CN104123945B - Embedding method and extracting method for wav-format audio information - Google Patents
Embedding method and extracting method for wav-format audio information Download PDFInfo
- Publication number
- CN104123945B CN104123945B CN201410261979.8A CN201410261979A CN104123945B CN 104123945 B CN104123945 B CN 104123945B CN 201410261979 A CN201410261979 A CN 201410261979A CN 104123945 B CN104123945 B CN 104123945B
- Authority
- CN
- China
- Prior art keywords
- module
- audio
- sampled point
- algorithm parameter
- bit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention discloses an embedding method for wav-format audio information. The embedding method comprises the following steps of: inputting a wav-format audio, a message needing to be embedded in the wav-format audio, of a user, a first algorithm parameter and a second algorithm parameter; carrying out formatting processing on the message needing to be embedded in the wav-format audio so as to generate a protocol paragraph containing a paragraph header identifier, a checksum, the message needing to be embedded in the wav-format audio, and a paragraph tail identifier; encrypting a random offset number, the first algorithm parameter and the second algorithm parameter to be 16-bit, 16-bit and 32-bit binary bit strings, setting the embedded bit number to 0, selecting the first sampling point of the (64+the random offset number) frame of the wav-format audio as a sampling point i0, taking every k continuous sampling points as a group, wherein k is a step length, and calculating the audio energies EA and EB of the group A={i0, i1, i2...ik-1} and the adjacent group B={ik, ik+1, i k+2...i2k-1} respectively by virtue of the following formulas; circulating the grouping calculation operation.
Description
Technical field
The invention belongs to computer network communication field, more particularly, to a kind of embedding for wav format audio information
Enter method and extracting method.
Background technology
With the fast development of mobile Internet, the language based on mobile client (such as wechat, mobile phone qq, skype etc.)
Sound communication is increasingly becoming a kind of brand-new means of mass-communication.As the common carrier of steganography, the audio frequency money in voice communication
Source is just of interest by increasing researcher.Mainly can divide in the currently known scheme related with voice technology for audio frequency
For two classes.The first kind is towards the steganography of different-format audio frequency, steganalysis algorithm, and such scheme mainly uses tradition
Steganography is combined with the compression standard of different-format audio frequency, to realize the information steganography of certain specific purpose.Equations of The Second Kind relates to
And the communications field, the secure communication based on audio frequency for the concern.The main means that adopt be by traditional information encryption from different
The compression standard of audio frequency combines, and realizes the secret secure communication based on cryptographic technique.In Chinese invention patent description
Disclose a kind of safety communication method for voice information in cn102737639a, become by using the discrete cosine based on coefficient quantization
Change domain embedded mobile GIS it is ensured that communication disguise.Scheme utilizes chaos encryption algorithm, closes key mapping for the minority in audio frequency and carries out
Encryption, and the integrity of voice content is judged by comparing the robust message authentication code of secret voice, realize voice communication hidden
The confidentiality and integrity of voice communication content is ensure that while covering property.
Two current class schemes consider steganography based on different compressed format audio frequency, steganalysis algorithm and base respectively
Secure Communication in cryptographic technique.The former mainly towards various steganography, the steganalysis algorithm of different audio formats, and
Do not consider the application scenarios of reality, thus inevitably bring following shortcoming: first, the realization of the proposition of algorithm to system
Also need to substantial amounts of follow-up study, its feasibility and exploitativeness need the inspection further put into practice;Secondly, what patent proposed is hidden
Write algorithm and do not provide specific application scenario so that its application prospect uncertain.The main method that the latter adopts is based on
Complex conventional encryption technique, is mainly directed towards and has the higher pc field calculating performance, with the evil residing for mobile client
Bad, complex network environment and the high real-time of requirement, low latency rate are runed counter to it is impossible to adapt to the safety based on mobile Internet field
Communication.
Content of the invention
Disadvantages described above for prior art or Improvement requirement, the invention provides a kind of be used for wav format audio information
Embedding grammar and extracting method, it is easily achieved, can directly be formed application software be installed on operating system (such as ARIXTRA behaviour
Make system) on, it is possible to further dock with social softwares such as wechat, solve exploitativeness present in existing method not
By force, the indefinite technical problem in application scenario;And invention algorithm complex is relatively low, it is suitable for putting down in the weaker movement of computing capability
Carry out on platform, solve the problems, such as that in existing method, time complexity is too high;It is grouped by energy and calculate and structuring repetition
Embedded improve algorithm robustness, solve existing algorithm not strong technology of robust performance under the conditions of severe, complex network and ask
Topic;By the embedded extraction scheme of agreement, solve the technical problem that in existing method, message cannot be extracted in real time, at random.
For achieving the above object, according to one aspect of the present invention, there is provided a kind of embedded side for wav audio-frequency information
Method, comprises the following steps:
(1) receive user needs embedded wav lattice by the wav format audio of inlet flow or the input of file stream, this user
Message in formula audio frequency, random offset number, the first algorithm parameter and the second algorithm parameter;
(2) message in embedded wav format audio will be needed to format process, with generate comprise paragraph header identifier,
Verification and, the message needing in embedded wav format audio, the agreement section binary bits string of section tail identifier;
(3) random offset number, the first algorithm parameter and the second algorithm parameter are encrypted as 16,16 and 32 respectively
Binary bits string, and arrange have been inserted into bit number be 0, arrange enumerator j=0;
(4) select for first sampled point of (64+ random offset number) frame of wav format audio to be set to sampled point
i0, follow-up sampled point is followed successively by { i0, i1, i2, i3, i4, i5, i6……}.
(5) from sampled point i0Start, will often continuous k sampled point as a group, wherein k is step-length, adopt with
Lower formula calculates group a={ i respectively0, i1, i2……ik-1And b={ ik, ik+1, ik+2……i2k-1Audio power ea、eb:
(6) judge audio power ea, whether the absolute value of ex energy difference more than the first algorithm parameter and be less than the second algorithm
Parameter, if it is represents and meets embedded condition, and subsequently into step (7), otherwise the embedded condition of foot with thumb down, then proceeds to
Step (11);
(7) have been inserted into bit number from increasing 1, and enumerator j increases 1 certainly, and judge whether enumerator j is more than data length, such as
Fruit is then to arrange j=0, and enter step (8), otherwise enters step (8);
(8) judge whether the binary bits string jth position obtaining in step (2) is 0, if yes then enter step (9), no
Then enter step (10);
(9) judge the audio power e that step (5) is obtaineda、eb, if there is ea> ebIf then entering step (12),
Otherwise enter step (11);
(10) judge the audio power e that step (5) is obtaineda、eb, if there is ea< ebIf then entering step
(12), otherwise enter step (11);
(11) value of sampled point corresponding in group a and b is exchanged one by one;
(12) judge sampled point i2k-1Whether also have 2k sampled point afterwards, if it is, representing also have embedding information
Space, arranges i2kStarting point i for next round circulation0, it is then back to step (5), otherwise enter step (13);
(13) judge to have been inserted into the bit number whether bit number is more than agreement section in step (2), if it is, telescopiny
Terminate, point out user to embed successfully, otherwise represent embedded imperfect, point out user to need to change wav format audio.
Preferably, greatest length l≤4096 Chinese character of message in embedded wav format audio or 65536 bits are needed, the
The size of one algorithm parameter is 1 to 255 integer, and the size of the second algorithm parameter is to be less than more than the first algorithm parameter
1028575 integer.
Preferably, paragraph header identifier is the identifier of 0xfd, verifies and is the message needing in embedded wav format audio
Verification and, and length be 16, section tail identifier is the identifier of 0xff.
Preferably, step (3) is specifically, substituted by turn in 64 frame data frames before wav format audio using lsb steganography method
Last bit of every frame.
It is another aspect of this invention to provide that providing a kind of extracting method for wav audio-frequency information, walk including following
Rapid:
(1) obtain and carry close wav format audio, using lsb steganography method to every in 64 frame data frames before wav format audio
Last bit of frame is extracted and is deciphered, using decrypt 16,16,32 data as inclined at random
Move number, the first algorithm parameter, the second algorithm parameter;
(2) select for first sampled point of (64+ random offset number) frame of wav format audio to be set to sampled point
i0, follow-up sampled point is followed successively by { i0, i1, i2, i3, i4, i5, i6……}.
(3) from sampled point i0Start, will often as a group, be counted respectively using below equation continuous k sampled point
Calculation group a={ i0, i1, i2……ik-1And b={ ik, ik+1, ik+2……i2k-1Audio power ea、eb, wherein k is step-length:
(4) judge audio power ea、ebThe absolute value of energy difference is more than the first algorithm parameter and is less than the second algorithm parameter,
If it is represent and meet extraction conditions, subsequently into step (5), otherwise sufficient extraction conditions with thumb down, then proceed to step
(6);
(5) judge the audio power e that step (3) obtainsa、ebMagnitude relationship, if ea> eb, generate the ratio that is 0
Spy, and the bit of extraction is sequentially stored into relief area, subsequently into step (6), otherwise generate the bit that is 1, and will carry
The bit taking is sequentially stored into relief area, subsequently into step (6);
(6) judge sampled point i2k-1Whether also have 2k sampled point afterwards, finish if it is, representing and not yet extracting, setting
i2kStarting point i for next round circulation0, it is then back to step (3), otherwise enter step (7);
(7) data segment in relief area is unpacked, to obtain using the Bit String in relief area and according to following form
Obtain the user message extracting from wav format audio.
Preferably, step (7) is initiated with 0xfd paragraph header identifier specifically, beginning look for one section from the starting point of relief area
With the data segment of 0xff section tail identifier, then just in this segment data, the data in addition to identifier extracts, composition from
The user message extracting in wav format audio.
In general, by the contemplated above technical scheme of the present invention compared with prior art, can obtain down and show
Beneficial effect:
1st, compare conventional security communication plan, all steps of the present invention understand understandable.It is highly susceptible to implementing, there is platform
Independence, can be conveniently mounted in various operating systems as application software;
2nd, compare conventional security communication plan, application scenarios of the present invention are wide, and prospect is bright and clear, can be hidden in various needs
The place of secure communication plays a role, the voice secure communication in especially suitable mobile interchange field.As based on wechat, mobile phone qq with
And the mobile client such as skype, the individual being carried out using common communication channel, the communication of business hidden safe etc., it is also suitable simultaneously
The field such as diplomatic, military realized using broadcast, traditional common communication channel such as the Internet under special environment hidden, pacify
Entirely.
3rd, compare conventional security communication plan, the present invention arrives step (11), extraction step (3) to step in Embedded step (5)
Suddenly (5) operand is little, is particularly suitable for using on the weaker mobile platform of operational capability, embedded/extraction rate is quickly.
4th, compare conventional security communication plan, packet energy conception and structuring weight that the present invention proposes in step (5)
Multiple embedded thought can effectively improve the robustness of scheme, meets the highly reliable of secure communication requirement under the conditions of complex network
Property;
5th, compare conventional security communication plan, the agreementization that the present invention proposes in step (2) embeds/and extraction scheme achieves
The random extraction of information, meets the high reliability of secure communication requirement under the conditions of complex network.
Brief description
Fig. 1 is the flow chart of the embedding grammar that the present invention is used for wav audio-frequency information.
Fig. 2 is the flow chart of the extracting method that the present invention is used for wav audio-frequency information.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, below in conjunction with drawings and Examples, right
The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only in order to explain the present invention, and
It is not used in the restriction present invention.As long as additionally, involved technical characteristic in each embodiment of invention described below
The conflict of not constituting each other just can be mutually combined.
As shown in figure 1, the embedding grammar that the present invention is used for wav audio-frequency information comprises the following steps:
(1) receive user needs embedded wav lattice by the wav format audio of inlet flow or the input of file stream, this user
Message in formula audio frequency, random offset number, the first algorithm parameter and the second algorithm parameter;Specifically, the present invention needs user
The information of transmission to be hidden is referred to as " needing the message in embedded wav format audio ", and may be simply referred to as message, the maximum of this message
Length l≤4096 Chinese character (or 65536bits), this has met the needs of generally covert communications, random offset number
Size is 1 to 255 integer, and the size of the first algorithm parameter is 1 to 255 integer, and preferred value is 0 to 10, the second algorithm
The size of parameter is the integer more than the first algorithm parameter less than 1028575, and its value is bigger, then embedding capacity is bigger, but can not
Perceptibility can be poorer, and vice versa, and the first algorithm parameter and the second algorithm parameter select for the embedded condition of subsequent step.
(2) message needing in embedded wav format audio is carried out according to following form (being referred to as form 1 in this specification)
Formatting is processed, with generate comprise paragraph header identifier, verification and, the message needing in embedded wav format audio, section tail identifier
Agreement section binary bits string;Specifically, paragraph header identifier is the identifier of 0xfd (8), verify and be need embedded
The verification of the message in wav format audio and, and length be 16, section tail identifier is the identifier of 0xff (8).
(3) random offset number, the first algorithm parameter and the second algorithm parameter are encrypted as 16,16 and 32 respectively
Binary bits string, and arrange have been inserted into bit number be 0, arrange enumerator j=0;Specifically, it is to utilize Least significant bit
Position (least significant bit, abbreviation lsb) steganography method is to random offset number, the first algorithm parameter and the second algorithm
Parameter is embedded, specific practice be before wav format audio after substituting encryption by turn in 64 frame data frames every frame last
Individual bit.
(4) select for first sampled point of (64+ random offset number) frame of wav format audio to be set to sampled point
i0, follow-up sampled point is followed successively by { i0, i1, i2, i3, i4, i5, i6……}.
(5) from sampled point i0Start, will often continuous k sampled point as a group, (wherein k is step-length, refers to k is individual
Continuous sampled point, as a group a), calculates group a={ i respectively using below equation0, i1, i2……ik-1And b=
{ik, ik+1, ik+2……i2k-1Audio power ea、eb:
From upper formula can be seen that audio power be proportional to sampling point value square, the exactly sound of sampled point record
Amplitude, therefore audio power e can take sampling point value square;It is further noted that the selection of step-length k is related to calculation
Method robustness and not sentience, when step-length is less, sentience is not preferable, but robust performance is not high, and step-length is chosen very big
When, robustness lifting substantially, but sentience does not decline it is preferable that step-length is chosen as when 3,4 not sentience and robustness
Reach preferable balance.
(6) judge audio power ea、ebWhether the absolute value of energy difference is more than the first algorithm parameter and less than the second algorithm ginseng
Number, if it is represents and meets embedded condition, and subsequently into step (7), otherwise the embedded condition of foot with thumb down, then proceeds to step
Suddenly (11);
(7) have been inserted into bit number from increasing 1, and enumerator j increases 1 certainly, and judge whether enumerator j is more than data length, such as
Fruit is then to arrange j=0, and enter step (8), otherwise enters step (8);
(8) judge whether the binary bits string jth position obtaining in step (2) is 0, if yes then enter step (9), no
Then enter step (10);
(9) judge the audio power e that step (5) is obtaineda、eb, if there is ea> ebIf then entering step (12),
Otherwise enter step (11);
(10) judge the audio power e that step (5) is obtaineda、eb, if there is ea< ebIf then entering step
(12), otherwise enter step (11);
(11) by group a={ i0, i1, i2……ik-1B={ ik, ik+1, ik+2……i2k-1In corresponding sampled point value one
One exchange;
(12) judge sampled point i2k-1Whether also have 2k sampled point afterwards, if it is, representing also have embedding information
Space, arranges i2kStarting point i for next round circulation0, it is then back to step (5), otherwise enter step (13);
(13) judge to have been inserted into the bit number whether bit number is more than agreement section in step (2), if it is, representing message
Go over through completely embedding to surpass, telescopiny terminates, point out user to embed successfully, otherwise represent embedded imperfect, point out user
Need to change wav format audio.
As shown in Fig. 2 the extracting method that the present invention is used for wav audio-frequency information comprises the following steps:
(1) obtain and carry close wav format audio, using lsb steganography method to every in 64 frame data frames before wav format audio
Last bit of frame is extracted and is deciphered, using decrypt 16,16,32 data as inclined at random
Move number, the first algorithm parameter, the second algorithm parameter;
(2) select for first sampled point of (64+ random offset number) individual frame of wav format audio to be set to sampled point
i0, follow-up sampled point is followed successively by { i0, i1, i2, i3, i4, i5, i6……}.
(3) from sampled point i0Start, will often as a group, be counted respectively using below equation continuous k sampled point
Calculation group a={ i0, i1, i2……ik-1And b={ ik, ik+1, ik+2……i2k-1Audio power ea、eb, wherein k is step
Long:
(4) judge audio power ea、ebThe absolute value of energy difference is more than the first algorithm parameter and is less than the second algorithm parameter,
If it is represent and meet extraction conditions, subsequently into step (5), otherwise sufficient extraction conditions with thumb down, then proceed to step
(6);
(5) judge the audio power e that step (3) obtainsa、ebMagnitude relationship, if ea> eb, generate the ratio that is 0
Spy, and the bit of extraction is sequentially stored into relief area, subsequently into step (6), otherwise generate the bit that is 1, and will carry
The bit taking is sequentially stored into relief area, subsequently into step (6);
(6) judge sampled point i2k-1Whether also have 2k sampled point afterwards, finish if it is, representing and not yet extracting, setting
i2kStarting point i for next round circulation0, it is then back to step (3), otherwise enter step (7);
(7) data segment in relief area is unpacked, to obtain using the Bit String in relief area and according to following form
Obtain the user message extracting from wav format audio;Specifically, begin look for one section from the starting point of relief area to be initiated with
The data segment of 0xfd (8) paragraph header identifier and 0xff (8) section tail identifier, then remove just in this segment data identifier it
Outer data extracts, the user message that composition extracts from wav format audio.
As it will be easily appreciated by one skilled in the art that the foregoing is only presently preferred embodiments of the present invention, not in order to
Limit the present invention, all any modification, equivalent and improvement made within the spirit and principles in the present invention etc., all should comprise
Within protection scope of the present invention.
Claims (8)
1. a kind of embedding grammar for wav audio-frequency information is it is characterised in that comprise the following steps:
(1) receive user needs embedded wav form sound by the wav format audio of inlet flow or the input of file stream, this user
Message in frequency, random offset number, the first algorithm parameter and the second algorithm parameter;
(2) message in embedded wav format audio will be needed to format process, comprise paragraph header identifier, verification to generate
With, the agreement section binary bits string of the message needing in embedded wav format audio, section tail identifier;
(3) random offset number, the first algorithm parameter and the second algorithm parameter are encrypted as the two of 16,16 and 32 respectively to enter
Bit String processed, and arrange have been inserted into bit number be 0, arrange enumerator j=0;
(4) select for first sampled point of the 64th of wav format audio the plus random offset number frame to be set to sampled point i0, subsequently
Sampled point be followed successively by { i0, i1, i2, i3, i4, i5, i6......};
(5) from sampled point i0Start, will often continuous k sampled point as a group, wherein k is step-length, using below equation
Calculate group a={ i respectively0, i1, i2......ik-1And b={ ik, ik+1, ik+2.......i2k-1Audio power ea、eb:
(6) judge audio power ea、ebWhether the absolute value of energy difference is more than the first algorithm parameter and is less than the second algorithm parameter,
If it is represent and meet embedded condition, subsequently into step (7), otherwise the embedded condition of foot with thumb down, then proceeds to step
(11);
(7) have been inserted into bit number from increasing 1, and enumerator j increases 1 certainly, and judge whether enumerator j is more than data length, if it is,
Then j=0 is set, and enters step (8), otherwise enter step (8);
(8) judge whether the binary bits string jth position obtaining in step (2) is 0, if yes then enter step (9), otherwise enters
Enter step (10);
(9) judge the audio power e that step (5) is obtaineda、eb, if there is ea> ebIf then entering step (12), otherwise
Enter step (11);
(10) judge the audio power e that step (5) is obtaineda、eb, if there is ea< ebIf then entering step (12), otherwise
Enter step (11);
(11) value of sampled point corresponding in group a and b is exchanged one by one;
(12) judge sampled point i2k-1Whether also have 2k sampled point afterwards, if it is, representing the space also having embedding information,
Setting i2kStarting point i for next round circulation0, it is then back to step (5), otherwise enter step (13);
(13) judge to have been inserted into the bit number whether bit number is more than agreement section in step (2), if it is, telescopiny knot
Bundle, points out user to embed successfully, otherwise represents embedded imperfect, points out user to need to change wav format audio.
2. embedding grammar according to claim 1 is it is characterised in that need message in embedded wav format audio
Long length l≤4096 Chinese character or 65536 bits, the size of random offset number is 1 to 255 integer, the first algorithm parameter big
Little be 1 to 255 integer, the size of the second algorithm parameter be less than more than the first algorithm parameter 1028575 integer.
3. embedding grammar according to claim 1 is it is characterised in that paragraph header identifier is the identifier of 0xfd, verification and
Be need the verification of message in embedded wav format audio and, and length is 16, and section tail identifier is the identifier of 0xff.
4. embedding grammar according to claim 1 it is characterised in that step (3) specifically, using lsb steganography method by
Last bit of every frame in 64 frame data frames before the replacement wav format audio of position.
5. a kind of extracting method for wav audio-frequency information is it is characterised in that comprise the following steps:
(1) obtain and carry close wav format audio, using lsb steganography method to frame every in 64 frame data frames before wav format audio
Last bit is extracted and is deciphered, using decrypt 16,16,32 data as random offset
Number, the first algorithm parameter, the second algorithm parameter;
(2) select for first sampled point of the 64th of wav format audio the plus random offset number frame to be set to sampled point i0, subsequently
Sampled point be followed successively by { i0, i1, i2, i3, i4, i5, i6......};
(3) from sampled point i0Start, often as a group, group will be calculated respectively using below equation by continuous k sampled point
A={ i0, i1, i2......ik-1And b={ ik, ik+1, ik+2......i2k-1Audio power ea、eb, wherein k is step-length:
(4) judge audio power ea、ebThe absolute value of energy difference is more than the first algorithm parameter and is less than the second algorithm parameter, if
It is to represent and meet extraction conditions, subsequently into step (5), otherwise sufficient extraction conditions with thumb down, then proceed to step (6);
(5) judge the audio power e that step (3) obtainsa、ebMagnitude relationship, if ea> eb, generate the bit that is 0, and will
The bit extracting is sequentially stored into relief area, subsequently into step (6), otherwise generates the bit that is 1, and the bit that will extract
It is sequentially stored into relief area, subsequently into step (6);
(6) judge sampled point i2k-1Whether also have 2k sampled point afterwards, finish if it is, representing and not yet extracting, i is set2kFor
Starting point i of next round circulation0, it is then back to step (3), otherwise enter step (7);
(7) using the Bit String in relief area and according to following form, the data segment in relief area is unpacked, with obtain from
The user message extracting in wav format audio: 8 paragraph header identifier+16 bit checks and the+use extracted from wav format audio
+ 8 section tail identifiers of family message.
6. extracting method according to claim 5 is it is characterised in that step (7) is specifically, open from the starting point of relief area
Begin to find one section of data segment being initiated with 0xfd paragraph header identifier and 0xff section tail identifier, then will remove mark in this segment data
Data outside symbol extracts, the user message that composition extracts from wav format audio.
7. a kind of embedded system for wav audio-frequency information is it is characterised in that comprise the following steps:
First module, passes through inlet flow for receive user or the wav format audio of file stream input, this user needs to embed
Message in wav format audio, random offset number, the first algorithm parameter and the second algorithm parameter;
Second module, for the message in embedded wav format audio being needed to format process, comprises paragraph header mark to generate
Know symbol, verification and, the message needing in embedded wav format audio, the agreement section binary bits string of section tail identifier;
Three module, for by random offset number, the first algorithm parameter and the second algorithm parameter be encrypted as respectively 16,16 and
The binary bits string of 32, and arrange have been inserted into bit number be 0, arrange enumerator j=0;
4th module, for selecting to be set to adopt by first sampled point of the 64th of wav format audio the plus random offset number frame
Sampling point i0, follow-up sampled point is followed successively by { i0, i1, i2, i3, i4, i5, i6......};
5th module, for from sampled point i0Start, will often continuous k sampled point as a group, wherein k is step-length, adopts
Calculate group a={ i with below equation respectively0, i1, i2......ik-1And b={ ik, ik+1, ik+2.......i2k-1Audio frequency
Energy ea、eb:
6th module, for judging audio power ea、ebWhether the absolute value of energy difference is more than the first algorithm parameter and less than second
Algorithm parameter, if it is represents and meets embedded condition, subsequently into step the seven module, the otherwise embedded bar of foot with thumb down
Part, then proceeds to the 11st module;
7th module, is used for having been inserted into bit number from increasing 1, and enumerator j increases 1 certainly, and judges whether enumerator j is long more than data
Degree, if it is, setting j=0, and enter the 8th module, otherwise enter the 8th module;
8th module, for judging whether the binary bits string jth position that the second module obtains is 0, if yes then enter the 9th
Module, otherwise enters the tenth module;
9th module, for judging the audio power e obtaining for the 5th modulea、eb, if there is ea> ebIf then entering step
Rapid 12nd module, otherwise enters the 11st module;
Tenth module, for judging the audio power e obtaining for the 5th modulea、eb, if there is ea< ebIf then entering the
12 modules, otherwise enter the 11st module;
11st module, for exchanging the value of sampled point corresponding in group a and b one by one;
12nd module, for judging sampled point i2k-1Whether also having 2k sampled point afterwards, embedding if it is, representing to also have
The space of information, arranges i2kStarting point i for next round circulation0, it is then back to the 5th module, otherwise enter the tenth three module;
Tenth three module judges to have been inserted into the bit number whether bit number is more than agreement section in the second module, if it is, embedded
Process terminates, and points out user to embed successfully, otherwise represents embedded imperfect, points out user to need to change wav format audio.
8. a kind of extraction system for wav audio-frequency information is it is characterised in that comprise the following steps:
First module, carries close wav format audio for obtaining, using lsb steganography method to 64 frame data before wav format audio
In frame, last bit of every frame is extracted and is deciphered, using decrypt 16,16,32 data as
Random offset number, the first algorithm parameter, the second algorithm parameter;
Second module, for selecting to be set to adopt by first sampled point of the 64th of wav format audio the plus random offset number frame
Sampling point i0, follow-up sampled point is followed successively by { i0, i1, i2, i3, i4, i5, i6......};
Three module, for from sampled point i0Start, will often as a group, be divided using below equation continuous k sampled point
Ji Suan not group a={ i0, i1, i2......ik-1And b={ ik, ik+1, ik+2.......i2k-1Audio power ea、eb, its
Middle k is step-length:
4th module, for judging audio power ea、ebThe absolute value of energy difference is more than the first algorithm parameter and is less than the second algorithm
Parameter, if it is represents and meets extraction conditions, subsequently into the 5th module, otherwise sufficient extraction conditions with thumb down, Ran Houzhuan
Enter the 6th module;
5th module, for judging the audio power e that three module obtainsa、ebMagnitude relationship, if ea> eb, generating one is 0
Bit, and the bit of extraction is sequentially stored into relief area, subsequently into the 6th module, otherwise generates the bit that is 1, and
The bit of extraction is sequentially stored into relief area, subsequently into the 6th module;
6th module, for judging sampled point i2k-1Whether also have 2k sampled point afterwards, finish if it is, representing and not yet extracting,
Setting i2kStarting point i for next round circulation0, it is then back to three module, otherwise enter the 7th module;
Data segment in relief area is solved by the 7th module for using the Bit String in relief area and according to following form
Bag, to obtain the user message extracting from wav format audio: 8 paragraph header identifier+16 bit checks and+from wav format audio
+ 8 section tail identifiers of the user message of middle extraction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410261979.8A CN104123945B (en) | 2014-06-12 | 2014-06-12 | Embedding method and extracting method for wav-format audio information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410261979.8A CN104123945B (en) | 2014-06-12 | 2014-06-12 | Embedding method and extracting method for wav-format audio information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104123945A CN104123945A (en) | 2014-10-29 |
CN104123945B true CN104123945B (en) | 2017-01-18 |
Family
ID=51769333
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410261979.8A Active CN104123945B (en) | 2014-06-12 | 2014-06-12 | Embedding method and extracting method for wav-format audio information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104123945B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106161021B (en) * | 2015-03-30 | 2020-03-20 | 重庆邮电大学 | Private data sending method and device and private data receiving method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6571144B1 (en) * | 1999-10-20 | 2003-05-27 | Intel Corporation | System for providing a digital watermark in an audio signal |
CN102737639A (en) * | 2012-07-13 | 2012-10-17 | 北京理工大学 | Safety communication method for voice information |
CN102905134A (en) * | 2012-10-22 | 2013-01-30 | 山东省计算中心 | Adaptive video digital steganography method |
CN103731654A (en) * | 2013-12-23 | 2014-04-16 | 华中科技大学 | Information embedding system and information extracting system using 2D/3D videos |
-
2014
- 2014-06-12 CN CN201410261979.8A patent/CN104123945B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6571144B1 (en) * | 1999-10-20 | 2003-05-27 | Intel Corporation | System for providing a digital watermark in an audio signal |
CN102737639A (en) * | 2012-07-13 | 2012-10-17 | 北京理工大学 | Safety communication method for voice information |
CN102905134A (en) * | 2012-10-22 | 2013-01-30 | 山东省计算中心 | Adaptive video digital steganography method |
CN103731654A (en) * | 2013-12-23 | 2014-04-16 | 华中科技大学 | Information embedding system and information extracting system using 2D/3D videos |
Non-Patent Citations (10)
Title |
---|
"A blind audio watermarking algorithm with self-synchronization";Huang J W, Wang Y, and Shi Y Q;《Proceedings of IEEE International Symposium on Circuits and System》;20021231;全文 * |
"An adaptive audio watermarking based on the singular value decomposition in the wavelet domain";Bhat K V, Sengupta I;《A Review Journal of Digital Signal Processing》;20101231;全文 * |
"Covert Communication Audio Watermarking Algorithm Based on LSB";Yin Xiong, Zhang Xiaoming.;《10th International Conference on Communication Technology》;20061231;全文 * |
"一种改进的LSB音频信息隐藏算法";倪明等;《电脑知识与技术》;20081231;第4卷(第4期);全文 * |
"一种新的信息隐藏算法的设计研究";特列克别克米沙;《中国优秀硕士学位论文全文数据库信息科技辑》;20130115(第01期);全文 * |
"一种用音频作载体的信息隐藏算法";李跃强等;《计算机应用研究》;20051231(第5期);全文 * |
"信息隐藏技术及其在WAV文件中的实现";李曦;《中国优秀硕士学位论文全文数据库信息科技辑》;20090215(第02期);全文 * |
"写与隐写分析算法及实践研究";陈铭;《中国博士学位论文全文数据库信息科技辑》;20081015(第10期);全文 * |
"压缩域音频隐写与隐写分析中若干问题的研究";严迪群;《中国博士学位论文全文数据库信息科技辑》;20130615(第06期);全文 * |
"强鲁棒的数字音频信息隐藏技术及安全性研究";刘冉;《中国优秀硕士学位论文全文数据库信息科技辑》;20120115(第01期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN104123945A (en) | 2014-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | A chaotic image encryption algorithm based on perceptron model | |
CN107147488A (en) | A kind of signature sign test system and method based on SM2 enciphering and deciphering algorithms | |
Wang et al. | Centroid-based semi-fragile audio watermarking in hybrid domain | |
Abood et al. | Audio steganography with enhanced LSB method for securing encrypted text with bit cycling | |
CN110390191A (en) | Method and system for safe biologic identification verifying | |
CN101882296A (en) | Method for hiding Chebyshev neural network chaotic digital watermark information | |
CN103259662A (en) | Novel procuration signature and verification method based on integer factorization problems | |
CN102117476B (en) | Signature watermark system used for CAD (Computer-Aided Design) documents | |
CN102915740B (en) | Phonetic empathy Hash content authentication method capable of implementing tamper localization | |
Anwar et al. | Stegocrypt scheme using LSB-AES base64 | |
CN104852914A (en) | Watermark hopping communication method based on data packet interval | |
CN104269175B (en) | A kind of ip voice steganography method matched based on Best similarity degree | |
Abduljaleel et al. | Hiding text in speech signal using K-means, LSB techniques and chaotic maps. | |
Sari et al. | Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security | |
CN104123945B (en) | Embedding method and extracting method for wav-format audio information | |
CN109981246A (en) | A kind of encryption method and decryption method of character string | |
CN102737639A (en) | Safety communication method for voice information | |
CN103731654B (en) | A kind of information insertion system and information extracting system using 2D/3D video | |
CN104159118A (en) | Image byte XOR algorithm based on pseudo random sequence and LSB algorithm | |
CN104363089B (en) | A kind of method that fuzzy vault is realized based on geographical location information | |
Srivastava et al. | Design and implementation of crypto based water marking techniques for EHR security | |
CN111371727A (en) | Detection method for NTP protocol covert communication | |
CN112398861B (en) | Encryption system and method for sensitive data in web configuration system | |
CN101364868B (en) | Pseudo-noise code generator based on broad sense information field and generating method thereof | |
Xiao et al. | Copyright protection in wireless sensor networks by watermarking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |