Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電機工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/60824
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor雷欽隆
dc.contributor.authorWei-Chou Laien
dc.contributor.author賴韋州zh_TW
dc.date.accessioned2021-06-16T10:31:49Z-
dc.date.available2018-08-20
dc.date.copyright2013-08-20
dc.date.issued2013
dc.date.submitted2013-08-14
dc.identifier.citation[1] C. Neubauer, J. Herre, and K. Brandenburg, “Continuous steganographic data transmission using uncompressed audio,” in Information Hiding, pp. 208-217, 1998.
[2] H.F. Olson, “The measurement of loudness.” In D. Saslaw, E. Pitts III, and M. Riggs, eds. Audio, pp. 18-22. February 1972.
[3] D. Deutsch, “7 The Processing of Pitch Combinations.” In D. Deutsch, eds. The psychology of music, 3rd ed. 2013.
[4] ITU-R Recommendation BS.1387, Method for Objective Measurements of Perceived Audio Quality. International Telecommunication Union – Radiocommunication Sector, November 2001.
[5] S. Kumar and G.B. BandyopadhyayBarnali, “LSB Modification and Phase Encoding Technique of Audio Steganography Revisited.” International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, issue 4, June 2012.
[6] S. Gudla, S. Reyya, and A. Kotyada, “KEY BASED LEAST SIGNIFICANT BIT (LSB) INSERTION FOR AUDIO AND VIDEO STEGANOGRAPHY.” International Journal of Computer Science and Engineering, vol. 3, no. 1, pp. 60-69, March 2013.
[7] J. Bah and R. Ramakishore, “LSB Technique And Its Variations Used In Audio Steganography: A Survey.” International Journal of Engineering Research & Technology, vol. 2, issue 4, pp. 2327-2332, April 2013.
[8] S.K. Bandyopadhyay and B.G. Banik, “Multi-Level Steganographic Algorithm for Audio Steganography using LSB Modification and Parity Encoding Technique.” International Journal of Emerging Trends & Technology in Computer Science, vol. 1, Issue 2, pp. 71-74, July 2012.
[9] M. Nosrati, R. Karimi, and M. Hariri, “Audio Steganography: A Survey on Recent Approaches.” World Applied Programming, vol. 2, no. 3, pp. 202-205, March 2012.
[10] H. Matsuoka, “Spread spectrum audio steganography using sub-band phase shifting,” in International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 3-6, December 2006.
[11] N. Parab, M. Nathan, and K.T. Talele, “Audio Steganography Using Differential Phase Encoding.” In K. Shah, V.R.L. Gorty, and A. Phirke, eds. Technology Systems and Management, pp. 146-151, 2011.
[12] K. Gopalan, S.J. Wenndt, S.F. Adams, and D.M. Haddad, “Audio steganography by amplitude or phase modification,” in Proceedings of SPIE-IS&T, vol. 5020, pp. 67-76, 2003.
[13] T. Shiro, H. Yamasaki, K. Yoda, and Y. Watanabe, “Energy efficient Echo-Hiding extraction method based on fine grain intermittent power control,” in Sensors Applications Symposium, pp. 1-6, 2012.
[14] K. Kondo, “Evaluation of a stereo audio data hiding method using inter-channel decorrelator polarity,” in International Conference of Acoustics Speech and Signal Processing, pp. 277-280, 2010.
[15] D.E. Skopin, I.M.M. El-Emary, R.J. Rasras, and R.S. Diab, “Advanced algorithms in audio steganography for hiding human speech signal,” in International Conference of Advanced Computer Control, vol. 3, pp. 29-32, March 2010.
[16] X. Dong, M.F. Bocko, and Z. Ignjatovic, “Data hiding via phase manipulation of audio signals,” in International Conference of Acoustics, Speech, and Signal Processing, vol. 5, pp. V-377-80, May 2004.
[17] K. Gopalan, “Audio steganography using bit modification,” in International Conference of Multimedia and Expo, vol. 1, pp. I-629-32, July 2003.
[18] R. Nishimura, “Information hiding into interaural phase differences for stereo audio signals,” in International Conference of Intelligent Information Hiding and Multimedia Signal Processing, pp. 1189-1192, September 2009.
[19] K. Gopalan and S. Wenndt, “Audio steganography for covert data transmission by imperceptible tone insertion,” in Proc. The IASTED International Conference on Communication Systems And Applications, July 2004.
[20] R.N. Bracewell and R.N. Bracewell, The Fourier transform and its applications. New York: McGraw-Hill, 1986.
[21] P. Jayaram, H.R. Ranganatha, and H.S. Anupama, “Information Hiding Using Audio Steganography–A Survey.” The International Journal of Multimedia & Its Applications, vol. 3, pp. 86-96, 2011.
[22] M. Fallahpour and D. Megias, “High capacity method for real-time audio data hiding using the FFT transform,” in Advances in Information Security and Its Application, pp. 91-97, 2009.
[23] “ISO226LoudnessCurves,” http://www.sengpielaudio.com/ISO226LoudnessCurves.gif
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/60824-
dc.description.abstract聲音資料隱寫術是將訊息隱藏在聲音之中,使得訊息的傳送者和接收者以外的其他人都無法察覺隱藏訊息的存在。這篇論文利用人類聽覺系統的一些特性,提出了一個雙聲道聲音資料隱寫術的新方法。訊息經由嵌入低頻率且八度等價的純音被隱藏在雙聲道聲音宿主中,然後經由比較左聲道和右聲道的頻域的資料來偵測隱藏的訊息。實驗結果顯示使用我們的方法產生的有隱藏訊息的聲音,和原本的聲音相比,其品質幾乎完全沒有下降,因此惡意的攻擊者將不會注意到隱藏的訊息。zh_TW
dc.description.abstractAudio steganography is a technique that hiding messages into audio such that no one except the sender and intended recipient suspects the existence of the messages. In this paper we proposed a new method for stereo audio steganography, which employs some characteristics of human auditory system (HAS). Messages are embedded by inserting low-frequency and octave-equivalent pure tones into different channels. By comparing the frequency domain data of left channel and right channel, the hidden messages are detected. The experiment results demonstrate that comparing with the host audio, the quality of the message-hided audio generated by our method are nearly not decreased, thus malicious attackers will not perceive the hidden messages.en
dc.description.provenanceMade available in DSpace on 2021-06-16T10:31:49Z (GMT). No. of bitstreams: 1
ntu-102-R00921090-1.pdf: 1369747 bytes, checksum: 3177976b8da4a89248766085456243cb (MD5)
Previous issue date: 2013
en
dc.description.tableofcontents摘要 I
ABSTRACT II
CONTENTS III
LIST OF FIGURES V
LIST OF TABLES VI
CHAPTER 1 INTRODUCTION 1
CHAPTER 2 LOW-FREQUENCY AND OCTAVE EQUIVALENT TONES 4
2.1 AUDITORY MASKING 4
2.2 RELATIONSHIP BETWEEN LOUDNESS AND FREQUENCY 4
2.3 OCTAVE EQUIVALENCE 5
CHAPTER 3 RELATED WORKS 6
CHAPTER 4 TONE INSERTING AUDIO STEGANOGRAPHY 11
4.1 ENCODING MESSAGES BY PURE TONE INSERTING 11
4.2 DECODING MESSAGES BY FREQUENCY DOMAIN MAGNITUDES 17
CHAPTER 5 EVALUATION 19
5.1 THEORETICAL ANALYSIS 19
5.2 EXPERIMENT RESULTS 19
5.2.1 Imperceptibility 22
5.2.2 Relationship Between Quality Degradation and Capacity 25
5.2.3 Relationship Between Quality Degradation and Host Audio 26
5.3 COMPARISON WITH OTHER METHODS 28
CHAPTER 6 CONCLUSION 29
REFERENCES 30
dc.language.isoen
dc.subject聲音資料隱寫術zh_TW
dc.subject人類聽覺系統zh_TW
dc.subject低頻率純音嵌入zh_TW
dc.subject八度等價zh_TW
dc.subject響度zh_TW
dc.subjectoctave equivalenceen
dc.subjecthuman auditory system (HAS)en
dc.subjectlow-frequency pure tone insertionen
dc.subjectloudnessen
dc.subjectaudio steganographyen
dc.title嵌入低頻率且八度等價的純音達成雙聲道資料隱寫zh_TW
dc.titleStereo Audio Steganography by Inserting Low-frequency and Octave Equivalent Pure Tonesen
dc.typeThesis
dc.date.schoolyear101-2
dc.description.degree碩士
dc.contributor.oralexamcommittee郭斯彥,顏嗣鈞,黃秋煌
dc.subject.keyword聲音資料隱寫術,人類聽覺系統,低頻率純音嵌入,八度等價,響度,zh_TW
dc.subject.keywordaudio steganography,human auditory system (HAS),low-frequency pure tone insertion,octave equivalence,loudness,en
dc.relation.page33
dc.rights.note有償授權
dc.date.accepted2013-08-14
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電機工程學研究所zh_TW
顯示於系所單位:電機工程學系

文件中的檔案:
檔案 大小格式 
ntu-102-1.pdf
  未授權公開取用
1.34 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved