Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SILK security steganography method based on LSF coefficient statistical distribution characteristics

A technology of statistical distribution and statistical analysis, applied in speech analysis, instruments, etc., can solve the problem of SILK speech steganography method, etc., to ensure the effect of hearing concealment and good security

Inactive Publication Date: 2019-08-06
WUHAN UNIV
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, there is no steganographic method for SILK speech

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SILK security steganography method based on LSF coefficient statistical distribution characteristics
  • SILK security steganography method based on LSF coefficient statistical distribution characteristics
  • SILK security steganography method based on LSF coefficient statistical distribution characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0019] At first the technical term that the present invention adopts is described as follows:

[0020] 1) Compressed audio: Refers to audio that has undergone lossy compression, such as MP3, WMA, and AMR are all lossy compressed audio.

[0021] 2) Cover: Carrier audio, that is, audio without embedding secret information.

[0022] 3) Stego: Confidential audio, that is, audio with secret information embedded.

[0023] 4) LPC coefficient: each frame of AMR speech includes 4 subframes, the first subframe and the second subframe form a subframe group, and the th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SILK security steganography method based on LSF coefficient statistical distribution characteristics. The method comprises the steps: firstly, carrying out the statistical analysis of the code word usage condition of an LPC quantization stage in the SILK coding process, and carrying out the grouping of groups with similar code word distribution conditions according to the statistical condition; dividing code words with similar distribution in each level in the LSF quantization process into one group; finally, adopting the LSF indexes of the first level to the ninth level of an obtained quantization result for embedding the secret information, and determining the bit number of the embedded secret information by the number of code word vectors in an embedded group.According to the SILK-oriented safe steganography method, the SILK-oriented safe steganography algorithm based on LSF coefficient statistical distribution characteristics is achieved for the problemthat an existing SILK-oriented steganography method is relatively lacked. The maximum embedding capacity of the algorithm can reach 274 bps. Meanwhile, the auditory concealment of voices can be guaranteed, and the good safety is achieved.

Description

technical field [0001] The invention belongs to the technical field of multimedia information content security, relates to a SILK-based steganography method, in particular to a SILK safe steganography method based on the statistical distribution characteristics of LSF coefficients for realizing safe transmission of secret information. [0002] technical background [0003] In recent years, with the rapid development of mobile communication technology, voice communication and audio conversation services are becoming more and more mature. Voice communication is becoming more and more important in people's daily life and has become one of the main ways of communication. At present, mobile communication is basically popular, and various wireless devices and communication software have become an indispensable part of people's daily life, which makes the voice communication business must develop faster and better to meet the demand. During the encoding process of voice communicatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G10L19/018
CPCG10L19/018G10L2019/0001G10L2019/0005
Inventor 任延珍蔡森郑维曼王丽娜
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products