浏览全部资源
扫码关注微信
1. 合肥工业大学计算机与信息学院,安徽 合肥 230601
2. 合肥工业大学工业安全应急技术安徽省重点实验室,安徽 合肥 230601
3. 合肥工业大学智能互联系统安徽省实验室,安徽 合肥 230009
[ "苏兆品(1983− ),女,博士,合肥工业大学副教授,主要研究方向为语音安全、进化算法" ]
[ "沈朝勇(1996− ),男,合肥工业大学硕士生,主要研究方向为音频隐写、进化算法" ]
[ "张国富(1979− ),男,博士,合肥工业大学教授,主要研究方向为语音安全、软件工程" ]
[ "岳峰(1981− ),男,博士,合肥工业大学副研究员,主要研究方向为软件工程、信息安全" ]
[ "胡东辉(1973− ),男,博士,合肥工业大学教授,主要研究方向为信息安全、机器学习" ]
网络出版日期:2021-11,
纸质出版日期:2021-11-20
移动端阅览
苏兆品, 沈朝勇, 张国富, 等. 一种基于差分进化的鲁棒音频隐写算法[J]. 电信科学, 2021,37(11):64-74.
Zhaopin SU, Chaoyong SHEN, Guofu ZHANG, et al. A robust audio steganography algorithm based on differential evolution[J]. Telecommunications science, 2021, 37(11): 64-74.
苏兆品, 沈朝勇, 张国富, 等. 一种基于差分进化的鲁棒音频隐写算法[J]. 电信科学, 2021,37(11):64-74. DOI: 10.11959/j.issn.1000-0801.2021246.
Zhaopin SU, Chaoyong SHEN, Guofu ZHANG, et al. A robust audio steganography algorithm based on differential evolution[J]. Telecommunications science, 2021, 37(11): 64-74. DOI: 10.11959/j.issn.1000-0801.2021246.
音频隐写是将秘密信息隐藏到音频载体中,已成为信息隐藏领域的一个研究热点。已有研究大多聚焦最小化隐写失真,却以牺牲隐写容量为代价,且往往被一些常规信号攻击后难以正确提取秘密信息。为此,基于扩频技术,首先,分析了隐写参数(分段隐写强度和分段隐写容量)与不可感知性和鲁棒性的关系,并构建了一种以分段隐写强度、分段隐写容量为自变量,以不可感知性和隐写容量为优化目标,以信噪比为约束条件的音频隐写多目标优化模型;然后,提出了一种基于差分进化的鲁棒音频隐写算法,设计了相应的编码、适应度函数、交叉和变异算子。对比实验结果表明,所提隐写算法能够在保证不可感知性和抗隐写分析能力的前提下达到更好的鲁棒性,可以有效抵御一些常规信号处理攻击。
Audio steganography is to hide secret information into the audio carrier and has become a research hotspot in the field of information hiding.Most of the existing studies focus on minimizing distortion at the expense of steganography capacity
and it is often difficult for them to extract secret information correctly after some common signal processing attacks.Therefore
based on the spread spectrum technology
firstly
the relationship between steganography parameters (i.e.
segmented scaling parameters and steganography capacity) and imperceptibility as well as robustness was analyzed.Next
a multi-objective optimization model of audio steganography was presented
in which segmented scaling parameters and steganography capacity were decision variables
imperceptibility and steganography capacity were optimization objectives
and the signal-to-noise ratio was a constraint.Then
a robust audio steganography algorithm based on differential evolution was proposed
including the corresponding encoding
fitness function
crossover and mutation operators.Finally
comparative experimental results show that the proposed steganography algorithm can achieve better robustness against common signal processing attacks on the premise of ensuring imperceptibility and anti-detection.
李凤华 , 李晖 , 贾焰 , 等 . 隐私计算研究范畴及发展趋势 [J ] . 通信学报 , 2016 , 37 ( 4 ): 1 - 11 .
LI F H , LI H , JIA Y , et al . Privacy computing:concept,connotation and its research trend [J ] . Journal on Communications , 2016 , 37 ( 4 ): 1 - 11 .
孙树亮 . 基于非下采样Contourlet变换和Hill编码的图像隐写 [J ] . 电信科学 , 2016 , 32 ( 6 ): 124 - 128 .
SUN S L . Image steganography based on nonsubsampled Contourlet transform and Hill cipher [J ] . Telecommunications Science , 2016 , 32 ( 6 ): 124 - 128 .
DUTTA H , DAS R K , NANDI S , et al . An overview of digital audio steganography [J ] . IETE Technical Review , 2020 , 37 ( 6 ): 632 - 650 .
邹明光 , 李芝棠 . 基于振幅值修改的 wav 音频隐写算法 [J ] . 通信学报 , 2014 ( z1 ): 36 - 40 .
ZOU M G , LI Z T . Wav-audio steganography algorithm based on amplitude modifying [J ] . Journal on Communications , 2014 ( z1 ): 36 - 40 .
LIU H L , LIU J J , HU R G , et al . Adaptive audio steganography scheme based on wavelet packet energy [C ] // 2017 IEEE 3rd international conference on big data security on cloud (bigdatasecurity),IEEE international conference on high performance and smart computing (hpsc),and IEEE international conference on intelligent data and security (ids) . Piscataway:IEEE Press , 2017 : 26 - 31 .
AHANI S , GHAEMMAGHAMI S , WANG Z J . A sparse representation-based wavelet domain speech steganography method [J ] . IEEE/ACM Transactions on Audio,Speech,and Language Processing , 2015 , 23 ( 1 ): 80 - 91 .
MELIGY A M , NASEF M M , EID F T . An efficient method to audio steganography based on modification of least significant bit technique using random keys [J ] . International Journal of Computer Network and Information Security , 2015 , 7 ( 7 ): 24 - 29 .
吴秋玲 , 吴蒙 . 基于小波变换的语音信息隐藏新方法 [J ] . 电子与信息学报 , 2016 , 38 ( 4 ): 834 - 840 .
WU Q L , WU M . Novel audio information hiding algorithm based on wavelet transform [J ] . Journal of Electronics & Information Technology , 2016 , 38 ( 4 ): 834 - 840 .
KANHE A , AGHILA G . A DCT-SVD-based speech steganography in voiced frames [J ] . Circuits,Systems,and Signal Processing , 2018 , 37 ( 11 ): 5049 - 5068 .
BHARTI S S , GUPTA M , AGARWAL S . A novel approach for audio steganography by processing of amplitudes and signs of secret audio separately [J ] . Multimedia Tools and Applications , 2019 , 78 ( 16 ): 23179 - 23201 .
ALI A H , GEORGE L E , ZAIDAN A , et al . High capacity,transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain [J ] . Multimedia Tools and Applications , 2018 , 77 ( 23 ): 31487 - 31516 .
张雪垣 , 王让定 , 严迪群 , 等 . 基于分段 STC 的音频隐写算法 [J ] . 电信科学 , 2019 , 35 ( 7 ): 115 - 123 .
ZHANG X Y , WANG R D , YAN D Q , et al . An audio steganography algorithm based on segment-STC [J ] . Telecommunications Science , 2019 , 35 ( 7 ): 115 - 123 .
ZHANG X Y , WANG R D , YAN D Q , et al . Selecting optimal submatrix for syndrome-trellis codes (STCs)-based steganography with segmentation [J ] . IEEE Access , 2020 , 8 : 61754 - 61766 .
SU Z P , ZHANG G F , YUE F , et al . SNR-constrained heuristics for optimizing the scaling parameter of robust audio watermarking [J ] . IEEE Transactions on Multimedia , 2018 , 20 ( 10 ): 2631 - 2644 .
STORN R , PRICE K . Differential evolution - A simple and efficient heuristic for global optimization over continuous spaces [J ] . Journal of Global Optimization , 1997 , 11 ( 4 ): 341 - 359 .
CHANG J H , KIM N S , MITRA S K . Voice activity detection based on multiple statistical models [J ] . IEEE Transactions on Signal Processing , 2006 , 54 ( 6 ): 1965 - 1976 .
LEI B Y , SOON I Y , TAN E L . Robust SVD-based audio watermarking scheme with differential evolution optimization [J ] . IEEE Transactions on Audio,Speech,and Language Processing , 2013 , 21 ( 11 ): 2368 - 2378 .
DAS S , SUGANTHAN P N . Differential evolution:a survey of the state-of-the-art [J ] . IEEE Transactions on Evolutionary Computation , 2011 , 15 ( 1 ): 4 - 31 .
YANG Z Y , TANG K , YAO X . Self-adaptive differential evolution with neighborhood search [C ] // 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence) . Piscataway:IEEE Press , 2008 : 1110 - 1116 .
JIANG S Z , YE D P , HUANG J Q , et al . SmartSteganogaphy:Light-weight generative audio steganography model for smart embedding application [J ] . Journal of Network and Computer Applications , 2020 , 165 : 102689 .
0
浏览量
151
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构