MP3 self-adaption hidden writing method based on compressed domain

An adaptive, compressed domain technology, applied in speech analysis, speech recognition, instruments, etc., can solve problems such as insufficient information embedding requirements, low security, and low embedding capacity.

Active Publication Date: 2016-12-14
SUN YAT SEN UNIV
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The steganography method adopted by the classic MP3stego audio steganography tool is side quantization and steganography, but each particle can only embed 1 bit, th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • MP3 self-adaption hidden writing method based on compressed domain
  • MP3 self-adaption hidden writing method based on compressed domain
  • MP3 self-adaption hidden writing method based on compressed domain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The drawings are for illustrative purposes only, and should not be construed as limitations on this patent; in order to better illustrate this embodiment, some parts in the drawings will be omitted, enlarged or reduced, and do not represent the size of the actual product;

[0057] For those skilled in the art, it is understandable that some well-known structures and descriptions thereof may be omitted in the drawings. The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0058] figure 1 Shown is a schematic flow chart of the algorithm for embedding and extracting secret information using the present invention.

[0059] The embedding process of secret information is as follows: figure 1 As shown in (a) and 1(b), it includes the following sub-steps: (11) Precoding to obtain the total number of particles N that can embed secret information when the original audio is quantized and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of multimedia information safety and specifically relates to a MP3 self-adaption hidden writing method based on a compressed domain. The method comprises the two steps of embedding secret information and extracting secret information. According to the method, a frequency domain coefficient of the original sound signal after being converted and quantitatively coded through a sub-band filter is taken as a basic unit for hidden writing and an information encoding tool Syndrome Trellis Codes (STC) is utilized to self-adaptively embed information and realize correct information extraction. A large number of tests prove that the hidden writing method, compared with the present audio hidden writing method based on the frequency domain modification, has higher embedding volume and safety. Thus, the method provided by the invention has important significance in the application field including secret communication and the like.

Description

technical field [0001] The present invention relates to the field of multimedia information security, and more specifically, relates to an MP3 self-adaptive steganography method based on compressed domain. Background technique [0002] Audio steganography is an important branch of information hiding technology. The current MP3 audio steganography algorithm based on the compressed domain is divided into three types according to the location of the steganographic operation: steganography before quantization and encoding, steganography while quantization and Huffman entropy encoding steganography. The challenge of the steganography method before quantization coding is how to correctly extract the secret information. The Huffman entropy coding steganography method will directly reduce the auditory quality of steganographic audio, while quantization and steganography can ensure the auditory quality of steganographic audio. , concealment and at the same time realize the correct e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G10L15/06G10L19/018G10L25/03
CPCG10L15/063G10L19/018G10L25/03
Inventor 张悦骆伟祺
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products