首页 | 本学科首页   官方微博 | 高级检索  
     检索      

IP语音隐写及隐写分析研究
引用本文:刘小康,田晖,刘杰,卢璥.IP语音隐写及隐写分析研究[J].重庆邮电大学学报(自然科学版),2019,31(3):407-419.
作者姓名:刘小康  田晖  刘杰  卢璥
作者单位:华侨大学 计算机科学与技术学院,厦门,361021;华侨大学 计算机科学与技术学院,厦门,361021;华侨大学 计算机科学与技术学院,厦门,361021;华侨大学 计算机科学与技术学院,厦门,361021
基金项目:国家自然科学基金 (U1536115, U1405254 );福建省高校新世纪优秀人才支持计划(MJK2016-23);福建省高校杰出青年科研人才培育计划(MJK2015-54);福建省自然科学基金(2018J01093)
摘    要:随着IP语音(voice over IP, VoIP) 的快速发展,基于VoIP的隐写及其隐写分析逐渐成为信息安全领域的研究热点。总结和分析了近年来的IP语音隐写和隐写分析相关研究,并探讨该领域未来的研究方向。IP语音隐写根据其隐藏信息位置不同,可分为基于协议的隐写及分析和基于语音载荷的隐写及分析。前者是利用IP语音中的各类协议为载体,将信息嵌入到协议头部中的某些字段或通过调制IP语音包的时序来实现;后者则是通过修改语音载荷实现信息隐藏,包括基于最低有效位(least significant bit, LSB)的隐写,基于量化索引调制(quantized index modulation, QIM)的隐写和基于语音变化域回声等隐写。从协议和语音载荷两方面对IP语音分析技术进行了分类介绍。前者可分为协议头分析、时间序列分析、编码调制分析3类。后者包括基于特点语音参数(如线性预测参数、固定码本参数、自适应码本参数和所有参数)的隐写分析和基于语音信号处理的隐写分析方法。

关 键 词:IP语音  隐写  隐写分析  低速率语音编码
收稿时间:2018/11/12 0:00:00
修稿时间:2019/4/10 0:00:00

Survey for voice-over-IP steganography and steganalysis
LIU Xiaokang,TIAN Hui,LIU Jie and LU Jing.Survey for voice-over-IP steganography and steganalysis[J].Journal of Chongqing University of Posts and Telecommunications,2019,31(3):407-419.
Authors:LIU Xiaokang  TIAN Hui  LIU Jie and LU Jing
Institution:College of Computer Science and Technology, Huaqiao University, Xiamen 361021, P.R. China,College of Computer Science and Technology, Huaqiao University, Xiamen 361021, P.R. China,College of Computer Science and Technology, Huaqiao University, Xiamen 361021, P.R. China and College of Computer Science and Technology, Huaqiao University, Xiamen 361021, P.R. China
Abstract:With the rapid development of internet protocol voice, voice over internet protocol (VoIP)-based steganography and steganalysis have grown as a hot research topic in the field of information security in recent years. This paper summarizes and analyzes the recent researches on IP voice steganography and steganalysis, and discusses the future research directions in this field. According to the location of the hidden information, IP voice steganography can be divided into protocol-based steganography and steganalysis, and voice payload-based steganography and steganalysis. The former is realized by embedding secret information into free or redundant areas of the protocol header or modulating the timing of IP voice packets with various protocols as carriers. The latter can hide secret information by modifying the voice payload, which can be divided into two categories, including steganography based on least significant bit (LSB) and steganography based on quantized index modulation (QIM). Correspondingly, the steganalysis of VoIP is classified into two aspects: the protocol-based steganography can be divided into three categories: protocol head analysis, time series analysis, and coded modulation analysis. The payload-based steganography includes steganalysis based on characteristic speech parameters (such as linear prediction parameters, fixed codebook parameters, adaptive codebook parameters, and other parameters) and steganalysis based on speech signal processing.
Keywords:voice over internet protocol  steganography  steganalysis  low bit rate speech coding
本文献已被 万方数据 等数据库收录!
点击此处可从《重庆邮电大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《重庆邮电大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号