A method of speech information hiding in inactive frame based on pitch modulation

Q3 Engineering
Zhijun Wu, Chenlei Zhang, Junjun Guo
{"title":"A method of speech information hiding in inactive frame based on pitch modulation","authors":"Zhijun Wu, Chenlei Zhang, Junjun Guo","doi":"10.1504/ijics.2023.133367","DOIUrl":null,"url":null,"abstract":"To solve the problem that the speech information hiding algorithm based on random position selection and matrix coding has insufficient hiding capacity, the paper proposes a novel pitch modulation steganography method based on inactive frame. In this method, the least significant bit (LSB) replacement method is adopted for inactive frames, and the speech information hiding algorithm based on random position selection and matrix coding is adopted for active frames, which realises the pitch modulation information hiding method based on inactive frames. Finally, simulation experiments are carried out for the pitch modulation information hiding method based on inactive frames. The results indicate that the maximum hiding capacity of the algorithm in this paper can reach 241.67 bps, which significantly improves the hiding capacity, and at the same time the concealment has also been improved to a certain extent.","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information and Computer Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijics.2023.133367","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

Abstract

To solve the problem that the speech information hiding algorithm based on random position selection and matrix coding has insufficient hiding capacity, the paper proposes a novel pitch modulation steganography method based on inactive frame. In this method, the least significant bit (LSB) replacement method is adopted for inactive frames, and the speech information hiding algorithm based on random position selection and matrix coding is adopted for active frames, which realises the pitch modulation information hiding method based on inactive frames. Finally, simulation experiments are carried out for the pitch modulation information hiding method based on inactive frames. The results indicate that the maximum hiding capacity of the algorithm in this paper can reach 241.67 bps, which significantly improves the hiding capacity, and at the same time the concealment has also been improved to a certain extent.
一种基于基音调制的非活动帧语音信息隐藏方法
针对基于随机位置选择和矩阵编码的语音信息隐藏算法隐藏能力不足的问题,提出了一种基于非活动帧的基音调制隐写方法。该方法对非活动帧采用最低有效位(LSB)替换方法,对活动帧采用基于随机位置选择和矩阵编码的语音信息隐藏算法,实现了基于非活动帧的基音调制信息隐藏方法。最后,对基于非活动帧的基音调制信息隐藏方法进行了仿真实验。结果表明,本文算法的最大隐藏容量可达241.67 bps,显著提高了隐藏容量,同时隐蔽性也有一定程度的提高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
International Journal of Information and Computer Security
International Journal of Information and Computer Security Engineering-Safety, Risk, Reliability and Quality
CiteScore
1.40
自引率
0.00%
发文量
90
期刊介绍: - Assurance and integrity of service. - Computer crime prevention/detection, computer forensics and security. - Confidentiality protection, cryptography and data protection. - Database and data security, denial of service protection. - E-commerce security, e-surveillance. - Fraud/hacker/terrorism detection/prevention, information warfare, national security. - Information ethics. - Information privacy issues, information systems/information security, sharing. - Internet abuse, network intruder prevention, internet/network security. - Malicious code/unauthorised access protection, transaction security, virus/worm controls. - Risk management, safety-critical systems. - Secure communications technology and computer systems. - Security control measures, policy models and mechanisms. - Software and hardware architectures. - Wireless/mobile network security.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信