Font Size: a A A

Research And Analysis On Speech Steganography Using Masking Characteristics Of HAS In Transform Domain

Posted on:2007-09-08Degree:MasterType:Thesis
Country:ChinaCandidate:S HeFull Text:PDF
GTID:2178360185478229Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
As a new branch of information security, information hiding technology including digital watermarking and steganography aims to protect intellectual property rights of multimedia contents and to send secret messages under the cover of a carrier signal. The major content of the hiding technique is sought to the algorithms that insert the secret information into the host information. The host information may be the text, the image, the audio (speech) etc.. Recently, with the developing of information hiding technique, the audio (speech) information hiding technique is becoming a hot topic. It can be used to protecting copyright, hiding communication by embedding the secret information into the audio file.Steganography is an important meaning in information battle today, especially in information security. As a special work, there are some meaningful experiments in this thesis. For how to improve the imperceptibility and the robustness, the research achievements on information hiding are classified into the following categories.The first is a study on a number of basic theoretical problems in information hiding. Theoretical expatiate on general concepts and fundamental principles of information hiding and steganography, also point out possible directions for further research, also analysis the probability of speech as the host carry signal and efficient masking characteristics of psycho-acoustic model, it is shown that: there is an improvement on imperceptibility according to human auditory masking effect.Second, this thesis investigates information hiding aimed at hidden communication. A novel algorithm for information hiding in DCT domain is designed and implemented in this paper. Choose the frequency from 14 to 16 Bark as the embedding positions which below the masking threshold. Then change the DCT coefficient with the certain strength of...
Keywords/Search Tags:information hiding, steganography, audio masking characteristics, critical bands, speech
PDF Full Text Request
Related items