(3.215.180.226) 您好!臺灣時間:2021/03/09 02:33
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:湯士逸
研究生(外文):Shis-Yi Tang
論文名稱:運用類比調變技術隱匿音頻訊息之方法
論文名稱(外文):A Voice Hiding Method Based upon Analog Modulation Technique
指導教授:李家同李家同引用關係
指導教授(外文):R. C. T. Lee
學位類別:碩士
校院名稱:國立暨南國際大學
系所名稱:通訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:英文
論文頁數:43
中文關鍵詞:隱匿音訊類比調變
外文關鍵詞:voice hidinganalog modulation
相關次數:
  • 被引用被引用:0
  • 點閱點閱:264
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:21
  • 收藏至我的研究室書目清單書目收藏:0
在這篇論文中,我們提出ㄧ個運用類比調變技術隱匿音頻訊息之方法。 由聲音學可知,我們人類的一些聽覺缺陷(特性);其中一個特性是,當聲音訊號太高頻的時候,我們人的耳朵是沒辦法聽到的(人類約可聽到頻率為一萬六Hz以內的聲音)。因此我們利用類比調變技術,將我們的秘密訊號調變至頻率高的位置,以達到保護訊號的工作。我們方法的一個好處是:不容易被別人察覺我們有秘密的訊號隱藏著,因此使得我們的方法對於訊號保密有不錯的功效。無論如何,當合法的接收者收到我們處理過的加密訊號,他將有能力用我們解密的方法,獲得與我們的秘密訊號相近的訊號,並且得知該訊息。
In this thesis, we propose a voice hiding method based upon analog modulation technique. According to some characteristics (drawbacks) of human hearing system, we know that humans can not hear the speech signal of high frequency (most adults are unable to hear the signals of above 16 kHz). Therefore, we exploit the analog modulation technique to modulate every secret message into high frequency to hide the secret messages. One advantage of our method is that illegal receivers would not be conscious that some message is with secret messages. Thus, the protection of our crypto-method is quite good. However, the legal receivers get the processed-signal, he will get approximate secret signal by our decryption method.
Chapter 1 Introduction 1
Section 1.1 Motive and Previous Works 1
Section 1.2 Thesis Organization 2
Chapter 2 A Review of Data Hiding Schemes 3
Section 2.1 The Least Significant Bit Scheme 3
Section 2.2 The Sub-band Coding Method 5
Section 2.3 Data Hiding Methods Based upon DNA Sequences 6
Chapter 3 A Voice Hiding Method based upon Analog Modulation Technique 12
Section 3.1 An Analog Modulation Technique - Double -sideband Suppressed Carrier (DSB-SC) 12
Section 3.2 Analog Modulation Technique for Voice Hiding Method 17
Chapter 4 Experiments and Programs 19
Section 4.1 The Processes of Our Experiments 19
Section 4.2 The Program of Our Method 32
Conclusion and Future Works 41
Bibliography 42
[BML96] Techniques for Data Hiding, Bender , W. , Morimoto , N. and Lu, A. , IBM Syst. J. 35 (3/4), 1996, pp.313–336.

[CC2004] Hiding Data in Images by Simple LSB Substitution, Chan, C. K. and Cheng, L. M. , Pattern Recognition, Vol. 37, No. 3, 2004, pp.469-474.

[CHC2003] Finding Optimal LSB Substitution in Image Hiding by Dynamic Programming Strategy, Chang , C. C. , Hsiao, J. Y. and Chan, C. S. , Pattern Recognition, Vol. 36, No. 7, 2003, pp.1583-1595.

[CLF2008] Lossless Data Hiding for Color Images Based on Block Truncation Coding, Chang, C. C., Lin, C. Y. and Fan, Y. H. , Pattern Recognition, Vol. 41, No. 7, 2008, pp. 2347-2357

[CLH2002] A Fast and Secure Image Hiding Scheme based on LSB Substitution, Chang, C. C. , Lin, M. H. and Hu, Y. C. , International Journal of Pattern Recognition and Artificial Intelligence, Vol. 16, No. 4, 2002, pp.399-416.

[CLXC2003] A New Speech Hiding Scheme Based upon Sub-band Coding, Chang, C. C. , Lee, R. C. T. , Xiao, G. X. and Chen, T. S. , IEEE Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia, 2003, Vol. 2, 2003, pp.980-984

[HL2006] Encryption Methods Based Upon DNA Sequences, Hsu, H. Z. and Lee, R. C. T., 2006.

[KP2000] Information Hiding Techniques for Steganography and Digital Watermarking, Katzenbeisser, S. and Petitcolas, F. A. P. , Artech House, Norwood, Massachusetts, 2000.

[LCL2007] Communications engineering : essentials for computer scientists and electrical engineers, Lee, R.C.T., Chiu, M. C., Lin, J. S., John Wiley & Sons (Asia), 2007.

[MBR99] Spread Spectrum Image Steganography, Marvel, L.M. , Boncelet, C.G. and Retter, C.T. , IEEE Trans. Image Process, Vol. 8, No. 8, 1999, pp.1075–1083.

[PD2001] Digital Watermarking: Algorithms and Applications, Podilchuk, C. I. and Delp, E. J. , IEEE Signal Processing Magazine, Vol. 18, No. 4, 2001, pp.33-46.

[TVSO94] A Digital Watermark, Tirkel, A.Z. , Van Schyndel, R.G. and Osborne, C.F. , Proceedings of the IEEE International Conference on Image Processing, Austin Convention Center, Austin, Texas, Vol. II, 1994, pp. 86–90.

[WLC2001] Image Hiding by Optimal LSB Substitution and Genetic Algorithm, Wang, R. Z. , Lin, C. F. and Lin, J. C. , Pattern Recognition, Vol. 34, No. 3, 2001, pp.671-683.

[YCH2005] Hiding Secret Data in Images Via Predictive Coding, Yu, Y. H. , Chang, C. C. and Hu, Y. C. , Pattern Recognition, Vol. 38, No. 5, 2005, pp.691-705.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔