同步码的秘密信息嵌入到载体数据的倒数第二位。同时,比较分析了实时传输时每帧的嵌入容量。实验结果表明,该方法具有较强的鲁棒性和不可感知性,且嵌入容量为50个字符时比较合理。 The transmission of confidential information using real-time voice has great significance in the covert communication. The secret information can be hidden in the transmission of voice frames by using improved LSB algorithms and synchronization technology. Based on the capacity of embedding secret information, the algorithm will divide secret information into pieces and add synchronization code into each piece, and ultimately embed the secret information containing synchronization codes to the penultimate position of carrier data. At the same time, the embedding capacity of each frame during real-time transmission is compared and analyzed. The experimental results show that this method has strong robustness and unperceptibility, and the embedding capacity of 50 characters is reasonable.
出处 《北京石油化工学院学报》 2010年第2期50-54,共5页 Journal of Beijing Institute of Petrochemical Technology
关键词 实时语音 信息隐藏 同步码 LSB real-time voice information hiding synchronization code LSB
  • 相关文献

参考文献6

二级参考文献15

  • 1赖金福.线性与接口集成电路简明手册[M].北京:电子工业出版社,1994..
  • 2陈安凯 陈嘉.最新国外集成电路数据手册[M].北京:人民邮电出版社,1997..
  • 3[1]Dapeng Wu,Yiwei Thomas Hou,Ya-Qing Zhang. Transort Real-time Video over the Internet: Challenges and Approaches[J].IEEE, 2000; 88(1)
  • 4[2]M Hemy,U hengartner,P steenkiste et al. MPEG system streams in best-effort networks[C].In:Proc IEEEE Packet Video'99,New York,1999-04
  • 5[3]T Chiang,Y-Q Zhang. A new rate control scheme using quadratic rate distortion model[J].IEEE Trans Circuits Syst Video Technol, 1997-02;7: 246~250
  • 6[4]Q Zhang,W Zhu,Y Zhang. Network-adaptive Rate Control with TCP-Friendly Protocol for Multiple Video Objects[C].In:IEEE International Conference on Multimedia and Expo(ICME),New York,2000-07
  • 7UylessBlack 温斌译.VoIP:IP语音技术[M].机械工业出版社,..
  • 8AndrewSTanenbaum.COMPUTER NETWORKS[M].北京:清华大学出版社,1998..
  • 9[美]William Stallings.密码学和网络安全:原理与实践[M],北京:电子工业出版社.2001:45~56.
  • 10Cox,Ingermar J.Linnartz,Jean-Paul M.G.Public watermarks and resistance to tampering[J],Proc.of IEEE Int.Conf.O Image Processing,1997.

共引文献26

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部