A method of speech information hiding in inactive frame based on pitch modulation

Zhijun Wu, Chenlei Zhang, Junjun Guo
{"title":"A method of speech information hiding in inactive frame based on pitch modulation","authors":"Zhijun Wu, Chenlei Zhang, Junjun Guo","doi":"10.1504/ijics.2023.133367","DOIUrl":null,"url":null,"abstract":"To solve the problem that the speech information hiding algorithm based on random position selection and matrix coding has insufficient hiding capacity, the paper proposes a novel pitch modulation steganography method based on inactive frame. In this method, the least significant bit (LSB) replacement method is adopted for inactive frames, and the speech information hiding algorithm based on random position selection and matrix coding is adopted for active frames, which realises the pitch modulation information hiding method based on inactive frames. Finally, simulation experiments are carried out for the pitch modulation information hiding method based on inactive frames. The results indicate that the maximum hiding capacity of the algorithm in this paper can reach 241.67 bps, which significantly improves the hiding capacity, and at the same time the concealment has also been improved to a certain extent.","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information and Computer Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijics.2023.133367","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

Abstract

To solve the problem that the speech information hiding algorithm based on random position selection and matrix coding has insufficient hiding capacity, the paper proposes a novel pitch modulation steganography method based on inactive frame. In this method, the least significant bit (LSB) replacement method is adopted for inactive frames, and the speech information hiding algorithm based on random position selection and matrix coding is adopted for active frames, which realises the pitch modulation information hiding method based on inactive frames. Finally, simulation experiments are carried out for the pitch modulation information hiding method based on inactive frames. The results indicate that the maximum hiding capacity of the algorithm in this paper can reach 241.67 bps, which significantly improves the hiding capacity, and at the same time the concealment has also been improved to a certain extent.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种基于基音调制的非活动帧语音信息隐藏方法
针对基于随机位置选择和矩阵编码的语音信息隐藏算法隐藏能力不足的问题,提出了一种基于非活动帧的基音调制隐写方法。该方法对非活动帧采用最低有效位(LSB)替换方法,对活动帧采用基于随机位置选择和矩阵编码的语音信息隐藏算法,实现了基于非活动帧的基音调制信息隐藏方法。最后,对基于非活动帧的基音调制信息隐藏方法进行了仿真实验。结果表明,本文算法的最大隐藏容量可达241.67 bps,显著提高了隐藏容量,同时隐蔽性也有一定程度的提高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Information and Computer Security
International Journal of Information and Computer Security Engineering-Safety, Risk, Reliability and Quality
CiteScore
1.40
自引率
0.00%
发文量
90
期刊介绍: - Assurance and integrity of service. - Computer crime prevention/detection, computer forensics and security. - Confidentiality protection, cryptography and data protection. - Database and data security, denial of service protection. - E-commerce security, e-surveillance. - Fraud/hacker/terrorism detection/prevention, information warfare, national security. - Information ethics. - Information privacy issues, information systems/information security, sharing. - Internet abuse, network intruder prevention, internet/network security. - Malicious code/unauthorised access protection, transaction security, virus/worm controls. - Risk management, safety-critical systems. - Secure communications technology and computer systems. - Security control measures, policy models and mechanisms. - Software and hardware architectures. - Wireless/mobile network security.
期刊最新文献
Data Breach: Analysis, Countermeasures, and Challenges Ensemble Learning Algorithms with Feature Reduction Mechanism for Intrusion Detection System HEMC: A Dynamic Behavior Analysis System for Malware based on Hardware Virtualization Augmenting the detection of Online Image theft using diagonal transformation and iris biometric watermarking A Novel Stream Cipher Based on Quasigroups and QG-PRNG
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1