CN110111799A - A kind of safe steganography method of AMR fixed codebook based on distribution of pulses model - Google Patents

A kind of safe steganography method of AMR fixed codebook based on distribution of pulses model Download PDF

Info

Publication number
CN110111799A
CN110111799A CN201910347984.3A CN201910347984A CN110111799A CN 110111799 A CN110111799 A CN 110111799A CN 201910347984 A CN201910347984 A CN 201910347984A CN 110111799 A CN110111799 A CN 110111799A
Authority
CN
China
Prior art keywords
tag
information
mask
distribution
track
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910347984.3A
Other languages
Chinese (zh)
Other versions
CN110111799B (en
Inventor
任延珍
杨瀚溢
吴红霞
王丽娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University WHU
Original Assignee
Wuhan University WHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University WHU filed Critical Wuhan University WHU
Priority to CN201910347984.3A priority Critical patent/CN110111799B/en
Publication of CN110111799A publication Critical patent/CN110111799A/en
Application granted granted Critical
Publication of CN110111799B publication Critical patent/CN110111799B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/018Audio watermarking, i.e. embedding inaudible data in the audio signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Abstract

The invention discloses a kind of safe steganography method of AMR fixed codebook based on distribution of pulses model, the present invention analyzes pulse distribution character in cover audio, in conjunction with AMR fixed codebook coding principle, secret information is pre-processed in insertion, embedding information is divided into original private information and mark information.According to making the smallest principle of distribution of pulses characteristic changing design corresponding embedding method, keep the identical probability of pulse position on same track constant, while distribution is more random, to keep the audio after steganography close with original audio in distribution of pulses.Advantage of the invention is that good concealment and anti-steganalysis ability is strong.

Description

A kind of safe steganography method of AMR fixed codebook based on distribution of pulses model
Technical field
The invention belongs to multimedia content security technology area, be related to it is a kind of towards AMR fixed codebook steganography method, In particular to a kind of safe steganography method of AMR fixed codebook based on distribution of pulses model.
Technical background
Currently, the fast development of development of Mobile Internet technology and various audios and voice conversation service are in mobile Internet Universal and application, various compacted voice files be shared and distribute on the internet, provided for Information hiding abundant hidden Write space.Meanwhile traditional constant speed rate speech-encoded format cannot meet voice quality simultaneously and occupy less network The requirement of bandwidth for transmission voice.AMR (Adaptive Multi-Rate Codec, adaptive multi-rate coding) is by 3GPP group Specified Speech Coding Standards are knitted, AMR is widely used in GSM, TDMA, UMTS and VOLTE at present, while being also widely applied In various cell phone terminal systems, such as iPhone, Samsung, Nokia etc..In addition, the mobile terminal Instant Messenger of some mainstreams Software, such as QQ are interrogated, wechat etc. also all supports AMR coded format.
While AMR is widely adopted, new carrier abundant is also provided for secret communication.Currently, being compressed towards AMR The steganography scheme of audio continuously emerges, these schemes are embedded in secret information by modification coder parameters in an encoding process.Base There are three feasible embedded domain in Algebraic Code Excited Linear Prediction principle, AMR compressed encoding, these three embedded domain are respectively as follows: Fixed codebook, linear predictor coefficient and pitch period.These three embedded domain provide a large amount of redundancy for AMR steganography, existing Steganographic algorithm exactly carries out secret information insertion using these redundancies.The wherein key component as AMR fixed codebook, arteries and veins It rushes location parameter coding bit number used ratio shared in every frame and is higher than 30%, be that concealed space is most in AMR compression domain Big embedded domain.
According to the search principle of AMR fixed codebook, there is very big steganography space in AMR fixed codebook, existing to be based on AMR There are probelem in two aspects for the steganographic algorithm of fixed codebook, firstly, they, which do not account for insertion in steganography, modifies introduced system Count the exception of feature.Existing steganalysis algorithm is exactly analyzed using these exception informations, and preferable detection property is reached Energy.Secondly, they do not consider the basic principle of AMR coding in steganography, therefore steganography causes the sharp fall of voice quality, In the case where low bit- rate, voice quality decline is become apparent from.
AMR coding is the mixing voice compression coding technology based on ACELP, in order to improve synthetic speech quality, according to sound The tract characteristics in source and the adaptive selection coding mode of the channel quality AMR encoder for being used for transmission signal.Based on synthesis language Sound and the smallest principle of the weighted mean square error of raw tone, AMR is when encoding raw tone, respectively from adaptive code The best codebook vectors for replacing residual signals are searched in this and fixed codebook, after carrying out quantization encoding to these codebook vectors It is sent to decoding end, decoding end can recover the synthesis voice close with raw tone according to the parameter received.Fig. 1 is AMR coding principle schematic diagram.AMR cataloged procedure mainly includes four parts, pretreatment, LP (Linear Predictive, LP) line Property prediction, fixed codebook search and adaptive codebook search (also known as pitch period search).It is carried out as unit of coding Shi Yiyi frame Coding, input is 8kHz sample rate, the uncompressed linear PCM speech stream of 16 bit quantizations, in AMR coded format, every frame language Sound duration 20ms includes that 160 sampled points are divided into 4 subframes in every frame as unit of 5ms.
Summary of the invention:
The present invention is directed to the unsafe problem of existing AMR fixed codebook domain steganographic algorithm, provides a kind of based on pulse point The safe steganography method of AMR fixed codebook of cloth model.
The technical scheme adopted by the invention is that: a kind of safe steganography side of AMR fixed codebook based on distribution of pulses model Method, which comprises the following steps:
Step 1: determining embedding method;
Wherein: t, 0≤t≤4 indicate orbital number, itAnd it+5Indicate two non-zero pulses positions in track t,Table Show and x be rounded downwards,Indicate step-by-step xor operation, mtIndicate the 3 bit secret informations that be embedded in track t;
Two non-zero pulses position i in track t are first determined whether when insertiontAnd it+5It is whether identical, if it=it+5, then should Without steganography in track, otherwise according to the secret information m of insertiontIt is embedded in two kinds of situation:
1) the candidate impulse index for writing sufficient equation (1) all over is k, if k ≠ it/ 5, then directly using k*5+t as second Non-zero pulses it+5Position;
If 2) k=it/ 5, then do not change the position of second non-zero pulses;
Step 2: secret information processing, including secret information pretreatment, coding and randomization;
The pretreatment is that encryption and compression processing are carried out to secret information;
The coding is denoted as msg using every 3 bit secret information as a pretreatment unit, while using 1 bit mark Note position tag is that each 3 bit secret information is marked, and marks whether the information is 0, if msg=0, corresponding label Position tag=0, otherwise, tag=1;
The randomization, the processing being randomized by mask to tag, process are as shown in formula 2:
Wherein, tagmaskFor the mark information after mask, mask is 3 bit-masks;If Ptag,Pmask,Respectively 3 The probability distribution of mark information after bit labeling information, mask and mask;Occur in order not to change identical pulse in same track Probability, while making tagmaskDistribution it is sufficiently random, qualifications shown in formula 3 should be met:
By constructing the probability distribution of mask, equation shown in formula 4 is solved, tag is mademaskMeet the condition of formula 3;Wherein 0 ≤ i, j≤7, PmaskTo need the probability distribution solved;PtagValue are as follows: work as tag=000, when, Ptag=1/512;Work as tag =001, when, Ptag=7/512;Work as tag=010, when, Ptag=7/512;Work as tag=011, when, Ptag=49/512;Work as tag =100, when, Ptag=7/512;Work as tag=101, when, Ptag=49/512;Work as tag=110, when, Ptag=49/512;Work as tag =111, when, Ptag=343/512;
Solving PmaskAfterwards, that is, random mask code sequence is produced, original marking information tag is carried out at randomization Reason;
Step 3: by treated, secret information is embedded among the pulse position of audio.
Compared with the existing technology, the present invention by analysis AMR voice fixed codebook distribution character, design insertion process with Test code at random, to guarantee steganography after AMR voice distribution and raw tone distribution it is close.Therefore steganalysis calculation is being resisted When method, the voice that the present invention generates is difficult to be detected, to substantially increase safety.
Detailed description of the invention
Fig. 1 is AMR speech coding principles figure in background technique;
Fig. 2 is the flow chart of the embodiment of the present invention;
Fig. 3 is secret information coded treatment flow chart in the embodiment of the present invention;
Fig. 4 is random mask sequence product process figure in the embodiment of the present invention;
Fig. 5 is that secret information extracts flow chart in the embodiment of the present invention.
Specific embodiment
Understand for the ease of those of ordinary skill in the art and implement the present invention, with reference to the accompanying drawings and embodiments to this hair It is bright to be described in further detail, it should be understood that implementation example described herein is merely to illustrate and explain the present invention, not For limiting the present invention.
Referring to Fig.1, a kind of safe steganography method of AMR fixed codebook based on distribution of pulses model provided by the invention, packet Include following steps:
Step 1: determining embedding method;
Wherein: t, 0≤t≤4 indicate orbital number, itAnd it+5Indicate two non-zero pulses positions in track t,Table Show and x be rounded downwards,Indicate step-by-step xor operation, mtIndicate the 3 bit secret informations that be embedded in track t;
Two non-zero pulses position i in track t are first determined whether when insertiontAnd it+5It is whether identical, if it=it+5, then should Without steganography in track, otherwise according to the secret information m of insertiontIt is embedded in two kinds of situation:
1) the candidate impulse index for writing sufficient equation (1) all over is k, if k ≠ it/ 5, then directly using k*5+t as second Non-zero pulses it+5Position;
If 2) k=it/ 5, then do not change the position of second non-zero pulses;
Step 2: secret information processing improves safety for guaranteeing that telescopiny does not destroy the distribution of pulses of original audio Property.Including secret information pretreatment, coding and randomization;
Pretreatment such as is encrypted to secret information and is compressed at the processing, keeps secret information distribution more random, algorithm is more Safety.
Coding, according to the principle and embedding method of step-by-step xor operation, if the secret information msg to be embedded int=0, be The probability for guaranteeing that identical pulse position occurs on unified track is constant, then does not modify second pulse position.In order to correctly mention Secret information in this case is taken, needs to make coded treatment to original private information in advance.Using every 3 bit secret information as One pretreatment unit is denoted as msg, while the use of 1 bit labeling position tag being that each 3 bit secret information is marked, and marks Whether the information is 0, if msg=0, corresponding marker bit tag=0, otherwise, tag=1;Coding process such as Fig. 3 institute Show;
Randomization, in order to guarantee the correct extraction of secret information, the mark information tag after coding will be single with every 3 bit Member is embedded into audio track.However the distribution of every 3 bit tag and uneven, probability distribution is as shown in table 1.Therefore letter The original distribution of pulses of audio will be destroyed by singly being embedded in, it is therefore desirable to the processing being randomized by mask to tag, process It is as shown in formula 2:
Wherein, tagmaskFor the mark information after mask, mask is 3 bit-masks;If Ptag,Pmask,Respectively 3 The probability distribution of mark information after bit labeling information, mask and mask;Occur in order not to change identical pulse in same track Probability, while making tagmaskDistribution it is sufficiently random, qualifications shown in formula 3 should be met:
By constructing the probability distribution of mask, equation shown in formula 4 is solved, tag is mademaskMeet the condition of formula 3;Wherein 0 ≤ i, j≤7, PmaskTo need the probability distribution solved;PtagAs shown in table 1;
The probability distribution of 1 three bit labeling information tag of table
tag 000 001 010 011 100 101 110 111
Ptag 1/512 7/512 7/512 49/512 7/512 49/512 49/512 343/512
Solving PmaskAfterwards, that is, random mask code sequence is produced, original marking information tag is carried out at randomization Reason;
The process for generating mask code sequence is as shown in Figure 4;First according to PmaskThe mask code sequence that length is N is generated, further according to The key key of user oneself selection carries out out-of-order processing to it.
Step 3: by treated, secret information is embedded among the pulse position of audio;
See Fig. 5, the specific implementation of step 3 includes following sub-step:
Step 3.1: by treated, secret information is divided into original private information and mark information;
Step 3.2: when to AMR voice framing code, fixed codebook search obtains two non-zero pulses positions in each track t Set itAnd it+5
Step 3.3: being embedded according to the type of embedding information and corresponding embedding method;
If embedding information is original private information, need to judge whether two pulse positions are equal in track t;If it=it+5, then skip the track and go to next track t+1, go to step 3.2;If it≠it+5, then according to original private information Embedding method is embedded in;
If embedding information is mark information, do not need to judge whether two pulse positions are equal in track t, direct root It is embedded according to embedding method;
Step 3.4: encoding, and be embedded in by step 3.3 frame by frame, until terminating.
For the present embodiment in decoding, every 8 group information (every group includes 3 bit informations) is one group and is decoded that process is as follows:
Step 1: decoding audio obtains two non-zero pulses positions in each track;
Step 2: secret information and mark information so being extracted according to secret information and the embedding method of mark information;
Step 3: secret information is corrected according to mark information;
Step 4: revised secret information being decrypted, original private information is obtained.
The present invention analyzes pulse distribution character in cover audio, in conjunction with AMR fixed codebook coding principle, in insertion pair Secret information is pre-processed, and embedding information is divided into original private information and mark information.According to changing distribution of pulses characteristic Become the smallest principle and design corresponding embedding method, keep the identical probability of pulse position on same track constant, at the same be distributed compared with To be random, to keep the audio after steganography close with original audio in distribution of pulses.The advantage of this algorithm is good concealment And anti-steganalysis ability is strong.
It should be understood that the part that this specification does not elaborate belongs to the prior art.
It should be understood that the above-mentioned description for preferred embodiment is more detailed, can not therefore be considered to this The limitation of invention patent protection range, those skilled in the art under the inspiration of the present invention, are not departing from power of the present invention Benefit requires to make replacement or deformation under protected ambit, fall within the scope of protection of the present invention, this hair It is bright range is claimed to be determined by the appended claims.

Claims (4)

1. a kind of safe steganography method of AMR fixed codebook based on distribution of pulses model, which comprises the following steps:
Step 1: determining embedding method;
Wherein: t, 0≤t≤4 indicate orbital number, itAnd it+5Indicate two non-zero pulses positions in track t,It indicates to x It is rounded downwards,Indicate step-by-step xor operation, mtIndicate the 3 bit secret informations that be embedded in track t;
Two non-zero pulses position i in track t are first determined whether when insertiontAnd it+5It is whether identical, if it=it+5, then the track In without steganography, otherwise according to the secret information m of insertiontIt is embedded in two kinds of situation:
1) the candidate impulse index for writing sufficient equation (1) all over is k, if k ≠ it/ 5, then directly using k*5+t as second non-zero arteries and veins Rush it+5Position;
If 2) k=it/ 5, then do not change the position of second non-zero pulses;
Step 2: secret information processing, including secret information pretreatment, coding and randomization;
The pretreatment is that encryption and compression processing are carried out to secret information;
The coding is denoted as msg using every 3 bit secret information as a pretreatment unit, while using 1 bit labeling position Tag is that each 3 bit secret information is marked, and marks whether the information is 0, if msg=0, corresponding marker bit tag =0, otherwise, tag=1;
The randomization, the processing being randomized by mask to tag, process are as shown in formula 2:
Wherein, tagmaskFor the mark information after mask, mask is 3 bit-masks;If Ptag,Pmask,Respectively 3 bits The probability distribution of mark information after mark information, mask and mask;In order not to change identical pulse in same track occur it is general Rate, while making tagmaskDistribution it is sufficiently random, qualifications shown in formula 3 should be met:
By constructing the probability distribution of mask, equation shown in formula 4 is solved, tag is mademaskMeet the condition of formula 3;Wherein 0≤i, j ≤ 7, PmaskTo need the probability distribution solved;PtagValue are as follows: work as tag=000, when, Ptag=1/512;Work as tag=001, When, Ptag=7/512;Work as tag=010, when, Ptag=7/512;Work as tag=011, when, Ptag=49/512;Work as tag=100, When, Ptag=7/512;Work as tag=101, when, Ptag=49/512;Work as tag=110, when, Ptag=49/512;Work as tag=111, When, Ptag=343/512;
Solving PmaskAfterwards, that is, random mask code sequence is produced, randomization is carried out to original marking information tag;
Step 3: by treated, secret information is embedded among the pulse position of audio.
2. the AMR fixed codebook safe steganography method according to claim 1 based on distribution of pulses model, feature exist In generating random mask code sequence described in step 2, specific implementation process is: first according to PmaskGenerate the mask that length is N Sequence carries out out-of-order processing to it further according to the key key of user oneself selection.
3. the AMR fixed codebook safe steganography method according to claim 1 based on distribution of pulses model, feature exist In the specific implementation of step 3 includes following sub-step:
Step 3.1: by treated, secret information is divided into original private information and mark information;
Step 3.2: when to AMR voice framing code, fixed codebook search obtains two non-zero pulses position i in each track tt And it+5
Step 3.3: being embedded according to the type of embedding information and corresponding embedding method;
If embedding information is original private information, need to judge whether two pulse positions are equal in track t;If it= it+5, then skip the track and go to next track t+1, go to step 3.2;If it≠it+5, then embedding according to original private information Enter rule to be embedded in;
If embedding information is mark information, do not need to judge whether two pulse positions are equal in track t, directly according to embedding Enter rule to be embedded in;
Step 3.4: encoding, and be embedded in by step 3.3 frame by frame, until terminating.
4. the safe steganography method of AMR fixed codebook based on distribution of pulses model according to claim 1 to 3, It is characterized by: every 8 group information is one group and is decoded when decoding, every group includes 3 bit informations;Decoding process includes following Sub-step:
Step 4.1: decoding audio obtains two non-zero pulses positions in each track;
Step 4.2: secret information and mark information are extracted according to secret information and the embedding method of mark information;
Step 4.3: secret information is corrected according to mark information;
Step 4.4: revised secret information being decrypted, original private information is obtained.
CN201910347984.3A 2019-04-28 2019-04-28 AMR fixed codebook security steganography method based on pulse distribution model Active CN110111799B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910347984.3A CN110111799B (en) 2019-04-28 2019-04-28 AMR fixed codebook security steganography method based on pulse distribution model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910347984.3A CN110111799B (en) 2019-04-28 2019-04-28 AMR fixed codebook security steganography method based on pulse distribution model

Publications (2)

Publication Number Publication Date
CN110111799A true CN110111799A (en) 2019-08-09
CN110111799B CN110111799B (en) 2021-02-19

Family

ID=67487166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910347984.3A Active CN110111799B (en) 2019-04-28 2019-04-28 AMR fixed codebook security steganography method based on pulse distribution model

Country Status (1)

Country Link
CN (1) CN110111799B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1708907A (en) * 2002-10-25 2005-12-14 达丽星网络有限公司 Method and apparatus for fast CELP parameter mapping
US7231271B2 (en) * 2004-01-21 2007-06-12 The United States Of America As Represented By The Secretary Of The Air Force Steganographic method for covert audio communications
CN106101714A (en) * 2016-07-14 2016-11-09 中国科学院信息工程研究所 One and the tightly coupled H.264 video information hiding method of compression encoding process
CN107564536A (en) * 2017-09-06 2018-01-09 武汉大学 AMR pitch delay steganalysis methods based on difference Markov transition probability features in pitch delay subframe group group
CN107689226A (en) * 2017-08-29 2018-02-13 中国民航大学 A kind of low capacity Methods of Speech Information Hiding based on iLBC codings

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1708907A (en) * 2002-10-25 2005-12-14 达丽星网络有限公司 Method and apparatus for fast CELP parameter mapping
US7231271B2 (en) * 2004-01-21 2007-06-12 The United States Of America As Represented By The Secretary Of The Air Force Steganographic method for covert audio communications
CN106101714A (en) * 2016-07-14 2016-11-09 中国科学院信息工程研究所 One and the tightly coupled H.264 video information hiding method of compression encoding process
CN107689226A (en) * 2017-08-29 2018-02-13 中国民航大学 A kind of low capacity Methods of Speech Information Hiding based on iLBC codings
CN107564536A (en) * 2017-09-06 2018-01-09 武汉大学 AMR pitch delay steganalysis methods based on difference Markov transition probability features in pitch delay subframe group group

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
YANZHEN REN .ETAL: "An AMR adaptive steganography algorithm based on minimizing distortion", 《MULTIMED TOOLS APPL》 *
任延珍: "基于基音延迟组内相关性的AMR隐写分析算法", 《华南理工大学学报(自然科学版)》 *
王丽娜: "面向JPEG图像的隐写分析盲检测方法", 《武汉大学学报(理学版)》 *

Also Published As

Publication number Publication date
CN110111799B (en) 2021-02-19

Similar Documents

Publication Publication Date Title
CN103299366B (en) Devices for encoding and detecting a watermarked signal
Tian et al. Improving security of quantization-index-modulation steganography in low bit-rate speech streams
Wu et al. An approach of steganography in G. 729 bitstream based on matrix coding and interleaving
Ren et al. AMR steganalysis based on the probability of same pulse position
US8412519B2 (en) Steganography in digital signal encoders
CN103299365B (en) Devices for adaptively encoding and decoding a watermarked signal
CN102057424A (en) Method and apparatus for error concealment of encoded audio data
CN101764666B (en) Speech encryption method and device and decryption method and device
KR101279857B1 (en) Adaptive multi rate codec mode decoding method and apparatus thereof
Tian et al. Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs
Ren et al. A secure AMR fixed codebook steganographic scheme based on pulse distribution model
Kheddar et al. High capacity speech steganography for the G723. 1 coder based on quantised line spectral pairs interpolation and CNN auto-encoding
CN103002406B (en) A kind of voice encryption method being applied to arrowband radio digital communication system
Zhang et al. An enhanced steganographic code and its application in voice-over-IP steganography
Tian et al. Detecting bitrate modulation-based covert voice-over-IP communication
de Andrade et al. Speech privacy for modern mobile communication systems
CN107689226A (en) A kind of low capacity Methods of Speech Information Hiding based on iLBC codings
Deepikaa et al. VoIP steganography methods, a survey
Wu Information hiding in speech signals for secure communication
Kazemi et al. Data hiding robust to mobile communication vocoders
Özkan et al. Data transmission via GSM voice channel for end to end security
CN110111799A (en) A kind of safe steganography method of AMR fixed codebook based on distribution of pulses model
Ambika et al. Secure Speech Communication–A Review
US7684980B2 (en) Information flow transmission method whereby said flow is inserted into a speech data flow, and parametric codec used to implement same
CN107545899A (en) A kind of AMR steganography methods based on voiceless sound pitch delay jittering characteristic

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant