(3.237.20.246) 您好!臺灣時間:2021/04/14 09:15
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:黃聖鈞
研究生(外文):Huang Sang Chun
論文名稱:高容量音訊藏密技術之研究
指導教授:婁德權婁德權引用關係劉江龍劉江龍引用關係
學位類別:碩士
校院名稱:國防大學中正理工學院
系所名稱:電子工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
中文關鍵詞:資訊隱藏音訊藏密空間域高容量
外文關鍵詞:data hidingaudio steganographyspatialhigh capacity
相關次數:
  • 被引用被引用:1
  • 點閱點閱:145
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
資訊隱藏屬於秘密通訊的一種類型,安全、不可察覺性、及高藏密容量為其主要之訴求。近年來,許多的資訊隱藏技術被提出來,但大部分的研究是以數位影像為主,而在數位音訊資訊隱藏部分,卻只有較少數的技術被提出來,究其原因,主要是由於音訊為一維訊號,人類在接收時比影像來的更敏銳,因此,在不可感知的訴求下,較難達成高容量的需求。
本論文提出一套高容量的音訊資訊隱藏技術。本技術利用音訊樣本間的差值來嵌入秘密資訊。在嵌入過程中,本技術將掩護音訊內兩兩相鄰的音訊樣本,以不重複選取的方式分成一組,然後計算各組內兩音訊樣本的差值,並依據人類聽覺特性,將所有可能的差值分成數個差距層,製成差值表。秘密訊息的嵌入即是以差值表內所對應到的新的差值來取代原差值。
本方法提供了一套簡單的方式,使得嵌入後的結果比使用傳統最低位元取代法來得更不可察覺。在取出嵌入的秘密訊息時,更不用參照原始的掩護音訊。實驗結果顯示,嵌入後的藏密音訊有很好的不可察覺性及訊噪比值(Signal-to-Noise Ratio),證明本方法的可行性。
Data hiding is a type of hidden communication. The security, imperceptibility, and high capacity are the main requirements. In recent years, many information hiding techniques have been proposed. But most of the proposed techniques are for digital images. Only a few techniques were proposed for digital audio. This is because that the digital audio is one-dimensional signal which is more sensitive than digital image for human perceptible system. Therefore, it is hard to achieve the requirement of high capacity on constrain of imperceptibility.
This thesis proposes a high-capacity audio hiding technique which uses the difference between two audio samples to embed secret information. In the embedding process, a cover audio is partitioned into non-overlapping pairs of two consecutive samples. The difference value is then calculated from each sample pair. All possible difference values are classified into several intervals to form the difference table according to human auditory character. The secret information is then embedded into the cover audio by replacing the difference value with the new value obtained from the difference table.
The proposed technique provides an easy way to produce a more imperceptible result than those yielded by simple least-significant-bit replacement methods. The embedded secret information can be extracted from the stego-audio without referencing the original cover audio. Experimental results show that the stego-audio has good perceptual transparency and signal-to-noise value. It proves the feasibility of the proposed method.
誌謝 ii
摘要 iii
ABSTRACT iv
目錄 v
表目錄 vii
圖目錄 viii
1. 緒論 1
1.1 前言 1
1.2 研究動機 2
1.3 論文架構 3
2. 文獻探討 4
2.1 資訊隱藏 4
2.2 音訊簡介 7
2.3 人類聽覺特性 9
2.4 音訊資訊隱藏技術回顧 14
2.4.1 音訊資訊隱藏的需求 14
2.4.2 音訊資訊隱藏技術 15
2.5 能量差異資訊隱藏 17
3. 高容量音訊資訊隱藏技術 21
3.1 前言 21
3.2 藏密 23
3.2.1量化差值 23
3.2.2 嵌入資料 25
3.3 取出 28
4. 實驗結果與討論 29
4.1 實驗環境 29
4.2 實驗結果 31
4.3 分析與討論 34
5. 結論與未來研究方向 37
5.1 結論 37
5.2 未來研究方向 38
參考文獻 39
自傳 43
[1]Herodotus, The Histories, J. M. Dent & Sons, Ltd, London, England, pp.1-2, 1992.
[2]鄧白樺、姚文俊、滕峻輝,密碼傳奇,世茂出版社,台北,第1-288頁,2003。
[3]Bauer, F. L., Decrypted Secrets—Methods and Maxims of Cryptology, Springer-Verlag, Heidelberg, Germany, pp. 23-24, 1997.
[4]尤新剛、周琳娜、郭云彪,“信息隱藏學科的主要分支及術語”,信息隱藏全國學術研討會論文集,第43-50頁,2001。
[5]王小川,語音訊號處理,全華科技圖書股份有限公司,台北,第1-416頁,2004。
[6]http://www.physics.uiowa.edu/~umallik/adventure/sound.htm。
[7]http://www.sounderpro.com.tw/Reviw/IEM/iem.html。
[8]Zwicker, E. and Fastl, E., Psychoacoustics, Springer-Verlag, Berlin, Germany, pp. 78-79, 1999.
[9]http://themusicpage.org/data/Sensitivity.html。
[10]Johnson, N., Duric, Z., and Jajodia, S., Information Hiding: Steganography and Watermarking-Attacks and Countermeasures, Kluwer Academic Publishers, Boston, MA, pp. 24-25, 2001.
[11]Bender, W., Gruhl, D., Morimoto, N., and Lu, A., “Techniques for Data Hiding,” IBM System Journal, Vol. 35, pp. 313-336, 1996.
[12]Katzenbeisser, S. and Petitcolas, F. A. P., Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Boston, pp.44-45, 2000.
[13]Cvejic, N., Algorithms for Audio Watermarking and Steganography, OULU university press, Oulu Finland, pp. 1-111, 2004.
[14]Cvejic, N. and Seppanen, T., “Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method,” Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04), pp. 533-537, 2004.
[15]Michiel, V., Fons, B., Arno, L., and Stephane, C., “High Capacity Reversible Watermarking for Audio,” Proceedings of SPIE-IS&T Electronic Imaging, Vol. 5020, pp. 1-11, 2003.
[16]Cvejic, N. and Seppanen, T., “A Wavelet Domain LSB Insertion Algorithm for High Capacity Audio Steganography,” Proc. IEEE Digital Signal Processing Workshop, Callaway Gardens, GA, pp. 53-55, Oct. 2002.
[17]Gruhl, D., Lu, A., and Bender, A., “Echo Hiding,” Information Hiding: First International Workshop, Cambridge, pp. 295-315, May 30-Jun. 1, 1996.
[18]吳蕙如,“以回聲資訊隱藏為基礎的音訊浮水印技術設計”,碩士論文,國立交通大學資訊工程研究所,新竹,第1-99頁,1999。
[19]Huang, D. Y. and Yeo, T. Y., “Robust and Inaudible Multi-Echo Audio Watermarking,” PCM2002, LNCS 2532, Springer-Verlag Berlin Heidelberg, pp. 615-622, 2002.
[20]Oh, H. O., Seok, J. W., Hong, J. W., and Youn, D. H., “New Echo Embedding Technique for Robustand Imperceptible Audio Watermarking,” Proceedings of the International Conference on Acoustic, Speech and Signal Processing, Utah, USA, Vol. 3, pp. 1341-1344, May 2001.
[21]Ko, B., Nishimura, R., and Suzuki, Y., “Time-Spread Echo Method for Digital Audio Watermarking Using PN Sequences,” Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Orlando, FL, pp. 2001–2004, 2002.
[22]Ruiz, F. and Deller, J., “Digital Watermarking of Speech Signals for the National Gallery of the Spoken Word,” Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Istanbul, Turkey, pp. 1499–1502, 2000.
[23]Tilki, J. F. and Beex, A. A., “Encoding a Hidden Auxiliary Channel onto a Digital Audio Signal Using Psychoacoustic Masking,” Proceedings of the IEEE South East Conference, Blacksburg, VA, pp. 331-333, 1997.
[24]Robert, A. and Picard, J., “On the Use of Masking Models for Image and Audio Watermarking,” IEEE Transactions on Multimedia, Vol. 7, No. 4, pp. 727-739, Aug. 2005.
[25]Swanson, M. D., Bin, Z., Tewfik, A. H., and Boney, L., “Robust Audio Watermarking Using Perceptual Masking,” Signal Processing, Vol. 66, No. 3, pp. 337-355, 1998.
[26]Kim, Y. H., Kang, H., Kim, K., and Han, S. S., “A Digital Audio Watermarking Using Two Masking Effects,” PCM2002, LNCS 2532, Springer-Verlag Berlin Heidelberg, pp. 655-662, 2002.
[27]Tilki, J. F., and Beex, A. A., “Encoding a Hidden Digital Signature onto an Audio Signal Using Psychoacoustic Masking,” Proceedings of the 7th International Coference on Signal Process Apps. and Tech., pp. 476-480, 1996.
[28]Cedric, T., Adi, R., and Mcloughlin, I., “Data Concealment in Audio Using a Nonlinear Frequency Distribution of Prbs Coded Data and Frequency-Domain Lsb Insertion,” Proceedings of IEEE Region 10International Conference on Electrical and Electronic Technology, Kuala Lumpur, Malaysia, pp. 275-278, 2000.
[29]Wu, D. C. and Tsai, W. H., “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Vol. 24, pp. 1613-1623, 2003.
[30]Jovi, B., Have A Nice Day, Track1, Universal Music Ltd., 2005.
[31]Symphony No.39 E flat major K.543-Minuet, Mozart Effect, Track 10, UFO Music Ltd., 1997.
[32]Garden S., Truly, Madly, Completely - The Best of Savage Garden, CD1, Track5, SONYBMG, 2005.
[33]空中英語教室2006年2月份Super MP3光碟,曉騰國際,2006。
[34]Wang, S., Zhang, X., and Zhang K., “Data Hiding in Digital Audio by Frequency Domain Dithering,”LNCS 2776, Springer-Verlag Berlin Heidelberg, pp. 383-394, 2003.
[35]Wu, S., Huang, J., Huang, D., and Shi, Y. Q., “Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission,”IEEE Transactions on Broadcasting, Vol. 51, No. 1, pp. 69-76, Mar. 2005.
[36]Noll, P., “Wideband speech and audio coding,” IEEE communications Magazine, Vol. 31, No.11, pp. 34-44, 1993.
[37]Zhang, X. and Wang, S., “Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security,” Pattern Recognition Letters, Vol. 25, pp. 331-334, 2004.
[38]Wu, H. C., Wu, N. I., Tsai, C. S., and Hwang, M. S., “Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods,” IEE Proceedings Vision, Image & Signal Processing, Vol. 152, No. 5, pp. 611-615, Oct. 2005.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 王千倖(1999):「合作學習」和「問題導向學習」—培養教師及學生的科學創造力。教育資料與研究,第28期。
2. 朱則剛(1996):建構主義對教學設計之意義。教學科技與媒體,26,頁3-12。
3. 朱湘吉(1992):新觀念、新挑戰—建構主義的新系統。教學科技與媒體,2,頁15-20。
4. 周立勳(1994):國小分班分組教學現況調查。教師之友,第三十五卷第一期,頁56-61。
5. 邱錦昌(1996):實施問題中心取向教學法—創造終身的學習者。北縣教育,第13期,頁75-83。
6. 唐偉成、江新合(1998):以問題解決為導向的教學理念與模式。屏師科學教育,第8期,頁12-28。
7. 張清濱(1995):問題中心的學習策略。研習資訊,第12期,第5卷,頁1-5。
8. 張靜嚳(1995):問題中心教學在國中發展之經過—效果及可行性之探討。科學教育學刊,第三卷第二期,頁139-165。
9. 郭重吉(1992):從建構主義的觀點探討中小學數理教育的改進。科學發展月刊,第二十卷,第五期,頁548-570。
10. 郭重吉(1995):建構主義與數理教學。建構與教學,第1期,第1版。
11. 陳嘉成(1998):合作學習式概念構圖在國小自然科學教育之成效研究。國立政治大學教育與心理研究,21期,頁107-128。
12. 曾志華(1997):以建構論為基礎的科學教育理念。教育資料與研究,第16期,頁35-37。
13. 楊巧玲(2000):問題導向教學與合作學習教學策略之理論與實際。課程與教學,第三卷第三期,頁121-135。
14. 楊龍立(1997):建構主義教學的檢討。教育資料與研究,第18期,頁1-6。
15. 熊召弟(1996):建構者觀的自然科教學。科學教育研究與發展季刊,第三期,台北市立師範學院。
 
系統版面圖檔 系統版面圖檔