Advanced Search
Volume 31 Issue 6
Jun.  2009
Turn off MathJax
Article Contents
Xie Chun-hui, Cheng Yi-min, Wang Yun-lu, Chen Yang-kun. Estimation of Secret Message in Audio Based on Statistic Characteristics[J]. Journal of Electronics & Information Technology, 2009, 31(6): 1341-1344. doi: 10.3724/SP.J.1146.2008.00907
Citation: Xie Chun-hui, Cheng Yi-min, Wang Yun-lu, Chen Yang-kun. Estimation of Secret Message in Audio Based on Statistic Characteristics[J]. Journal of Electronics & Information Technology, 2009, 31(6): 1341-1344. doi: 10.3724/SP.J.1146.2008.00907

Estimation of Secret Message in Audio Based on Statistic Characteristics

doi: 10.3724/SP.J.1146.2008.00907 cstr: 32379.14.SP.J.1146.2008.00907
  • Received Date: 2008-07-18
  • Rev Recd Date: 2008-10-27
  • Publish Date: 2009-06-19
  • Based on the audio amplitude distribution change caused by secret message embedding in different bit-planes, a method of secret message length estimation is presented in this paper. This method can not only discriminate the existence of secret message, but also recognize the embedding bit-plane and estimate the amount of secret message. The proposed method has been implemented on PC. The experimental result shows its good recognition performance and relatively high estimation accuracy of secret message length. The proposed method can be used effectively in audio steganalysis.
  • loading
  • Dumitrescu S and Wu Xiaolin. A new framework of LSBsteganalysis of digital media [J].IEEE Trans. on SignalProcessing.2005, 53(10):3936-3947[2]Ker A D. Derivation of error distribution in least squaressteganalysis [J].IEEE Trans. on Information Forensics andSecurity.2007, 2(2):140-148[3]詹双环, 张鸿宾. 基于小波分解和方差分析的图像信息隐藏盲检测[J].电子与信息学报.2007, 29(6):1460-1463浏览[4]田源, 程义民, 王以孝. 一种新的数据隐藏方法[J]. 电子学报,2004, 32(9): 1444-1447.Tian Yuan, Cheng Yi-min, and Wang Yi-Xiao. A novelmethod of data hiding [J]. Acta Electronica Sinica, 2004,32(9): 1444-1447.[5]程义民, 钱振兴, 王以孝, 等. 基于数位信息的信息隐藏方法[J].电子与信息学报.2005, 27(8):1304-1309浏览[6]Dumitrescu S, Wu Xiallin, and Wang Zhe. Detection of LSBsteganography via sample pair analysis [J].IEEE Trans. onSignal Processing.2003, 51(7):1995-2007[7]Yu Xiao-yi, Tan Tie-niu, and Wang Yun-hong. Extendedoptimization method of LSB steganalysis [C]. IEEEInternational Conference on Image Processing 2005. Genova,Italy, 2005(II): 1102-1105.[8]Ker A D. Steganalysis of embedding in two least-significantbits [J].IEEE Trans. on Information and Security.2007, 2(1):46-54[9]Huang Hesu and Kyriakakis C. Blind dereverberation ofaudio signals using a modified constant modulus algorithm[C]. 121st Audio Engineering Society. San Francisco, CA, US,2006: 6974-6977.[10]史晓非, 刘人杰, 苗瑞. 一种峭度依赖的参数自适应盲分离算法电子与信息学报. 2006, 28(11): 2033-2036.Shi Xiao-fei, Liu Ren-jie, and Miao Rui. A parameterkurtosis-dependent flexible BSS algorithm [J].. Journal ofElectronics Information Technology.2006, 28(11):2033-2036[11]Johnson M K, Lyu S, and Farid H. Steganalysis of recordedspeech [C]. SPIE Symposium on Electronic Imaging. San Jose,CA, US, 2005: 664-672.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3651) PDF downloads(881) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return