CN110111799A - A kind of safe steganography method of AMR fixed codebook based on distribution of pulses model - Google Patents
A kind of safe steganography method of AMR fixed codebook based on distribution of pulses model Download PDFInfo
- Publication number
- CN110111799A CN110111799A CN201910347984.3A CN201910347984A CN110111799A CN 110111799 A CN110111799 A CN 110111799A CN 201910347984 A CN201910347984 A CN 201910347984A CN 110111799 A CN110111799 A CN 110111799A
- Authority
- CN
- China
- Prior art keywords
- tag
- information
- mask
- distribution
- track
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
- G10L19/018—Audio watermarking, i.e. embedding inaudible data in the audio signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Abstract
The invention discloses a kind of safe steganography method of AMR fixed codebook based on distribution of pulses model, the present invention analyzes pulse distribution character in cover audio, in conjunction with AMR fixed codebook coding principle, secret information is pre-processed in insertion, embedding information is divided into original private information and mark information.According to making the smallest principle of distribution of pulses characteristic changing design corresponding embedding method, keep the identical probability of pulse position on same track constant, while distribution is more random, to keep the audio after steganography close with original audio in distribution of pulses.Advantage of the invention is that good concealment and anti-steganalysis ability is strong.
Description
Technical field
The invention belongs to multimedia content security technology area, be related to it is a kind of towards AMR fixed codebook steganography method,
In particular to a kind of safe steganography method of AMR fixed codebook based on distribution of pulses model.
Technical background
Currently, the fast development of development of Mobile Internet technology and various audios and voice conversation service are in mobile Internet
Universal and application, various compacted voice files be shared and distribute on the internet, provided for Information hiding abundant hidden
Write space.Meanwhile traditional constant speed rate speech-encoded format cannot meet voice quality simultaneously and occupy less network
The requirement of bandwidth for transmission voice.AMR (Adaptive Multi-Rate Codec, adaptive multi-rate coding) is by 3GPP group
Specified Speech Coding Standards are knitted, AMR is widely used in GSM, TDMA, UMTS and VOLTE at present, while being also widely applied
In various cell phone terminal systems, such as iPhone, Samsung, Nokia etc..In addition, the mobile terminal Instant Messenger of some mainstreams
Software, such as QQ are interrogated, wechat etc. also all supports AMR coded format.
While AMR is widely adopted, new carrier abundant is also provided for secret communication.Currently, being compressed towards AMR
The steganography scheme of audio continuously emerges, these schemes are embedded in secret information by modification coder parameters in an encoding process.Base
There are three feasible embedded domain in Algebraic Code Excited Linear Prediction principle, AMR compressed encoding, these three embedded domain are respectively as follows:
Fixed codebook, linear predictor coefficient and pitch period.These three embedded domain provide a large amount of redundancy for AMR steganography, existing
Steganographic algorithm exactly carries out secret information insertion using these redundancies.The wherein key component as AMR fixed codebook, arteries and veins
It rushes location parameter coding bit number used ratio shared in every frame and is higher than 30%, be that concealed space is most in AMR compression domain
Big embedded domain.
According to the search principle of AMR fixed codebook, there is very big steganography space in AMR fixed codebook, existing to be based on AMR
There are probelem in two aspects for the steganographic algorithm of fixed codebook, firstly, they, which do not account for insertion in steganography, modifies introduced system
Count the exception of feature.Existing steganalysis algorithm is exactly analyzed using these exception informations, and preferable detection property is reached
Energy.Secondly, they do not consider the basic principle of AMR coding in steganography, therefore steganography causes the sharp fall of voice quality,
In the case where low bit- rate, voice quality decline is become apparent from.
AMR coding is the mixing voice compression coding technology based on ACELP, in order to improve synthetic speech quality, according to sound
The tract characteristics in source and the adaptive selection coding mode of the channel quality AMR encoder for being used for transmission signal.Based on synthesis language
Sound and the smallest principle of the weighted mean square error of raw tone, AMR is when encoding raw tone, respectively from adaptive code
The best codebook vectors for replacing residual signals are searched in this and fixed codebook, after carrying out quantization encoding to these codebook vectors
It is sent to decoding end, decoding end can recover the synthesis voice close with raw tone according to the parameter received.Fig. 1 is
AMR coding principle schematic diagram.AMR cataloged procedure mainly includes four parts, pretreatment, LP (Linear Predictive, LP) line
Property prediction, fixed codebook search and adaptive codebook search (also known as pitch period search).It is carried out as unit of coding Shi Yiyi frame
Coding, input is 8kHz sample rate, the uncompressed linear PCM speech stream of 16 bit quantizations, in AMR coded format, every frame language
Sound duration 20ms includes that 160 sampled points are divided into 4 subframes in every frame as unit of 5ms.
Summary of the invention:
The present invention is directed to the unsafe problem of existing AMR fixed codebook domain steganographic algorithm, provides a kind of based on pulse point
The safe steganography method of AMR fixed codebook of cloth model.
The technical scheme adopted by the invention is that: a kind of safe steganography side of AMR fixed codebook based on distribution of pulses model
Method, which comprises the following steps:
Step 1: determining embedding method;
Wherein: t, 0≤t≤4 indicate orbital number, itAnd it+5Indicate two non-zero pulses positions in track t,Table
Show and x be rounded downwards,Indicate step-by-step xor operation, mtIndicate the 3 bit secret informations that be embedded in track t;
Two non-zero pulses position i in track t are first determined whether when insertiontAnd it+5It is whether identical, if it=it+5, then should
Without steganography in track, otherwise according to the secret information m of insertiontIt is embedded in two kinds of situation:
1) the candidate impulse index for writing sufficient equation (1) all over is k, if k ≠ it/ 5, then directly using k*5+t as second
Non-zero pulses it+5Position;
If 2) k=it/ 5, then do not change the position of second non-zero pulses;
Step 2: secret information processing, including secret information pretreatment, coding and randomization;
The pretreatment is that encryption and compression processing are carried out to secret information;
The coding is denoted as msg using every 3 bit secret information as a pretreatment unit, while using 1 bit mark
Note position tag is that each 3 bit secret information is marked, and marks whether the information is 0, if msg=0, corresponding label
Position tag=0, otherwise, tag=1;
The randomization, the processing being randomized by mask to tag, process are as shown in formula 2:
Wherein, tagmaskFor the mark information after mask, mask is 3 bit-masks;If Ptag,Pmask,Respectively 3
The probability distribution of mark information after bit labeling information, mask and mask;Occur in order not to change identical pulse in same track
Probability, while making tagmaskDistribution it is sufficiently random, qualifications shown in formula 3 should be met:
By constructing the probability distribution of mask, equation shown in formula 4 is solved, tag is mademaskMeet the condition of formula 3;Wherein 0
≤ i, j≤7, PmaskTo need the probability distribution solved;PtagValue are as follows: work as tag=000, when, Ptag=1/512;Work as tag
=001, when, Ptag=7/512;Work as tag=010, when, Ptag=7/512;Work as tag=011, when, Ptag=49/512;Work as tag
=100, when, Ptag=7/512;Work as tag=101, when, Ptag=49/512;Work as tag=110, when, Ptag=49/512;Work as tag
=111, when, Ptag=343/512;
Solving PmaskAfterwards, that is, random mask code sequence is produced, original marking information tag is carried out at randomization
Reason;
Step 3: by treated, secret information is embedded among the pulse position of audio.
Compared with the existing technology, the present invention by analysis AMR voice fixed codebook distribution character, design insertion process with
Test code at random, to guarantee steganography after AMR voice distribution and raw tone distribution it is close.Therefore steganalysis calculation is being resisted
When method, the voice that the present invention generates is difficult to be detected, to substantially increase safety.
Detailed description of the invention
Fig. 1 is AMR speech coding principles figure in background technique;
Fig. 2 is the flow chart of the embodiment of the present invention;
Fig. 3 is secret information coded treatment flow chart in the embodiment of the present invention;
Fig. 4 is random mask sequence product process figure in the embodiment of the present invention;
Fig. 5 is that secret information extracts flow chart in the embodiment of the present invention.
Specific embodiment
Understand for the ease of those of ordinary skill in the art and implement the present invention, with reference to the accompanying drawings and embodiments to this hair
It is bright to be described in further detail, it should be understood that implementation example described herein is merely to illustrate and explain the present invention, not
For limiting the present invention.
Referring to Fig.1, a kind of safe steganography method of AMR fixed codebook based on distribution of pulses model provided by the invention, packet
Include following steps:
Step 1: determining embedding method;
Wherein: t, 0≤t≤4 indicate orbital number, itAnd it+5Indicate two non-zero pulses positions in track t,Table
Show and x be rounded downwards,Indicate step-by-step xor operation, mtIndicate the 3 bit secret informations that be embedded in track t;
Two non-zero pulses position i in track t are first determined whether when insertiontAnd it+5It is whether identical, if it=it+5, then should
Without steganography in track, otherwise according to the secret information m of insertiontIt is embedded in two kinds of situation:
1) the candidate impulse index for writing sufficient equation (1) all over is k, if k ≠ it/ 5, then directly using k*5+t as second
Non-zero pulses it+5Position;
If 2) k=it/ 5, then do not change the position of second non-zero pulses;
Step 2: secret information processing improves safety for guaranteeing that telescopiny does not destroy the distribution of pulses of original audio
Property.Including secret information pretreatment, coding and randomization;
Pretreatment such as is encrypted to secret information and is compressed at the processing, keeps secret information distribution more random, algorithm is more
Safety.
Coding, according to the principle and embedding method of step-by-step xor operation, if the secret information msg to be embedded int=0, be
The probability for guaranteeing that identical pulse position occurs on unified track is constant, then does not modify second pulse position.In order to correctly mention
Secret information in this case is taken, needs to make coded treatment to original private information in advance.Using every 3 bit secret information as
One pretreatment unit is denoted as msg, while the use of 1 bit labeling position tag being that each 3 bit secret information is marked, and marks
Whether the information is 0, if msg=0, corresponding marker bit tag=0, otherwise, tag=1;Coding process such as Fig. 3 institute
Show;
Randomization, in order to guarantee the correct extraction of secret information, the mark information tag after coding will be single with every 3 bit
Member is embedded into audio track.However the distribution of every 3 bit tag and uneven, probability distribution is as shown in table 1.Therefore letter
The original distribution of pulses of audio will be destroyed by singly being embedded in, it is therefore desirable to the processing being randomized by mask to tag, process
It is as shown in formula 2:
Wherein, tagmaskFor the mark information after mask, mask is 3 bit-masks;If Ptag,Pmask,Respectively 3
The probability distribution of mark information after bit labeling information, mask and mask;Occur in order not to change identical pulse in same track
Probability, while making tagmaskDistribution it is sufficiently random, qualifications shown in formula 3 should be met:
By constructing the probability distribution of mask, equation shown in formula 4 is solved, tag is mademaskMeet the condition of formula 3;Wherein 0
≤ i, j≤7, PmaskTo need the probability distribution solved;PtagAs shown in table 1;
The probability distribution of 1 three bit labeling information tag of table
tag | 000 | 001 | 010 | 011 | 100 | 101 | 110 | 111 |
Ptag | 1/512 | 7/512 | 7/512 | 49/512 | 7/512 | 49/512 | 49/512 | 343/512 |
Solving PmaskAfterwards, that is, random mask code sequence is produced, original marking information tag is carried out at randomization
Reason;
The process for generating mask code sequence is as shown in Figure 4;First according to PmaskThe mask code sequence that length is N is generated, further according to
The key key of user oneself selection carries out out-of-order processing to it.
Step 3: by treated, secret information is embedded among the pulse position of audio;
See Fig. 5, the specific implementation of step 3 includes following sub-step:
Step 3.1: by treated, secret information is divided into original private information and mark information;
Step 3.2: when to AMR voice framing code, fixed codebook search obtains two non-zero pulses positions in each track t
Set itAnd it+5;
Step 3.3: being embedded according to the type of embedding information and corresponding embedding method;
If embedding information is original private information, need to judge whether two pulse positions are equal in track t;If
it=it+5, then skip the track and go to next track t+1, go to step 3.2;If it≠it+5, then according to original private information
Embedding method is embedded in;
If embedding information is mark information, do not need to judge whether two pulse positions are equal in track t, direct root
It is embedded according to embedding method;
Step 3.4: encoding, and be embedded in by step 3.3 frame by frame, until terminating.
For the present embodiment in decoding, every 8 group information (every group includes 3 bit informations) is one group and is decoded that process is as follows:
Step 1: decoding audio obtains two non-zero pulses positions in each track;
Step 2: secret information and mark information so being extracted according to secret information and the embedding method of mark information;
Step 3: secret information is corrected according to mark information;
Step 4: revised secret information being decrypted, original private information is obtained.
The present invention analyzes pulse distribution character in cover audio, in conjunction with AMR fixed codebook coding principle, in insertion pair
Secret information is pre-processed, and embedding information is divided into original private information and mark information.According to changing distribution of pulses characteristic
Become the smallest principle and design corresponding embedding method, keep the identical probability of pulse position on same track constant, at the same be distributed compared with
To be random, to keep the audio after steganography close with original audio in distribution of pulses.The advantage of this algorithm is good concealment
And anti-steganalysis ability is strong.
It should be understood that the part that this specification does not elaborate belongs to the prior art.
It should be understood that the above-mentioned description for preferred embodiment is more detailed, can not therefore be considered to this
The limitation of invention patent protection range, those skilled in the art under the inspiration of the present invention, are not departing from power of the present invention
Benefit requires to make replacement or deformation under protected ambit, fall within the scope of protection of the present invention, this hair
It is bright range is claimed to be determined by the appended claims.
Claims (4)
1. a kind of safe steganography method of AMR fixed codebook based on distribution of pulses model, which comprises the following steps:
Step 1: determining embedding method;
Wherein: t, 0≤t≤4 indicate orbital number, itAnd it+5Indicate two non-zero pulses positions in track t,It indicates to x
It is rounded downwards,Indicate step-by-step xor operation, mtIndicate the 3 bit secret informations that be embedded in track t;
Two non-zero pulses position i in track t are first determined whether when insertiontAnd it+5It is whether identical, if it=it+5, then the track
In without steganography, otherwise according to the secret information m of insertiontIt is embedded in two kinds of situation:
1) the candidate impulse index for writing sufficient equation (1) all over is k, if k ≠ it/ 5, then directly using k*5+t as second non-zero arteries and veins
Rush it+5Position;
If 2) k=it/ 5, then do not change the position of second non-zero pulses;
Step 2: secret information processing, including secret information pretreatment, coding and randomization;
The pretreatment is that encryption and compression processing are carried out to secret information;
The coding is denoted as msg using every 3 bit secret information as a pretreatment unit, while using 1 bit labeling position
Tag is that each 3 bit secret information is marked, and marks whether the information is 0, if msg=0, corresponding marker bit tag
=0, otherwise, tag=1;
The randomization, the processing being randomized by mask to tag, process are as shown in formula 2:
Wherein, tagmaskFor the mark information after mask, mask is 3 bit-masks;If Ptag,Pmask,Respectively 3 bits
The probability distribution of mark information after mark information, mask and mask;In order not to change identical pulse in same track occur it is general
Rate, while making tagmaskDistribution it is sufficiently random, qualifications shown in formula 3 should be met:
By constructing the probability distribution of mask, equation shown in formula 4 is solved, tag is mademaskMeet the condition of formula 3;Wherein 0≤i, j
≤ 7, PmaskTo need the probability distribution solved;PtagValue are as follows: work as tag=000, when, Ptag=1/512;Work as tag=001,
When, Ptag=7/512;Work as tag=010, when, Ptag=7/512;Work as tag=011, when, Ptag=49/512;Work as tag=100,
When, Ptag=7/512;Work as tag=101, when, Ptag=49/512;Work as tag=110, when, Ptag=49/512;Work as tag=111,
When, Ptag=343/512;
Solving PmaskAfterwards, that is, random mask code sequence is produced, randomization is carried out to original marking information tag;
Step 3: by treated, secret information is embedded among the pulse position of audio.
2. the AMR fixed codebook safe steganography method according to claim 1 based on distribution of pulses model, feature exist
In generating random mask code sequence described in step 2, specific implementation process is: first according to PmaskGenerate the mask that length is N
Sequence carries out out-of-order processing to it further according to the key key of user oneself selection.
3. the AMR fixed codebook safe steganography method according to claim 1 based on distribution of pulses model, feature exist
In the specific implementation of step 3 includes following sub-step:
Step 3.1: by treated, secret information is divided into original private information and mark information;
Step 3.2: when to AMR voice framing code, fixed codebook search obtains two non-zero pulses position i in each track tt
And it+5;
Step 3.3: being embedded according to the type of embedding information and corresponding embedding method;
If embedding information is original private information, need to judge whether two pulse positions are equal in track t;If it=
it+5, then skip the track and go to next track t+1, go to step 3.2;If it≠it+5, then embedding according to original private information
Enter rule to be embedded in;
If embedding information is mark information, do not need to judge whether two pulse positions are equal in track t, directly according to embedding
Enter rule to be embedded in;
Step 3.4: encoding, and be embedded in by step 3.3 frame by frame, until terminating.
4. the safe steganography method of AMR fixed codebook based on distribution of pulses model according to claim 1 to 3,
It is characterized by: every 8 group information is one group and is decoded when decoding, every group includes 3 bit informations;Decoding process includes following
Sub-step:
Step 4.1: decoding audio obtains two non-zero pulses positions in each track;
Step 4.2: secret information and mark information are extracted according to secret information and the embedding method of mark information;
Step 4.3: secret information is corrected according to mark information;
Step 4.4: revised secret information being decrypted, original private information is obtained.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910347984.3A CN110111799B (en) | 2019-04-28 | 2019-04-28 | AMR fixed codebook security steganography method based on pulse distribution model |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910347984.3A CN110111799B (en) | 2019-04-28 | 2019-04-28 | AMR fixed codebook security steganography method based on pulse distribution model |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110111799A true CN110111799A (en) | 2019-08-09 |
CN110111799B CN110111799B (en) | 2021-02-19 |
Family
ID=67487166
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910347984.3A Active CN110111799B (en) | 2019-04-28 | 2019-04-28 | AMR fixed codebook security steganography method based on pulse distribution model |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110111799B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1708907A (en) * | 2002-10-25 | 2005-12-14 | 达丽星网络有限公司 | Method and apparatus for fast CELP parameter mapping |
US7231271B2 (en) * | 2004-01-21 | 2007-06-12 | The United States Of America As Represented By The Secretary Of The Air Force | Steganographic method for covert audio communications |
CN106101714A (en) * | 2016-07-14 | 2016-11-09 | 中国科学院信息工程研究所 | One and the tightly coupled H.264 video information hiding method of compression encoding process |
CN107564536A (en) * | 2017-09-06 | 2018-01-09 | 武汉大学 | AMR pitch delay steganalysis methods based on difference Markov transition probability features in pitch delay subframe group group |
CN107689226A (en) * | 2017-08-29 | 2018-02-13 | 中国民航大学 | A kind of low capacity Methods of Speech Information Hiding based on iLBC codings |
-
2019
- 2019-04-28 CN CN201910347984.3A patent/CN110111799B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1708907A (en) * | 2002-10-25 | 2005-12-14 | 达丽星网络有限公司 | Method and apparatus for fast CELP parameter mapping |
US7231271B2 (en) * | 2004-01-21 | 2007-06-12 | The United States Of America As Represented By The Secretary Of The Air Force | Steganographic method for covert audio communications |
CN106101714A (en) * | 2016-07-14 | 2016-11-09 | 中国科学院信息工程研究所 | One and the tightly coupled H.264 video information hiding method of compression encoding process |
CN107689226A (en) * | 2017-08-29 | 2018-02-13 | 中国民航大学 | A kind of low capacity Methods of Speech Information Hiding based on iLBC codings |
CN107564536A (en) * | 2017-09-06 | 2018-01-09 | 武汉大学 | AMR pitch delay steganalysis methods based on difference Markov transition probability features in pitch delay subframe group group |
Non-Patent Citations (3)
Title |
---|
YANZHEN REN .ETAL: "An AMR adaptive steganography algorithm based on minimizing distortion", 《MULTIMED TOOLS APPL》 * |
任延珍: "基于基音延迟组内相关性的AMR隐写分析算法", 《华南理工大学学报(自然科学版)》 * |
王丽娜: "面向JPEG图像的隐写分析盲检测方法", 《武汉大学学报(理学版)》 * |
Also Published As
Publication number | Publication date |
---|---|
CN110111799B (en) | 2021-02-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103299366B (en) | Devices for encoding and detecting a watermarked signal | |
Tian et al. | Improving security of quantization-index-modulation steganography in low bit-rate speech streams | |
Wu et al. | An approach of steganography in G. 729 bitstream based on matrix coding and interleaving | |
Ren et al. | AMR steganalysis based on the probability of same pulse position | |
US8412519B2 (en) | Steganography in digital signal encoders | |
CN103299365B (en) | Devices for adaptively encoding and decoding a watermarked signal | |
CN102057424A (en) | Method and apparatus for error concealment of encoded audio data | |
CN101764666B (en) | Speech encryption method and device and decryption method and device | |
KR101279857B1 (en) | Adaptive multi rate codec mode decoding method and apparatus thereof | |
Tian et al. | Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs | |
Ren et al. | A secure AMR fixed codebook steganographic scheme based on pulse distribution model | |
Kheddar et al. | High capacity speech steganography for the G723. 1 coder based on quantised line spectral pairs interpolation and CNN auto-encoding | |
CN103002406B (en) | A kind of voice encryption method being applied to arrowband radio digital communication system | |
Zhang et al. | An enhanced steganographic code and its application in voice-over-IP steganography | |
Tian et al. | Detecting bitrate modulation-based covert voice-over-IP communication | |
de Andrade et al. | Speech privacy for modern mobile communication systems | |
CN107689226A (en) | A kind of low capacity Methods of Speech Information Hiding based on iLBC codings | |
Deepikaa et al. | VoIP steganography methods, a survey | |
Wu | Information hiding in speech signals for secure communication | |
Kazemi et al. | Data hiding robust to mobile communication vocoders | |
Özkan et al. | Data transmission via GSM voice channel for end to end security | |
CN110111799A (en) | A kind of safe steganography method of AMR fixed codebook based on distribution of pulses model | |
Ambika et al. | Secure Speech Communication–A Review | |
US7684980B2 (en) | Information flow transmission method whereby said flow is inserted into a speech data flow, and parametric codec used to implement same | |
CN107545899A (en) | A kind of AMR steganography methods based on voiceless sound pitch delay jittering characteristic |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |