[1]姚 远,白天皓,李亚伟.基于音频载体的特定信息隐藏算法研究[J].计算机技术与发展,2020,30(06):104-108.[doi:10. 3969 / j. issn. 1673-629X. 2020. 06. 020]
 YAO Yuan,BAI Tian-hao,LI Ya-wei.Research on Specific Information Hiding Algorithm Based on Audio Carrier[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2020,30(06):104-108.[doi:10. 3969 / j. issn. 1673-629X. 2020. 06. 020]
点击复制

基于音频载体的特定信息隐藏算法研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
30
期数:
2020年06期
页码:
104-108
栏目:
安全与防范
出版日期:
2020-06-10

文章信息/Info

Title:
Research on Specific Information Hiding Algorithm Based on Audio Carrier
文章编号:
1673-629X(2020)06-0104-05
作者:
姚 远白天皓李亚伟
华中师范大学 物理科学与技术学院,湖北 武汉 430000
Author(s):
YAO YuanBAI Tian-haoLI Ya-wei
School of Physical Science and Technology,Central China Normal University,Wuhan 430000,China
关键词:
音频载体信息隐藏奇异值分解离散小波变换混沌映射
Keywords:
audio carrierinformation hidingsingular value decompositiondiscrete wavelet transformchaotic mapping
分类号:
TP309
DOI:
10. 3969 / j. issn. 1673-629X. 2020. 06. 020
摘要:
无线通信技术的飞速发展推动移动终端间的数据业务日益增多,如何解决数据的传输安全显得尤其重要。 为解决数据传输的安全问题,提出一种基于音频载体的特定信息隐藏算法。 首先对特定信息进行随机密钥混沌加密和 CRC 编码处理来提高传输的安全性,之后对音频载体进行离散小波变换,取低频分量进行特定的分段处理,然后对每段数据进行SVD 分解得到奇异值,对所有奇异值进行大小排序,将加密后的特定信息通过奇偶量化方法嵌入到较大的奇异值中。 通信接收方收到音频数据后,通过对音频数据进行离散小波变换与 SVD 分解提取出嵌入的信息,之后进行 CRC 解码校验和混沌解密即可得到特定信息。 实验结果验证了该隐藏算法在嵌入信息后具有不错的透明性,并且可以较好地抵抗常规攻击。
Abstract:
The rapid development of wireless communication technology has promoted the increasing number of data services for mobile terminals,so how to solve the problem of data transmission security is particularly important. An information hiding algorithm based on audio carrier is proposed. Firstly, random key chaotic encryption and CRC encoding are performed for specific information to improve transmission security. Secondly, discrete wave-let transform is carried out on the audio carrier, and the low-frequency component is selected for specific segmentation processing. Then SVD deco-mposition is carried out on each data segment to obtain the singular value,and the size of all singular values is sorted. The encrypted specific infor-mation is embedded into the large singular value through the parity quantization method. After the communication receiver receives the audio data, the embedded information is extracted by discrete wavelet transform and SVD decomposition of the audio data,and then the specific information can be obtained by CRC decoding and chaos decryption. The experiment verifies that the proposed hidden algorithm has excellent transparency after embedding information and can resist normal attacks.

相似文献/References:

[1]李兵兵 王衍波 徐敏 周杰.一种Word 2007中可无源检测的信息隐藏方法[J].计算机技术与发展,2010,(05):154.
 LI Bing-bing,WANG Yan-bo,XU Min,et al.An Information Hiding Method with "Blind" Detection Based on Word 2007[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2010,(06):154.
[2]吕建勋 贾世杰.基于图像的数字水印技术[J].计算机技术与发展,2009,(02):173.
 LU Jian-xun,JIA Shi-jie.Digital Watermark Technologies Based on Images[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2009,(06):173.
[3]朴红吉 郑品 田雄 冯林.基于线性预测和位操作的信息隐藏算法[J].计算机技术与发展,2008,(01):185.
 PIAO Hong-ji,ZHENG Pin,TIAN Xiong,et al.Data Hiding Algorithm Based on Linear- Prediction and Bit - Operation[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2008,(06):185.
[4]由守杰 柏森 曾辉[].鲁棒的混合域音频信息隐藏算法[J].计算机技术与发展,2008,(03):169.
 YOU Shou-jie,BAI Sen,ZENG Hui.Robust Audio Information Hiding Algorithm Based on DWT and DCT[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2008,(06):169.
[5]陆绿 方勇.基于字符Unicode奇偶性的数字水印设计与实现[J].计算机技术与发展,2010,(08):176.
 LU Lu,FANG Yong.Design and Implementation of Digital Watermark Based on Parity of Unicode[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2010,(06):176.
[6]刘红军 徐汀荣.基于区域的图像信息隐藏算法[J].计算机技术与发展,2007,(09):116.
 LIU Hong-jun,XU Ting-rong.Information Hiding Algorithm for Image Based on Section[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2007,(06):116.
[7]陈芳 王冰.基于文本字体的信息隐藏算法[J].计算机技术与发展,2006,(01):20.
 CHEN Fang,WANG Bing.An Algorithm of Text Information Hiding Based on Font[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2006,(06):20.
[8]周化灵 陈春玲.基于N阶Bézier曲线的多信息隐藏算法研究[J].计算机技术与发展,2006,(05):85.
 ZHOU Hua-ling,CHEN Chun-ling.Research on Multi- Information Concealment Algorithm Based on N -Bézier Curve[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2006,(06):85.
[9]商金婷 侯德文.基于策略模式的信息隐藏处理的软构件[J].计算机技术与发展,2006,(07):132.
 SHANG Jin-ting,HOU De-wen.A Soft Component of Information Hiding Based on Strategy Model[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2006,(06):132.
[10]李向辉 钟诚.提高Word文本文档信息隐藏容量的方法研究[J].计算机技术与发展,2006,(09):97.
 LI Xiang-hui,ZHONG Cheng.Research on Improving Capacity for Word Information Hiding Text Document[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2006,(06):97.

更新日期/Last Update: 2020-06-10