Method for secretly writing and extracting secret information of compressed digital audio

A technology for secret information and digital audio, which is applied in the field of steganography and extraction of secret information, and can solve problems such as the inability to effectively guarantee the security of digital steganography, changes, and capacity limitations of steganography.

Inactive Publication Date: 2009-09-30
NINGBO UNIV
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method uses binary as the basic system for writing, so only one bit can be embedded in each symbol modification, and the capacity of secret writing is limited
Other steganography methods write secret information by modifying the parameters in the frame informatio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for secretly writing and extracting secret information of compressed digital audio
  • Method for secretly writing and extracting secret information of compressed digital audio
  • Method for secretly writing and extracting secret information of compressed digital audio

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030]Embodiment one: a kind of steganographic method for compressing secret information in digital audio, the object that this steganographic method handles is the audio code stream of a compressed digital audio, and this audio code stream mainly adopts MPEG standard to compress, but this Steganographic methods are not limited to audio streams, nor are they limited to a particular compression standard. The MPEG encoder adopts Huffman coding, so the audio code stream is expressed as a Huffman codeword, also known as a variable length codeword VLC (VariableLength Coding). The MPEG encoder provides 34 available Huffman code tables with a total of 4995 codewords.

[0031] Because the variable-length code word in the Huffman code table is divided into a large value area, a small value area and a zero area according to the MDCT (Modified Discrete Cosine Transform, modified discrete cosine transform) coefficient after quantization, wherein for the large value area , every two MDCT ...

Embodiment 2

[0053] Embodiment 2: A method for extracting the secret information in the above-mentioned compressed digital audio, the object processed by this extraction method is a digital audio containing secret information, and the object processed in this specific embodiment is the embodiment Encrypted digital audio obtained in one. This extraction method comprises the following steps:

[0054] 1), before the secret information is steganographically written, it is necessary to classify all the codewords in the 34 available Huffman code tables given by the MPEG encoder, first divide each Huffman code table into an invalid codeword set and The effective codeword set, and then divide the effective codeword set into multiple subsets according to the codeword length and sign bit of each effective codeword in the effective codeword set, and the codeword length and sign bit of all valid codewords in each subset are the same , and then determine the basis of all effective codewords in the cor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for secretly writing and extracting secret information of compressed digital audio, which is characterized by classifying all code words in each Huffman code table layer upon layer, then determining the base of all effective code words, and secretly writing data according to the base of the effective code words, wherein the base is larger, the amount of secretly written information is more, thus the secret writing capacity of the method is far larger than that of the prior binary mode secret writing method of which the base is 2; and selecting variable long code words of main data as objects for secretly writing the secret information, and achieving the modification of the variable long code words by replacing attributes corresponding to the long code words so that the code word length and the sign bits of the variable long code words after the modification can be kept unchanged with that of original variable long code words, thus the structure of an original audio code stream is not changed after secretly writing the secret information so as to avoid the problems of increasing the coding bit rate and changing the file length of the whole digital audio caused by secret writing operations, and effectively ensure the security for secretly writing the secret information.

Description

technical field [0001] The invention relates to a digital steganography method, in particular to a steganographic and extraction method for secret information in compressed digital audio. Background technique [0002] Since the early 1990s, information hiding technology, as an important topic in information security, has attracted the attention of international academic circles. Digital steganography is an important branch of information hiding technology. The purpose of digital steganography is to use digital objects with clear content, such as images, audio or video, as digital carriers to hide secret information in digital carriers, and require the steganography of secret information. The visual or auditory effect of the original digital carrier is not changed, and the file size and file format of the digital carrier are not changed at the same time, so that secret information can be transmitted through open channels in a way that does not attract the attention of the out...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G10L19/00G10L19/02G10L19/018
Inventor 王让定严迪群张力光徐霁孙广清
Owner NINGBO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products