CN104123945B - Embedding method and extracting method for wav-format audio information - Google Patents

Embedding method and extracting method for wav-format audio information Download PDF

Info

Publication number
CN104123945B
CN104123945B CN201410261979.8A CN201410261979A CN104123945B CN 104123945 B CN104123945 B CN 104123945B CN 201410261979 A CN201410261979 A CN 201410261979A CN 104123945 B CN104123945 B CN 104123945B
Authority
CN
China
Prior art keywords
module
audio
sampled point
algorithm parameter
bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410261979.8A
Other languages
Chinese (zh)
Other versions
CN104123945A (en
Inventor
李芝棠
张瑒
宋广华
邹明光
赵娟
程俊霞
肖津
冯兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN201410261979.8A priority Critical patent/CN104123945B/en
Publication of CN104123945A publication Critical patent/CN104123945A/en
Application granted granted Critical
Publication of CN104123945B publication Critical patent/CN104123945B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses an embedding method for wav-format audio information. The embedding method comprises the following steps of: inputting a wav-format audio, a message needing to be embedded in the wav-format audio, of a user, a first algorithm parameter and a second algorithm parameter; carrying out formatting processing on the message needing to be embedded in the wav-format audio so as to generate a protocol paragraph containing a paragraph header identifier, a checksum, the message needing to be embedded in the wav-format audio, and a paragraph tail identifier; encrypting a random offset number, the first algorithm parameter and the second algorithm parameter to be 16-bit, 16-bit and 32-bit binary bit strings, setting the embedded bit number to 0, selecting the first sampling point of the (64+the random offset number) frame of the wav-format audio as a sampling point i0, taking every k continuous sampling points as a group, wherein k is a step length, and calculating the audio energies EA and EB of the group A={i0, i1, i2...ik-1} and the adjacent group B={ik, ik+1, i k+2...i2k-1} respectively by virtue of the following formulas; circulating the grouping calculation operation.

Description

A kind of embedding grammar for wav format audio information and extracting method
Technical field
The invention belongs to computer network communication field, more particularly, to a kind of embedding for wav format audio information Enter method and extracting method.
Background technology
With the fast development of mobile Internet, the language based on mobile client (such as wechat, mobile phone qq, skype etc.) Sound communication is increasingly becoming a kind of brand-new means of mass-communication.As the common carrier of steganography, the audio frequency money in voice communication Source is just of interest by increasing researcher.Mainly can divide in the currently known scheme related with voice technology for audio frequency For two classes.The first kind is towards the steganography of different-format audio frequency, steganalysis algorithm, and such scheme mainly uses tradition Steganography is combined with the compression standard of different-format audio frequency, to realize the information steganography of certain specific purpose.Equations of The Second Kind relates to And the communications field, the secure communication based on audio frequency for the concern.The main means that adopt be by traditional information encryption from different The compression standard of audio frequency combines, and realizes the secret secure communication based on cryptographic technique.In Chinese invention patent description Disclose a kind of safety communication method for voice information in cn102737639a, become by using the discrete cosine based on coefficient quantization Change domain embedded mobile GIS it is ensured that communication disguise.Scheme utilizes chaos encryption algorithm, closes key mapping for the minority in audio frequency and carries out Encryption, and the integrity of voice content is judged by comparing the robust message authentication code of secret voice, realize voice communication hidden The confidentiality and integrity of voice communication content is ensure that while covering property.
Two current class schemes consider steganography based on different compressed format audio frequency, steganalysis algorithm and base respectively Secure Communication in cryptographic technique.The former mainly towards various steganography, the steganalysis algorithm of different audio formats, and Do not consider the application scenarios of reality, thus inevitably bring following shortcoming: first, the realization of the proposition of algorithm to system Also need to substantial amounts of follow-up study, its feasibility and exploitativeness need the inspection further put into practice;Secondly, what patent proposed is hidden Write algorithm and do not provide specific application scenario so that its application prospect uncertain.The main method that the latter adopts is based on Complex conventional encryption technique, is mainly directed towards and has the higher pc field calculating performance, with the evil residing for mobile client Bad, complex network environment and the high real-time of requirement, low latency rate are runed counter to it is impossible to adapt to the safety based on mobile Internet field Communication.
Content of the invention
Disadvantages described above for prior art or Improvement requirement, the invention provides a kind of be used for wav format audio information Embedding grammar and extracting method, it is easily achieved, can directly be formed application software be installed on operating system (such as ARIXTRA behaviour Make system) on, it is possible to further dock with social softwares such as wechat, solve exploitativeness present in existing method not By force, the indefinite technical problem in application scenario;And invention algorithm complex is relatively low, it is suitable for putting down in the weaker movement of computing capability Carry out on platform, solve the problems, such as that in existing method, time complexity is too high;It is grouped by energy and calculate and structuring repetition Embedded improve algorithm robustness, solve existing algorithm not strong technology of robust performance under the conditions of severe, complex network and ask Topic;By the embedded extraction scheme of agreement, solve the technical problem that in existing method, message cannot be extracted in real time, at random.
For achieving the above object, according to one aspect of the present invention, there is provided a kind of embedded side for wav audio-frequency information Method, comprises the following steps:
(1) receive user needs embedded wav lattice by the wav format audio of inlet flow or the input of file stream, this user Message in formula audio frequency, random offset number, the first algorithm parameter and the second algorithm parameter;
(2) message in embedded wav format audio will be needed to format process, with generate comprise paragraph header identifier, Verification and, the message needing in embedded wav format audio, the agreement section binary bits string of section tail identifier;
(3) random offset number, the first algorithm parameter and the second algorithm parameter are encrypted as 16,16 and 32 respectively Binary bits string, and arrange have been inserted into bit number be 0, arrange enumerator j=0;
(4) select for first sampled point of (64+ random offset number) frame of wav format audio to be set to sampled point i0, follow-up sampled point is followed successively by { i0, i1, i2, i3, i4, i5, i6……}.
(5) from sampled point i0Start, will often continuous k sampled point as a group, wherein k is step-length, adopt with Lower formula calculates group a={ i respectively0, i1, i2……ik-1And b={ ik, ik+1, ik+2……i2k-1Audio power ea、eb:
e a = σ p = 0 k - 1 i p , e b = σ p = k 2 k - 1 i p
(6) judge audio power ea, whether the absolute value of ex energy difference more than the first algorithm parameter and be less than the second algorithm Parameter, if it is represents and meets embedded condition, and subsequently into step (7), otherwise the embedded condition of foot with thumb down, then proceeds to Step (11);
(7) have been inserted into bit number from increasing 1, and enumerator j increases 1 certainly, and judge whether enumerator j is more than data length, such as Fruit is then to arrange j=0, and enter step (8), otherwise enters step (8);
(8) judge whether the binary bits string jth position obtaining in step (2) is 0, if yes then enter step (9), no Then enter step (10);
(9) judge the audio power e that step (5) is obtaineda、eb, if there is ea> ebIf then entering step (12), Otherwise enter step (11);
(10) judge the audio power e that step (5) is obtaineda、eb, if there is ea< ebIf then entering step (12), otherwise enter step (11);
(11) value of sampled point corresponding in group a and b is exchanged one by one;
(12) judge sampled point i2k-1Whether also have 2k sampled point afterwards, if it is, representing also have embedding information Space, arranges i2kStarting point i for next round circulation0, it is then back to step (5), otherwise enter step (13);
(13) judge to have been inserted into the bit number whether bit number is more than agreement section in step (2), if it is, telescopiny Terminate, point out user to embed successfully, otherwise represent embedded imperfect, point out user to need to change wav format audio.
Preferably, greatest length l≤4096 Chinese character of message in embedded wav format audio or 65536 bits are needed, the The size of one algorithm parameter is 1 to 255 integer, and the size of the second algorithm parameter is to be less than more than the first algorithm parameter 1028575 integer.
Preferably, paragraph header identifier is the identifier of 0xfd, verifies and is the message needing in embedded wav format audio Verification and, and length be 16, section tail identifier is the identifier of 0xff.
Preferably, step (3) is specifically, substituted by turn in 64 frame data frames before wav format audio using lsb steganography method Last bit of every frame.
It is another aspect of this invention to provide that providing a kind of extracting method for wav audio-frequency information, walk including following Rapid:
(1) obtain and carry close wav format audio, using lsb steganography method to every in 64 frame data frames before wav format audio Last bit of frame is extracted and is deciphered, using decrypt 16,16,32 data as inclined at random Move number, the first algorithm parameter, the second algorithm parameter;
(2) select for first sampled point of (64+ random offset number) frame of wav format audio to be set to sampled point i0, follow-up sampled point is followed successively by { i0, i1, i2, i3, i4, i5, i6……}.
(3) from sampled point i0Start, will often as a group, be counted respectively using below equation continuous k sampled point Calculation group a={ i0, i1, i2……ik-1And b={ ik, ik+1, ik+2……i2k-1Audio power ea、eb, wherein k is step-length:
e a = σ p = 0 k - 1 i p , e b = σ p = k 2 k - 1 i p
(4) judge audio power ea、ebThe absolute value of energy difference is more than the first algorithm parameter and is less than the second algorithm parameter, If it is represent and meet extraction conditions, subsequently into step (5), otherwise sufficient extraction conditions with thumb down, then proceed to step (6);
(5) judge the audio power e that step (3) obtainsa、ebMagnitude relationship, if ea> eb, generate the ratio that is 0 Spy, and the bit of extraction is sequentially stored into relief area, subsequently into step (6), otherwise generate the bit that is 1, and will carry The bit taking is sequentially stored into relief area, subsequently into step (6);
(6) judge sampled point i2k-1Whether also have 2k sampled point afterwards, finish if it is, representing and not yet extracting, setting i2kStarting point i for next round circulation0, it is then back to step (3), otherwise enter step (7);
(7) data segment in relief area is unpacked, to obtain using the Bit String in relief area and according to following form Obtain the user message extracting from wav format audio.
Preferably, step (7) is initiated with 0xfd paragraph header identifier specifically, beginning look for one section from the starting point of relief area With the data segment of 0xff section tail identifier, then just in this segment data, the data in addition to identifier extracts, composition from The user message extracting in wav format audio.
In general, by the contemplated above technical scheme of the present invention compared with prior art, can obtain down and show Beneficial effect:
1st, compare conventional security communication plan, all steps of the present invention understand understandable.It is highly susceptible to implementing, there is platform Independence, can be conveniently mounted in various operating systems as application software;
2nd, compare conventional security communication plan, application scenarios of the present invention are wide, and prospect is bright and clear, can be hidden in various needs The place of secure communication plays a role, the voice secure communication in especially suitable mobile interchange field.As based on wechat, mobile phone qq with And the mobile client such as skype, the individual being carried out using common communication channel, the communication of business hidden safe etc., it is also suitable simultaneously The field such as diplomatic, military realized using broadcast, traditional common communication channel such as the Internet under special environment hidden, pacify Entirely.
3rd, compare conventional security communication plan, the present invention arrives step (11), extraction step (3) to step in Embedded step (5) Suddenly (5) operand is little, is particularly suitable for using on the weaker mobile platform of operational capability, embedded/extraction rate is quickly.
4th, compare conventional security communication plan, packet energy conception and structuring weight that the present invention proposes in step (5) Multiple embedded thought can effectively improve the robustness of scheme, meets the highly reliable of secure communication requirement under the conditions of complex network Property;
5th, compare conventional security communication plan, the agreementization that the present invention proposes in step (2) embeds/and extraction scheme achieves The random extraction of information, meets the high reliability of secure communication requirement under the conditions of complex network.
Brief description
Fig. 1 is the flow chart of the embedding grammar that the present invention is used for wav audio-frequency information.
Fig. 2 is the flow chart of the extracting method that the present invention is used for wav audio-frequency information.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, below in conjunction with drawings and Examples, right The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only in order to explain the present invention, and It is not used in the restriction present invention.As long as additionally, involved technical characteristic in each embodiment of invention described below The conflict of not constituting each other just can be mutually combined.
As shown in figure 1, the embedding grammar that the present invention is used for wav audio-frequency information comprises the following steps:
(1) receive user needs embedded wav lattice by the wav format audio of inlet flow or the input of file stream, this user Message in formula audio frequency, random offset number, the first algorithm parameter and the second algorithm parameter;Specifically, the present invention needs user The information of transmission to be hidden is referred to as " needing the message in embedded wav format audio ", and may be simply referred to as message, the maximum of this message Length l≤4096 Chinese character (or 65536bits), this has met the needs of generally covert communications, random offset number Size is 1 to 255 integer, and the size of the first algorithm parameter is 1 to 255 integer, and preferred value is 0 to 10, the second algorithm The size of parameter is the integer more than the first algorithm parameter less than 1028575, and its value is bigger, then embedding capacity is bigger, but can not Perceptibility can be poorer, and vice versa, and the first algorithm parameter and the second algorithm parameter select for the embedded condition of subsequent step.
(2) message needing in embedded wav format audio is carried out according to following form (being referred to as form 1 in this specification) Formatting is processed, with generate comprise paragraph header identifier, verification and, the message needing in embedded wav format audio, section tail identifier Agreement section binary bits string;Specifically, paragraph header identifier is the identifier of 0xfd (8), verify and be need embedded The verification of the message in wav format audio and, and length be 16, section tail identifier is the identifier of 0xff (8).
(3) random offset number, the first algorithm parameter and the second algorithm parameter are encrypted as 16,16 and 32 respectively Binary bits string, and arrange have been inserted into bit number be 0, arrange enumerator j=0;Specifically, it is to utilize Least significant bit Position (least significant bit, abbreviation lsb) steganography method is to random offset number, the first algorithm parameter and the second algorithm Parameter is embedded, specific practice be before wav format audio after substituting encryption by turn in 64 frame data frames every frame last Individual bit.
(4) select for first sampled point of (64+ random offset number) frame of wav format audio to be set to sampled point i0, follow-up sampled point is followed successively by { i0, i1, i2, i3, i4, i5, i6……}.
(5) from sampled point i0Start, will often continuous k sampled point as a group, (wherein k is step-length, refers to k is individual Continuous sampled point, as a group a), calculates group a={ i respectively using below equation0, i1, i2……ik-1And b= {ik, ik+1, ik+2……i2k-1Audio power ea、eb:
e a = σ p = 0 k - 1 i p , e b = σ p = k 2 k - 1 i p
From upper formula can be seen that audio power be proportional to sampling point value square, the exactly sound of sampled point record Amplitude, therefore audio power e can take sampling point value square;It is further noted that the selection of step-length k is related to calculation Method robustness and not sentience, when step-length is less, sentience is not preferable, but robust performance is not high, and step-length is chosen very big When, robustness lifting substantially, but sentience does not decline it is preferable that step-length is chosen as when 3,4 not sentience and robustness Reach preferable balance.
(6) judge audio power ea、ebWhether the absolute value of energy difference is more than the first algorithm parameter and less than the second algorithm ginseng Number, if it is represents and meets embedded condition, and subsequently into step (7), otherwise the embedded condition of foot with thumb down, then proceeds to step Suddenly (11);
(7) have been inserted into bit number from increasing 1, and enumerator j increases 1 certainly, and judge whether enumerator j is more than data length, such as Fruit is then to arrange j=0, and enter step (8), otherwise enters step (8);
(8) judge whether the binary bits string jth position obtaining in step (2) is 0, if yes then enter step (9), no Then enter step (10);
(9) judge the audio power e that step (5) is obtaineda、eb, if there is ea> ebIf then entering step (12), Otherwise enter step (11);
(10) judge the audio power e that step (5) is obtaineda、eb, if there is ea< ebIf then entering step (12), otherwise enter step (11);
(11) by group a={ i0, i1, i2……ik-1B={ ik, ik+1, ik+2……i2k-1In corresponding sampled point value one One exchange;
(12) judge sampled point i2k-1Whether also have 2k sampled point afterwards, if it is, representing also have embedding information Space, arranges i2kStarting point i for next round circulation0, it is then back to step (5), otherwise enter step (13);
(13) judge to have been inserted into the bit number whether bit number is more than agreement section in step (2), if it is, representing message Go over through completely embedding to surpass, telescopiny terminates, point out user to embed successfully, otherwise represent embedded imperfect, point out user Need to change wav format audio.
As shown in Fig. 2 the extracting method that the present invention is used for wav audio-frequency information comprises the following steps:
(1) obtain and carry close wav format audio, using lsb steganography method to every in 64 frame data frames before wav format audio Last bit of frame is extracted and is deciphered, using decrypt 16,16,32 data as inclined at random Move number, the first algorithm parameter, the second algorithm parameter;
(2) select for first sampled point of (64+ random offset number) individual frame of wav format audio to be set to sampled point i0, follow-up sampled point is followed successively by { i0, i1, i2, i3, i4, i5, i6……}.
(3) from sampled point i0Start, will often as a group, be counted respectively using below equation continuous k sampled point Calculation group a={ i0, i1, i2……ik-1And b={ ik, ik+1, ik+2……i2k-1Audio power ea、eb, wherein k is step Long:
e a = σ p = 0 k - 1 i p , e b = σ p = k 2 k - 1 i p
(4) judge audio power ea、ebThe absolute value of energy difference is more than the first algorithm parameter and is less than the second algorithm parameter, If it is represent and meet extraction conditions, subsequently into step (5), otherwise sufficient extraction conditions with thumb down, then proceed to step (6);
(5) judge the audio power e that step (3) obtainsa、ebMagnitude relationship, if ea> eb, generate the ratio that is 0 Spy, and the bit of extraction is sequentially stored into relief area, subsequently into step (6), otherwise generate the bit that is 1, and will carry The bit taking is sequentially stored into relief area, subsequently into step (6);
(6) judge sampled point i2k-1Whether also have 2k sampled point afterwards, finish if it is, representing and not yet extracting, setting i2kStarting point i for next round circulation0, it is then back to step (3), otherwise enter step (7);
(7) data segment in relief area is unpacked, to obtain using the Bit String in relief area and according to following form Obtain the user message extracting from wav format audio;Specifically, begin look for one section from the starting point of relief area to be initiated with The data segment of 0xfd (8) paragraph header identifier and 0xff (8) section tail identifier, then remove just in this segment data identifier it Outer data extracts, the user message that composition extracts from wav format audio.
As it will be easily appreciated by one skilled in the art that the foregoing is only presently preferred embodiments of the present invention, not in order to Limit the present invention, all any modification, equivalent and improvement made within the spirit and principles in the present invention etc., all should comprise Within protection scope of the present invention.

Claims (8)

1. a kind of embedding grammar for wav audio-frequency information is it is characterised in that comprise the following steps:
(1) receive user needs embedded wav form sound by the wav format audio of inlet flow or the input of file stream, this user Message in frequency, random offset number, the first algorithm parameter and the second algorithm parameter;
(2) message in embedded wav format audio will be needed to format process, comprise paragraph header identifier, verification to generate With, the agreement section binary bits string of the message needing in embedded wav format audio, section tail identifier;
(3) random offset number, the first algorithm parameter and the second algorithm parameter are encrypted as the two of 16,16 and 32 respectively to enter Bit String processed, and arrange have been inserted into bit number be 0, arrange enumerator j=0;
(4) select for first sampled point of the 64th of wav format audio the plus random offset number frame to be set to sampled point i0, subsequently Sampled point be followed successively by { i0, i1, i2, i3, i4, i5, i6......};
(5) from sampled point i0Start, will often continuous k sampled point as a group, wherein k is step-length, using below equation Calculate group a={ i respectively0, i1, i2......ik-1And b={ ik, ik+1, ik+2.......i2k-1Audio power ea、eb:
e a = σ p = 0 k - 1 i p , e b = σ p = k 2 k - 1 i p
(6) judge audio power ea、ebWhether the absolute value of energy difference is more than the first algorithm parameter and is less than the second algorithm parameter, If it is represent and meet embedded condition, subsequently into step (7), otherwise the embedded condition of foot with thumb down, then proceeds to step (11);
(7) have been inserted into bit number from increasing 1, and enumerator j increases 1 certainly, and judge whether enumerator j is more than data length, if it is, Then j=0 is set, and enters step (8), otherwise enter step (8);
(8) judge whether the binary bits string jth position obtaining in step (2) is 0, if yes then enter step (9), otherwise enters Enter step (10);
(9) judge the audio power e that step (5) is obtaineda、eb, if there is ea> ebIf then entering step (12), otherwise Enter step (11);
(10) judge the audio power e that step (5) is obtaineda、eb, if there is ea< ebIf then entering step (12), otherwise Enter step (11);
(11) value of sampled point corresponding in group a and b is exchanged one by one;
(12) judge sampled point i2k-1Whether also have 2k sampled point afterwards, if it is, representing the space also having embedding information, Setting i2kStarting point i for next round circulation0, it is then back to step (5), otherwise enter step (13);
(13) judge to have been inserted into the bit number whether bit number is more than agreement section in step (2), if it is, telescopiny knot Bundle, points out user to embed successfully, otherwise represents embedded imperfect, points out user to need to change wav format audio.
2. embedding grammar according to claim 1 is it is characterised in that need message in embedded wav format audio Long length l≤4096 Chinese character or 65536 bits, the size of random offset number is 1 to 255 integer, the first algorithm parameter big Little be 1 to 255 integer, the size of the second algorithm parameter be less than more than the first algorithm parameter 1028575 integer.
3. embedding grammar according to claim 1 is it is characterised in that paragraph header identifier is the identifier of 0xfd, verification and Be need the verification of message in embedded wav format audio and, and length is 16, and section tail identifier is the identifier of 0xff.
4. embedding grammar according to claim 1 it is characterised in that step (3) specifically, using lsb steganography method by Last bit of every frame in 64 frame data frames before the replacement wav format audio of position.
5. a kind of extracting method for wav audio-frequency information is it is characterised in that comprise the following steps:
(1) obtain and carry close wav format audio, using lsb steganography method to frame every in 64 frame data frames before wav format audio Last bit is extracted and is deciphered, using decrypt 16,16,32 data as random offset Number, the first algorithm parameter, the second algorithm parameter;
(2) select for first sampled point of the 64th of wav format audio the plus random offset number frame to be set to sampled point i0, subsequently Sampled point be followed successively by { i0, i1, i2, i3, i4, i5, i6......};
(3) from sampled point i0Start, often as a group, group will be calculated respectively using below equation by continuous k sampled point A={ i0, i1, i2......ik-1And b={ ik, ik+1, ik+2......i2k-1Audio power ea、eb, wherein k is step-length:
e a = σ p = 0 k - 1 i p , e b = σ p = k 2 k - 1 i p
(4) judge audio power ea、ebThe absolute value of energy difference is more than the first algorithm parameter and is less than the second algorithm parameter, if It is to represent and meet extraction conditions, subsequently into step (5), otherwise sufficient extraction conditions with thumb down, then proceed to step (6);
(5) judge the audio power e that step (3) obtainsa、ebMagnitude relationship, if ea> eb, generate the bit that is 0, and will The bit extracting is sequentially stored into relief area, subsequently into step (6), otherwise generates the bit that is 1, and the bit that will extract It is sequentially stored into relief area, subsequently into step (6);
(6) judge sampled point i2k-1Whether also have 2k sampled point afterwards, finish if it is, representing and not yet extracting, i is set2kFor Starting point i of next round circulation0, it is then back to step (3), otherwise enter step (7);
(7) using the Bit String in relief area and according to following form, the data segment in relief area is unpacked, with obtain from The user message extracting in wav format audio: 8 paragraph header identifier+16 bit checks and the+use extracted from wav format audio + 8 section tail identifiers of family message.
6. extracting method according to claim 5 is it is characterised in that step (7) is specifically, open from the starting point of relief area Begin to find one section of data segment being initiated with 0xfd paragraph header identifier and 0xff section tail identifier, then will remove mark in this segment data Data outside symbol extracts, the user message that composition extracts from wav format audio.
7. a kind of embedded system for wav audio-frequency information is it is characterised in that comprise the following steps:
First module, passes through inlet flow for receive user or the wav format audio of file stream input, this user needs to embed Message in wav format audio, random offset number, the first algorithm parameter and the second algorithm parameter;
Second module, for the message in embedded wav format audio being needed to format process, comprises paragraph header mark to generate Know symbol, verification and, the message needing in embedded wav format audio, the agreement section binary bits string of section tail identifier;
Three module, for by random offset number, the first algorithm parameter and the second algorithm parameter be encrypted as respectively 16,16 and The binary bits string of 32, and arrange have been inserted into bit number be 0, arrange enumerator j=0;
4th module, for selecting to be set to adopt by first sampled point of the 64th of wav format audio the plus random offset number frame Sampling point i0, follow-up sampled point is followed successively by { i0, i1, i2, i3, i4, i5, i6......};
5th module, for from sampled point i0Start, will often continuous k sampled point as a group, wherein k is step-length, adopts Calculate group a={ i with below equation respectively0, i1, i2......ik-1And b={ ik, ik+1, ik+2.......i2k-1Audio frequency Energy ea、eb:
e a = σ p = 0 k - 1 i p , e b = σ p = k 2 k - 1 i p
6th module, for judging audio power ea、ebWhether the absolute value of energy difference is more than the first algorithm parameter and less than second Algorithm parameter, if it is represents and meets embedded condition, subsequently into step the seven module, the otherwise embedded bar of foot with thumb down Part, then proceeds to the 11st module;
7th module, is used for having been inserted into bit number from increasing 1, and enumerator j increases 1 certainly, and judges whether enumerator j is long more than data Degree, if it is, setting j=0, and enter the 8th module, otherwise enter the 8th module;
8th module, for judging whether the binary bits string jth position that the second module obtains is 0, if yes then enter the 9th Module, otherwise enters the tenth module;
9th module, for judging the audio power e obtaining for the 5th modulea、eb, if there is ea> ebIf then entering step Rapid 12nd module, otherwise enters the 11st module;
Tenth module, for judging the audio power e obtaining for the 5th modulea、eb, if there is ea< ebIf then entering the 12 modules, otherwise enter the 11st module;
11st module, for exchanging the value of sampled point corresponding in group a and b one by one;
12nd module, for judging sampled point i2k-1Whether also having 2k sampled point afterwards, embedding if it is, representing to also have The space of information, arranges i2kStarting point i for next round circulation0, it is then back to the 5th module, otherwise enter the tenth three module;
Tenth three module judges to have been inserted into the bit number whether bit number is more than agreement section in the second module, if it is, embedded Process terminates, and points out user to embed successfully, otherwise represents embedded imperfect, points out user to need to change wav format audio.
8. a kind of extraction system for wav audio-frequency information is it is characterised in that comprise the following steps:
First module, carries close wav format audio for obtaining, using lsb steganography method to 64 frame data before wav format audio In frame, last bit of every frame is extracted and is deciphered, using decrypt 16,16,32 data as Random offset number, the first algorithm parameter, the second algorithm parameter;
Second module, for selecting to be set to adopt by first sampled point of the 64th of wav format audio the plus random offset number frame Sampling point i0, follow-up sampled point is followed successively by { i0, i1, i2, i3, i4, i5, i6......};
Three module, for from sampled point i0Start, will often as a group, be divided using below equation continuous k sampled point Ji Suan not group a={ i0, i1, i2......ik-1And b={ ik, ik+1, ik+2.......i2k-1Audio power ea、eb, its Middle k is step-length:
e a = σ p = 0 k - 1 i p , e b = σ p = k 2 k - 1 i p
4th module, for judging audio power ea、ebThe absolute value of energy difference is more than the first algorithm parameter and is less than the second algorithm Parameter, if it is represents and meets extraction conditions, subsequently into the 5th module, otherwise sufficient extraction conditions with thumb down, Ran Houzhuan Enter the 6th module;
5th module, for judging the audio power e that three module obtainsa、ebMagnitude relationship, if ea> eb, generating one is 0 Bit, and the bit of extraction is sequentially stored into relief area, subsequently into the 6th module, otherwise generates the bit that is 1, and The bit of extraction is sequentially stored into relief area, subsequently into the 6th module;
6th module, for judging sampled point i2k-1Whether also have 2k sampled point afterwards, finish if it is, representing and not yet extracting, Setting i2kStarting point i for next round circulation0, it is then back to three module, otherwise enter the 7th module;
Data segment in relief area is solved by the 7th module for using the Bit String in relief area and according to following form Bag, to obtain the user message extracting from wav format audio: 8 paragraph header identifier+16 bit checks and+from wav format audio + 8 section tail identifiers of the user message of middle extraction.
CN201410261979.8A 2014-06-12 2014-06-12 Embedding method and extracting method for wav-format audio information Active CN104123945B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410261979.8A CN104123945B (en) 2014-06-12 2014-06-12 Embedding method and extracting method for wav-format audio information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410261979.8A CN104123945B (en) 2014-06-12 2014-06-12 Embedding method and extracting method for wav-format audio information

Publications (2)

Publication Number Publication Date
CN104123945A CN104123945A (en) 2014-10-29
CN104123945B true CN104123945B (en) 2017-01-18

Family

ID=51769333

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410261979.8A Active CN104123945B (en) 2014-06-12 2014-06-12 Embedding method and extracting method for wav-format audio information

Country Status (1)

Country Link
CN (1) CN104123945B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106161021B (en) * 2015-03-30 2020-03-20 重庆邮电大学 Private data sending method and device and private data receiving method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6571144B1 (en) * 1999-10-20 2003-05-27 Intel Corporation System for providing a digital watermark in an audio signal
CN102737639A (en) * 2012-07-13 2012-10-17 北京理工大学 Safety communication method for voice information
CN102905134A (en) * 2012-10-22 2013-01-30 山东省计算中心 Adaptive video digital steganography method
CN103731654A (en) * 2013-12-23 2014-04-16 华中科技大学 Information embedding system and information extracting system using 2D/3D videos

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6571144B1 (en) * 1999-10-20 2003-05-27 Intel Corporation System for providing a digital watermark in an audio signal
CN102737639A (en) * 2012-07-13 2012-10-17 北京理工大学 Safety communication method for voice information
CN102905134A (en) * 2012-10-22 2013-01-30 山东省计算中心 Adaptive video digital steganography method
CN103731654A (en) * 2013-12-23 2014-04-16 华中科技大学 Information embedding system and information extracting system using 2D/3D videos

Non-Patent Citations (10)

* Cited by examiner, † Cited by third party
Title
"A blind audio watermarking algorithm with self-synchronization";Huang J W, Wang Y, and Shi Y Q;《Proceedings of IEEE International Symposium on Circuits and System》;20021231;全文 *
"An adaptive audio watermarking based on the singular value decomposition in the wavelet domain";Bhat K V, Sengupta I;《A Review Journal of Digital Signal Processing》;20101231;全文 *
"Covert Communication Audio Watermarking Algorithm Based on LSB";Yin Xiong, Zhang Xiaoming.;《10th International Conference on Communication Technology》;20061231;全文 *
"一种改进的LSB音频信息隐藏算法";倪明等;《电脑知识与技术》;20081231;第4卷(第4期);全文 *
"一种新的信息隐藏算法的设计研究";特列克别克米沙;《中国优秀硕士学位论文全文数据库信息科技辑》;20130115(第01期);全文 *
"一种用音频作载体的信息隐藏算法";李跃强等;《计算机应用研究》;20051231(第5期);全文 *
"信息隐藏技术及其在WAV文件中的实现";李曦;《中国优秀硕士学位论文全文数据库信息科技辑》;20090215(第02期);全文 *
"写与隐写分析算法及实践研究";陈铭;《中国博士学位论文全文数据库信息科技辑》;20081015(第10期);全文 *
"压缩域音频隐写与隐写分析中若干问题的研究";严迪群;《中国博士学位论文全文数据库信息科技辑》;20130615(第06期);全文 *
"强鲁棒的数字音频信息隐藏技术及安全性研究";刘冉;《中国优秀硕士学位论文全文数据库信息科技辑》;20120115(第01期);全文 *

Also Published As

Publication number Publication date
CN104123945A (en) 2014-10-29

Similar Documents

Publication Publication Date Title
Wang et al. A chaotic image encryption algorithm based on perceptron model
CN107147488A (en) A kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms
Wang et al. Centroid-based semi-fragile audio watermarking in hybrid domain
Abood et al. Audio steganography with enhanced LSB method for securing encrypted text with bit cycling
CN110390191A (en) Method and system for safe biologic identification verifying
CN101882296A (en) Method for hiding Chebyshev neural network chaotic digital watermark information
CN103259662A (en) Novel procuration signature and verification method based on integer factorization problems
CN102117476B (en) Signature watermark system used for CAD (Computer-Aided Design) documents
CN102915740B (en) Phonetic empathy Hash content authentication method capable of implementing tamper localization
Anwar et al. Stegocrypt scheme using LSB-AES base64
CN104852914A (en) Watermark hopping communication method based on data packet interval
CN104269175B (en) A kind of ip voice steganography method matched based on Best similarity degree
Abduljaleel et al. Hiding text in speech signal using K-means, LSB techniques and chaotic maps.
Sari et al. Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security
CN104123945B (en) Embedding method and extracting method for wav-format audio information
CN109981246A (en) A kind of encryption method and decryption method of character string
CN102737639A (en) Safety communication method for voice information
CN103731654B (en) A kind of information insertion system and information extracting system using 2D/3D video
CN104159118A (en) Image byte XOR algorithm based on pseudo random sequence and LSB algorithm
CN104363089B (en) A kind of method that fuzzy vault is realized based on geographical location information
Srivastava et al. Design and implementation of crypto based water marking techniques for EHR security
CN111371727A (en) Detection method for NTP protocol covert communication
CN112398861B (en) Encryption system and method for sensitive data in web configuration system
CN101364868B (en) Pseudo-noise code generator based on broad sense information field and generating method thereof
Xiao et al. Copyright protection in wireless sensor networks by watermarking

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant