High-security steganography method for voice over IP

A high-security, voice technology, applied in the field of secure communication, can solve the problems of not distinguishing the difference of available carrier bits, small embedded capacity, etc., and achieve the effect of improving imperceptibility and reducing distortion

Active Publication Date: 2018-04-06
NANJING UNIV OF SCI & TECH
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above methods all improve the detection resistance of information hiding, but the embedding capacity is small, and the difference between the available carrier bits is not distinguished

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-security steganography method for voice over IP
  • High-security steganography method for voice over IP
  • High-security steganography method for voice over IP

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] In this embodiment, the voice sample set in ITU-Appendix P.501 is used for testing. The voice sample set covers male voice and female voice audio samples from various countries in the world, monophonic, 8KHz, 16-bit sampling.

[0075] Setting embedding rate is respectively 0.2, 0.3, 0.4, 0.5, 0.6, at each embedding rate, adopts the method of the present invention to carry out steganography, adopts the objective voice quality evaluation (PESQ) method that ITU-TP.862 standard provides to MOS- The LQO value has been tested and counted, and the results are attached Figure 4 As shown, it can be seen that the speech quality of the encrypted speech sample processed by the steganographic method of the present invention is closer to the speech quality of the coded speech sample without steganography.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-security steganography method for voice over IP, which includes the following steps: a sender reads original sampled voice, and compresses and encodes the original sampled voice to get a carrier voice sequence; the sender extracts an intensity sequence and an amplitude sequence of the carrier voice sequence, divides the carrier voice sequence into a silent interval and a non-salient interval, and defines the distortion costs for different carrier voice intervals; the sender constructs a ladder generation matrix according to the length and embedding rate of the carrier voice sequence; the sender embeds secret information according to the distortion costs and the generation matrix, calculates out a modification vector minimizing carrier distortion, and modifiesthe carrier voice sequence according to the modification vector obtained to get a secret information carrying voice sequence; and after receiving the secret information carrying voice sequence, a receiver recovers a secret information sequence according to the ladder generation matrix. Stable embedding capacity is maintained. The amount of distortion introduced during carrier modification is reduced. The security of information hiding is improved.

Description

technical field [0001] The invention relates to the field of secure communication, in particular to a high-security steganography method for IP voice, which is suitable for G.711a-law coded voice in IP voice. Background technique [0002] While network applications provide great convenience for people's lives, they also increase the risks of communication content leakage and personal information theft. People are paying more and more attention to issues such as how to communicate securely and protect personal information in an open network environment. . As an important branch of covert communication, steganographic technology utilizes the insensitivity of human sensory organs (sensory redundancy) and the redundancy of multimedia digital signals (data characteristic redundancy), without affecting the quality of the carrier and normal communication. In this case, the covert information is hidden in the public media information, so that the covert information is transmitted w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G10L19/018
CPCG10L19/018
Inventor 马英杰刘光杰刘伟伟翟江涛戴跃伟黄书华郑大刚吴建台白惠文方俊郑天宇怡暾华纯阳
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products