VoIP steganography method based on optimum similarity matching

A similarity matching and similarity technology, applied in the field of secure communication, can solve the problem of underutilization of secret information and carriers, etc.

Active Publication Date: 2015-01-07
QUANZHOU SHIKE ALARM SYST ELECTRONIC CO LTD
View PDF9 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these two methods are still a random modulation method in improving the similarity between the secret information and the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • VoIP steganography method based on optimum similarity matching
  • VoIP steganography method based on optimum similarity matching
  • VoIP steganography method based on optimum similarity matching

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be further described below through specific embodiments.

[0051] The present invention is applicable to the speech coder of any parametric coding, as ITU-T G.711μ law and A law, ITU-T G.723.1, ITU-T G.729a etc., will use ITU-T G. 711A-law speech coding is taken as an example, and the present invention is further described in conjunction with the accompanying drawings.

[0052] The processing flow of the present invention is as attached figure 1 As shown, it includes the step of pre-agreement, the step of embedding secret information and the step of extracting secret information.

[0053] 1. Pre-agreement step: the communication parties pre-agreed that the speech coder adopted in the communication process is the ITU-T G.711A law; agree on the carrier and secret information packet length n, such as n=7; agree on the pseudo-random number generation algorithm used.

[0054] There are many kinds of pseudo-random number generation algorithms, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a VoIP steganography method based on optimum similarity matching, and belongs to the technical field of safety communication. The VoIP steganography method is suitable for covert communication with VoIP serving as a carrier. The method includes the pre-agreement step, the covert information embedding step and the covert information extracting step. Based on the basic principle that the larger the similarity between the embedded covert information and the carrier is, the smaller the distortion generated in the steganography process is, multiple heuristic modulation is conducted on covert information in advance with the increase of the similarity as guide, a covert information mode with the optimum similarity to the carrier is finally selected for information hiding, the variation of the carrier is greatly reduced, and the sensory quality of the VoIP is effectively maintained; in addition, the method is unrelated to a specific voice encoder, suitable for all encoders capable of being applied to the VoIP and good in universality.

Description

technical field [0001] The invention relates to the field of secure communication, in particular to a voice over IP (Voice over IP, VoIP) steganography method based on optimal similarity matching, which is suitable for covert communication using voice over IP as a carrier. Background technique [0002] The rapid development of Internet technology has greatly changed human production and lifestyle. However, while Internet technology has brought great convenience to human beings, it has also brought various security risks and hidden dangers such as theft or tampering of communication content and the theft of personal privacy. Therefore, people begin to pay close attention to the issue of how to conduct secure communication in an open Internet environment. Steganography is an important branch of information hiding technology, and has received widespread attention as the core technology of covert communication. Redundancy of data characteristics), under the premise of not affe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G10L19/018G10L19/24H04M7/00
Inventor 田晖郭舒婷秦界卢璥刘进黄永峰陈永红陈维斌陈锻生
Owner QUANZHOU SHIKE ALARM SYST ELECTRONIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products