請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/60824完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 雷欽隆 | |
| dc.contributor.author | Wei-Chou Lai | en |
| dc.contributor.author | 賴韋州 | zh_TW |
| dc.date.accessioned | 2021-06-16T10:31:49Z | - |
| dc.date.available | 2018-08-20 | |
| dc.date.copyright | 2013-08-20 | |
| dc.date.issued | 2013 | |
| dc.date.submitted | 2013-08-14 | |
| dc.identifier.citation | [1] C. Neubauer, J. Herre, and K. Brandenburg, “Continuous steganographic data transmission using uncompressed audio,” in Information Hiding, pp. 208-217, 1998.
[2] H.F. Olson, “The measurement of loudness.” In D. Saslaw, E. Pitts III, and M. Riggs, eds. Audio, pp. 18-22. February 1972. [3] D. Deutsch, “7 The Processing of Pitch Combinations.” In D. Deutsch, eds. The psychology of music, 3rd ed. 2013. [4] ITU-R Recommendation BS.1387, Method for Objective Measurements of Perceived Audio Quality. International Telecommunication Union – Radiocommunication Sector, November 2001. [5] S. Kumar and G.B. BandyopadhyayBarnali, “LSB Modification and Phase Encoding Technique of Audio Steganography Revisited.” International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, issue 4, June 2012. [6] S. Gudla, S. Reyya, and A. Kotyada, “KEY BASED LEAST SIGNIFICANT BIT (LSB) INSERTION FOR AUDIO AND VIDEO STEGANOGRAPHY.” International Journal of Computer Science and Engineering, vol. 3, no. 1, pp. 60-69, March 2013. [7] J. Bah and R. Ramakishore, “LSB Technique And Its Variations Used In Audio Steganography: A Survey.” International Journal of Engineering Research & Technology, vol. 2, issue 4, pp. 2327-2332, April 2013. [8] S.K. Bandyopadhyay and B.G. Banik, “Multi-Level Steganographic Algorithm for Audio Steganography using LSB Modification and Parity Encoding Technique.” International Journal of Emerging Trends & Technology in Computer Science, vol. 1, Issue 2, pp. 71-74, July 2012. [9] M. Nosrati, R. Karimi, and M. Hariri, “Audio Steganography: A Survey on Recent Approaches.” World Applied Programming, vol. 2, no. 3, pp. 202-205, March 2012. [10] H. Matsuoka, “Spread spectrum audio steganography using sub-band phase shifting,” in International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 3-6, December 2006. [11] N. Parab, M. Nathan, and K.T. Talele, “Audio Steganography Using Differential Phase Encoding.” In K. Shah, V.R.L. Gorty, and A. Phirke, eds. Technology Systems and Management, pp. 146-151, 2011. [12] K. Gopalan, S.J. Wenndt, S.F. Adams, and D.M. Haddad, “Audio steganography by amplitude or phase modification,” in Proceedings of SPIE-IS&T, vol. 5020, pp. 67-76, 2003. [13] T. Shiro, H. Yamasaki, K. Yoda, and Y. Watanabe, “Energy efficient Echo-Hiding extraction method based on fine grain intermittent power control,” in Sensors Applications Symposium, pp. 1-6, 2012. [14] K. Kondo, “Evaluation of a stereo audio data hiding method using inter-channel decorrelator polarity,” in International Conference of Acoustics Speech and Signal Processing, pp. 277-280, 2010. [15] D.E. Skopin, I.M.M. El-Emary, R.J. Rasras, and R.S. Diab, “Advanced algorithms in audio steganography for hiding human speech signal,” in International Conference of Advanced Computer Control, vol. 3, pp. 29-32, March 2010. [16] X. Dong, M.F. Bocko, and Z. Ignjatovic, “Data hiding via phase manipulation of audio signals,” in International Conference of Acoustics, Speech, and Signal Processing, vol. 5, pp. V-377-80, May 2004. [17] K. Gopalan, “Audio steganography using bit modification,” in International Conference of Multimedia and Expo, vol. 1, pp. I-629-32, July 2003. [18] R. Nishimura, “Information hiding into interaural phase differences for stereo audio signals,” in International Conference of Intelligent Information Hiding and Multimedia Signal Processing, pp. 1189-1192, September 2009. [19] K. Gopalan and S. Wenndt, “Audio steganography for covert data transmission by imperceptible tone insertion,” in Proc. The IASTED International Conference on Communication Systems And Applications, July 2004. [20] R.N. Bracewell and R.N. Bracewell, The Fourier transform and its applications. New York: McGraw-Hill, 1986. [21] P. Jayaram, H.R. Ranganatha, and H.S. Anupama, “Information Hiding Using Audio Steganography–A Survey.” The International Journal of Multimedia & Its Applications, vol. 3, pp. 86-96, 2011. [22] M. Fallahpour and D. Megias, “High capacity method for real-time audio data hiding using the FFT transform,” in Advances in Information Security and Its Application, pp. 91-97, 2009. [23] “ISO226LoudnessCurves,” http://www.sengpielaudio.com/ISO226LoudnessCurves.gif | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/60824 | - |
| dc.description.abstract | 聲音資料隱寫術是將訊息隱藏在聲音之中,使得訊息的傳送者和接收者以外的其他人都無法察覺隱藏訊息的存在。這篇論文利用人類聽覺系統的一些特性,提出了一個雙聲道聲音資料隱寫術的新方法。訊息經由嵌入低頻率且八度等價的純音被隱藏在雙聲道聲音宿主中,然後經由比較左聲道和右聲道的頻域的資料來偵測隱藏的訊息。實驗結果顯示使用我們的方法產生的有隱藏訊息的聲音,和原本的聲音相比,其品質幾乎完全沒有下降,因此惡意的攻擊者將不會注意到隱藏的訊息。 | zh_TW |
| dc.description.abstract | Audio steganography is a technique that hiding messages into audio such that no one except the sender and intended recipient suspects the existence of the messages. In this paper we proposed a new method for stereo audio steganography, which employs some characteristics of human auditory system (HAS). Messages are embedded by inserting low-frequency and octave-equivalent pure tones into different channels. By comparing the frequency domain data of left channel and right channel, the hidden messages are detected. The experiment results demonstrate that comparing with the host audio, the quality of the message-hided audio generated by our method are nearly not decreased, thus malicious attackers will not perceive the hidden messages. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-16T10:31:49Z (GMT). No. of bitstreams: 1 ntu-102-R00921090-1.pdf: 1369747 bytes, checksum: 3177976b8da4a89248766085456243cb (MD5) Previous issue date: 2013 | en |
| dc.description.tableofcontents | 摘要 I
ABSTRACT II CONTENTS III LIST OF FIGURES V LIST OF TABLES VI CHAPTER 1 INTRODUCTION 1 CHAPTER 2 LOW-FREQUENCY AND OCTAVE EQUIVALENT TONES 4 2.1 AUDITORY MASKING 4 2.2 RELATIONSHIP BETWEEN LOUDNESS AND FREQUENCY 4 2.3 OCTAVE EQUIVALENCE 5 CHAPTER 3 RELATED WORKS 6 CHAPTER 4 TONE INSERTING AUDIO STEGANOGRAPHY 11 4.1 ENCODING MESSAGES BY PURE TONE INSERTING 11 4.2 DECODING MESSAGES BY FREQUENCY DOMAIN MAGNITUDES 17 CHAPTER 5 EVALUATION 19 5.1 THEORETICAL ANALYSIS 19 5.2 EXPERIMENT RESULTS 19 5.2.1 Imperceptibility 22 5.2.2 Relationship Between Quality Degradation and Capacity 25 5.2.3 Relationship Between Quality Degradation and Host Audio 26 5.3 COMPARISON WITH OTHER METHODS 28 CHAPTER 6 CONCLUSION 29 REFERENCES 30 | |
| dc.language.iso | en | |
| dc.subject | 聲音資料隱寫術 | zh_TW |
| dc.subject | 人類聽覺系統 | zh_TW |
| dc.subject | 低頻率純音嵌入 | zh_TW |
| dc.subject | 八度等價 | zh_TW |
| dc.subject | 響度 | zh_TW |
| dc.subject | octave equivalence | en |
| dc.subject | human auditory system (HAS) | en |
| dc.subject | low-frequency pure tone insertion | en |
| dc.subject | loudness | en |
| dc.subject | audio steganography | en |
| dc.title | 嵌入低頻率且八度等價的純音達成雙聲道資料隱寫 | zh_TW |
| dc.title | Stereo Audio Steganography by Inserting Low-frequency and Octave Equivalent Pure Tones | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 101-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 郭斯彥,顏嗣鈞,黃秋煌 | |
| dc.subject.keyword | 聲音資料隱寫術,人類聽覺系統,低頻率純音嵌入,八度等價,響度, | zh_TW |
| dc.subject.keyword | audio steganography,human auditory system (HAS),low-frequency pure tone insertion,octave equivalence,loudness, | en |
| dc.relation.page | 33 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2013-08-14 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
| 顯示於系所單位: | 電機工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-102-1.pdf 未授權公開取用 | 1.34 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
