Professional Documents
Culture Documents
tions [1-2].
Abstract Based on the method of information hiding, a Actually, cryptography hides the meaning of
novel algorithm for security speech communication is information and makes the information seem as
designed in this paper,and the synchronization code can stochastic codes.When the adversaries obtain the
be used to search the embedded location. Firstly, the encryption information, they will know the existence of
DWT is performed on each segment of the original the secret information by the sense organ, and then the
carrier audio; Secondly, the embedding bits are risk of being attacked increases[3]. But information
constructed by the synchronization code and secret hiding technology hides the existence of the secret
audio ,and the secret bits are formed by chaotic information, thus reduces the possibility of being
encrypting; Thirdly, the secret bits are embedded into the attacked. So,it is attracting people's interests and widely
low frequency point of Discrete Wavelet Transform
used in many fields,such as military security,secret
(DWT) by quantization;Lastly,the IDWT are performed
communication and so on.The information hiding
on each segment and the setgo audio are constructed.The
algorithms can be classified into two categories:
original carrier audio is not required in the secret audio
algorithms in time domain and algorithms in transform
recovery. Experimental results show that the stego audio
domain[4].
has transparent feature, and the quality of the recovered
In this paper, based on chaotic sequence, an audio
audio is satisfying. The algorithm is strongly robust to
information hiding algorithm in wavelet domain is
many attacks, such as resampling, cropping and so on..
presented. A synchronic signal is applied in the algorithm
Keywords Information Hiding; Quantization; Chaotic
to search the embedding location of the secret audio.
Encrypting; Synchronization Code;DWT
Frame synchronization is used to search synchronic
Ⅰ. Introduction signal.
Information hiding is a new subject with profound
historical origins. It is associated with lots of subjects Ⅱ Principle of Embedding Secret Information
such as information theory, cryptology, sensation science
By Quantizing
and etc. The Information hiding technology is mainly
Quantizing ,whose rule is that coefficient to be
about how to hide the secret information into the
embedded is quantized to the center of the nearest
cover-media to carry on the secret communication.
quantization interval away from the coefficient to be
Carrier signal shields the actual information of the
embedded . Supposing g is the coefficient to be
communica-
quantized, g is the quantized coefficient, w is the
* Corresponding author.
* This paper is supported by Beijing Science New NovelFund(2006B10)
Authorized licensed use limited to: HOLON ACADEMIC INSTITUTE OF TECHNOLOGY. Downloaded on February 24,2010 at 04:22:41 EST from IEEE Xplore. Restrictions apply.
secret bi- nary bit, the embedding rule is described in audio information can be embedded into the original
figure 1 and the quantized result can be described as carrier audio by five steps. The construction of
the following formulas: embedding information is shown in Fig. 3, and the
process of secret audio information embedded into
original audio is shown in Fig. 2.
(4) if g<0, w 0
1
2k 2 if n 2k
(4)
1 1
g 2k if n (2k 1)&
2 2
1 1
2(k 1) 2 if n (2k 1)& 2
Authorized licensed use limited to: HOLON ACADEMIC INSTITUTE OF TECHNOLOGY. Downloaded on February 24,2010 at 04:22:41 EST from IEEE Xplore. Restrictions apply.
Segment k-1 Segment k Segment k+1
Relative Parameters:
Synchronization code is m sequence and its cycle is 63
Ⅳ Audio Extracting Algorithm and the judge threshold is 0.85;the initial value x0 and
parameter u of chaotic sequence is 0.25 and 3.94
The flow of extracting the secret audio informa-
respectively;. the synchronization code embedding
tion is shown in Figure 4. Without the original audio, the
location is 9th and the Secret Audio embedding location
algorithm can extract the secret audio information from
is 11th; Quantization stepΔis 0.2.
the distorted setgo audio.
Evaluation Standard:
Setgo Audio
As defined in [5], signal to noise ratio for the
watermark embedded in time-domain is computed using
Searching Synch- the relation:
ronization Code
1 N 1
1 ci' ci
BER
N
0 ci' ci
(5)
i 0
Segmenting
N
DWT x i2 (6)
SNR 10 log 10 N i 1
( x i' x i ) 2
Quantizing i 1
Authorized licensed use limited to: HOLON ACADEMIC INSTITUTE OF TECHNOLOGY. Downloaded on February 24,2010 at 04:22:41 EST from IEEE Xplore. Restrictions apply.
Table 1 Changing the embedded location
-1 8 9 19.927 0.0082
5
0 1 2 3 4 5 6 7 8 9 10 ×10 8 10 24.325 0.0101
8 11 26.792 0.0122
(b) Stego Audio
8 12 27.719 0.0183
Fig 5. Carrier audio and Stego audio
9 10 24.418 0.0101
9 11 26.957 0.0122
1
11 12 27.981 0.0183
11 12 28.263 0.0346
0
12 14 29.341 0.0659
-1 13 14 28.343 0.0658
0 2000 4000 6000 8000 10000 12000
13 15 28.112 0.1214
(a) Secret Audio
14 16 33.066 0.252
Authorized licensed use limited to: HOLON ACADEMIC INSTITUTE OF TECHNOLOGY. Downloaded on February 24,2010 at 04:22:41 EST from IEEE Xplore. Restrictions apply.
Table 2 The Experiment Result of Some Attacks
Ⅵ Conclusion
REFERENCES
[1] Wei Li, Xiangyang Xue, and Peizhong Lu. Localized Audio
Watermarking Technique Robust Against Time-Scale
Modification.IEEE Transactions on multimedia,VOL.8, No. 1,
FEBRUARY 2006:p 60-69.
[2] C. W. Tang and H. M. Hang, “A feature-based robust digital image
watermarking algorithm,” IEEE Trans. Signal Process., vol. 51,
no. 4, Apr. 2003, p.950–959.
[3] Li Li, Zong Fu-Jian. An Anti-cutting Watermarking
Algorithm.NCIG2005, p. 149-152.
[4] M. P. Kennedy,G. Kolumban.Digital communication using
chaos,Signal Process., vol. 80, 2000,p. 1307–1320.
[5] Jiang Ji-tao, Zhou Xue-qin, Liu Xiao-hong. An improved
algorithm based on LSB in digital image hidden. Journal of
Shangdong University of Technology(Sci & Tech), Vol.20 No.3
May 2006 :p. 66-68.
Authorized licensed use limited to: HOLON ACADEMIC INSTITUTE OF TECHNOLOGY. Downloaded on February 24,2010 at 04:22:41 EST from IEEE Xplore. Restrictions apply.