• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

在音频文件中隐藏数据:一种基于平滑处理的方法来提高隐秘音频的质量。

Hiding data in audio files: A smoothing-based approach to improve the quality of the stego audio.

作者信息

Ahmad Tohari, Amrizal Muhammad Hanif, Wibisono Waskitho, Ijtihadie Royyana Muslim

机构信息

Department of Informatics, Institut Teknologi Sepuluh Nopember, Surabaya, 60111, Indonesia.

出版信息

Heliyon. 2020 Mar 2;6(3):e03464. doi: 10.1016/j.heliyon.2020.e03464. eCollection 2020 Mar.

DOI:10.1016/j.heliyon.2020.e03464
PMID:32154419
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7052405/
Abstract

In this digital era, transmitting data through a computer network has become common. Moreover, some applications have also been developed to do it. Nevertheless, users may not be aware of the security aspect of this data transmission, which can lead to disclosing this private message. In a case when a sensitive message is the object to transmit, a security mechanism should be applied. Data hiding is one of the methods introduced to work for this issue. In this algorithm, the message is embedded into the cover, such as an audio file, before being transmitted; on the other side, the recipient extracts it. However, the size of the message and the quality of the resulted stego data are still challenging. In this paper, we focus on these two problems by considering some factors: embedding space, embedding process, reducing, and smoothing steps. Firstly, the audio signal is discretized to obtain audio samples. Next, these samples are interpolated to provide spaces for hiding the secret. Considering that the quality of the generated stego audio is likely to drop, reducing and smoothing steps are designed. The experimental results show that this approach can improve the quality of the stego based on the specified payload capacity. That is, there is an increase in PSNR value of at least 10 dB, depending on the payload size and the methods.

摘要

在这个数字时代,通过计算机网络传输数据已变得很常见。此外,还开发了一些应用程序来进行数据传输。然而,用户可能并未意识到这种数据传输的安全问题,这可能导致私人信息泄露。当敏感信息成为传输对象时,应应用一种安全机制。数据隐藏是为解决此问题而引入的方法之一。在该算法中,消息在传输前被嵌入到载体中,如音频文件;在另一端,接收者提取它。然而,消息的大小和所得隐秘数据的质量仍然具有挑战性。在本文中,我们通过考虑一些因素来关注这两个问题:嵌入空间、嵌入过程、降噪和平滑步骤。首先,对音频信号进行离散化以获得音频样本。接下来,对这些样本进行插值以提供隐藏秘密的空间。考虑到生成的隐秘音频质量可能会下降,设计了降噪和平滑步骤。实验结果表明,基于指定的有效载荷容量,这种方法可以提高隐秘音频的质量。也就是说,根据有效载荷大小和方法的不同,峰值信噪比(PSNR)值至少会增加10 dB。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/b80eaf93849f/gr017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/ac1b884264c6/gr001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/d9a2e347394c/gr002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/b2efed4df89d/gr003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/e8a976691885/gr004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/da67648211a1/gr005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/c2cc4891b130/gr006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/8e1b9014bfd8/gr007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/78fb91955554/gr008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/3f393831040e/gr009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/ec3307fa4682/gr010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/cc1d59bfc7de/gr011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/083a1371855a/gr012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/ab1d0a12baa0/gr013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/596057092f83/gr014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/c7de26d9558e/gr015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/a19d8e11df00/gr016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/b80eaf93849f/gr017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/ac1b884264c6/gr001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/d9a2e347394c/gr002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/b2efed4df89d/gr003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/e8a976691885/gr004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/da67648211a1/gr005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/c2cc4891b130/gr006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/8e1b9014bfd8/gr007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/78fb91955554/gr008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/3f393831040e/gr009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/ec3307fa4682/gr010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/cc1d59bfc7de/gr011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/083a1371855a/gr012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/ab1d0a12baa0/gr013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/596057092f83/gr014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/c7de26d9558e/gr015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/a19d8e11df00/gr016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f1fc/7052405/b80eaf93849f/gr017.jpg

相似文献

1
Hiding data in audio files: A smoothing-based approach to improve the quality of the stego audio.在音频文件中隐藏数据:一种基于平滑处理的方法来提高隐秘音频的质量。
Heliyon. 2020 Mar 2;6(3):e03464. doi: 10.1016/j.heliyon.2020.e03464. eCollection 2020 Mar.
2
Improved prediction error expansion and mirroring embedded samples for enhancing reversible audio data hiding.改进预测误差扩展和镜像嵌入样本以增强可逆音频数据隐藏
Heliyon. 2021 Nov 16;7(11):e08381. doi: 10.1016/j.heliyon.2021.e08381. eCollection 2021 Nov.
3
SABMIS: sparse approximation based blind multi-image steganography scheme.SABMIS:基于稀疏逼近的盲多图像隐写术方案。
PeerJ Comput Sci. 2022 Nov 28;8:e1080. doi: 10.7717/peerj-cs.1080. eCollection 2022.
4
New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.一种使用多通道和多层次的新型深度数据隐藏与提取算法,以提高数据安全性和有效载荷容量。
PeerJ Comput Sci. 2022 Oct 19;8:e1115. doi: 10.7717/peerj-cs.1115. eCollection 2022.
5
An efficient and adaptive data-hiding scheme based on secure random matrix.基于安全随机矩阵的高效自适应数据隐藏方案
PLoS One. 2019 Oct 2;14(10):e0222892. doi: 10.1371/journal.pone.0222892. eCollection 2019.
6
Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images.基于率失真的隐写术:一种用于隐藏数字图像的大容量安全隐写方案。
Entropy (Basel). 2022 Jul 15;24(7):982. doi: 10.3390/e24070982.
7
High-Payload Data-Hiding Method for AMBTC Decompressed Images.用于 AMBTC 解压缩图像的高负载数据隐藏方法
Entropy (Basel). 2020 Jan 25;22(2):145. doi: 10.3390/e22020145.
8
A Mellin transform based video steganography with improved resistance to deep learning steganalysis for next generation networks.一种基于梅林变换的视频隐写术,对下一代网络的深度学习隐写分析具有更高的抗性。
MethodsX. 2024 Aug 14;13:102887. doi: 10.1016/j.mex.2024.102887. eCollection 2024 Dec.
9
Quality optimized medical image information hiding algorithm that employs edge detection and data coding.采用边缘检测和数据编码的质量优化医学图像信息隐藏算法。
Comput Methods Programs Biomed. 2016 Apr;127:24-43. doi: 10.1016/j.cmpb.2016.01.011. Epub 2016 Jan 29.
10
A novel edge based embedding in medical images based on unique key generated using sudoku puzzle design.一种基于数独谜题设计生成的唯一密钥的医学图像中基于边缘的新型嵌入方法。
Springerplus. 2016 Sep 29;5(1):1670. doi: 10.1186/s40064-016-3356-1. eCollection 2016.

引用本文的文献

1
Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism.利用轻量级超混沌映射和条件最低有效位机制将乱序文本消息隐藏在语音信号中。
PLoS One. 2024 Jan 3;19(1):e0296469. doi: 10.1371/journal.pone.0296469. eCollection 2024.
2
Improved prediction error expansion and mirroring embedded samples for enhancing reversible audio data hiding.改进预测误差扩展和镜像嵌入样本以增强可逆音频数据隐藏
Heliyon. 2021 Nov 16;7(11):e08381. doi: 10.1016/j.heliyon.2021.e08381. eCollection 2021 Nov.

本文引用的文献

1
Communication protocols for wireless sensor networks: A survey and comparison.无线传感器网络的通信协议:一项综述与比较
Heliyon. 2019 May 21;5(5):e01591. doi: 10.1016/j.heliyon.2019.e01591. eCollection 2019 May.
2
Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours.网络安全中的人为因素;研究网络成瘾、冲动性、对网络安全的态度与危险的网络安全行为之间的联系。
Heliyon. 2017 Jul 5;3(7):e00346. doi: 10.1016/j.heliyon.2017.e00346. eCollection 2017 Jul.
3
Expansion embedding techniques for reversible watermarking.
用于可逆水印的扩展嵌入技术。
IEEE Trans Image Process. 2007 Mar;16(3):721-30. doi: 10.1109/tip.2006.891046.