https://scholars.lib.ntu.edu.tw/handle/123456789/121522
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor | 貝蘇章 | en |
dc.contributor | 臺灣大學:電信工程學研究所 | zh_TW |
dc.contributor.author | 黃馨儀 | zh |
dc.contributor.author | Huang, Hsin-Yi | en |
dc.creator | 黃馨儀 | zh |
dc.creator | Huang, Hsin-Yi | en |
dc.date | 2007 | en |
dc.date.accessioned | 2007-11-27T10:56:26Z | - |
dc.date.accessioned | 2018-07-05T03:38:03Z | - |
dc.date.available | 2007-11-27T10:56:26Z | - |
dc.date.available | 2018-07-05T03:38:03Z | - |
dc.date.issued | 2007 | - |
dc.identifier | en-US | en |
dc.identifier.uri | http://ntur.lib.ntu.edu.tw//handle/246246/58622 | - |
dc.description.abstract | 隨著全球邁入網際網路發達與3C(電腦、通訊、消費性電子)產品普及的數位時代,傳播與下載數位資訊變得十分方便。然而,科技的進步雖然提昇了工作效率,卻令盜版及違法使用日益猖獗,因此,資料隱藏技術顯得格外重要,其中數位浮水印可以用來保護多媒體的智慧財產權;數位指紋則可以提供證據找出違法的拷貝者或傳播者。 本篇論文提出一項音訊資料隱藏技術,視數種數位的通信序列為祕密寫作的信號,將欲隱藏的二元資訊加入秘密寫作信號中,再一起藏入原來的音訊,且不被人耳察覺。通信序列包括跳頻展頻序列:Welch-Costas 陣列、完全互補碼與二元零相關區域序列。此方法具有自我同步的特性,且利用對應的匹配濾波器重新找回藏入的位元。進一步引入音訊秘密共享的概念,同時使用多組特定序列當作秘密寫作信號,更能增加偵測位元的正確率,使錯誤率降至0.1以下,達到資料隱藏的目的。 接下來,我們會介紹音訊及光學的密碼系統,兩組系統均以干涉特性為基礎,屬於秘密共享的範疇,分別共享音樂或靜態影像。這些共享資料不僅提供良好的隱密性,更保有原始資料的品質,讓人們不會懷疑其真偽。解密方式也不再侷限於使用電腦,透過收聽喇叭或耳機能解開音訊加密,而Mach-Zehnder干涉計則能解開光學加密。 | zh_TW |
dc.description.abstract | The whole world has evolved into a 3C (including computer, communication and consumer electronics products) age with booming Internet connectivity. By following progress of the digital age, it is easy for people to distribute and download digital files which have caused serious problem of piracy in media distribution. Therefore, data hiding techniques become important in particular. Digital watermarking scheme is used to protect the intellectual property rights of multimedia and digital fingerprinting is applied to provide an evidence for finding illegal users. In this paper, we propose an audio data hiding technique which takes several digital communication sequences, including Welch-Costas (W-C) arrays, complete complementary (CC) codes and binary zero correlation zone (ZCZ) sequences, as the steganographic signals. The binary information is embedded into the steganographic signal that is subsequently hidden to the host signal and the watermarked signal is inaudible for human hearing. The method is self-synchronizing and allows us to recover embedded bits with a corresponding matched filter. Furthermore, we use more than one series of the communication sequence to implement the embedding algorithm. This can reduce the error rate below 0.1 errors. Next, audio and optical cryptographic schemes based on interference property of waves are introduced. Two schemes are also secret sharing schemes in which shares are music or images and are not suspect to human perception. They guarantee perfect privacy as well as high quality. It is stated that using computer is not the only way to decrypt the message. For audio cryptographic scheme, we can play two shares on a stereo system, either players or headphones. For optical cryptographic scheme, the Mach-Zehnder interferometer is used as a decryption machine. | en |
dc.description.tableofcontents | Chapter 1 Introduction 1 1.1 Overview of Digital Data Hiding 1 1.2 Thesis Organization 3 Chapter 2 Related Works in Digital Audio Watermarking and Audio Data Hiding 5 2.1 Human Audio System 5 2.1.1 Critical Bands and Absolute Threshold 5 2.1.2 Frequency and Temporal Masking Effect 7 2.1.3 Psychoacoustics Model 10 2.2 Properties of Digital Watermarks 13 2.3 Attacks and Synchronization 15 2.3.1 Attacks 15 2.3.2 Synchronization 17 Chapter 3 Summaries of Audio Data Hiding Schemes 21 3.1 Audio Environments 21 3.2 Low-bit Coding 23 3.3 Phase Coding 23 3.4 Spread Spectrum Scheme 26 3.5 Cepstrum Domain Scheme 29 3.6 Echo Data Hiding 32 Chapter 4 An Adaptive Spread-Spectrum Data Hiding Technique for Digital Audio 35 4.1 Introduction 35 4.2 Welch-Costas Array 36 4.3 The Proposed Embedding Algorithm 40 4.4 The Proposed Detecting Algorithm 43 4.5 Experimental Results 44 Chapter 5 The Adaptive Spread-Spectrum Data Hiding Using Communication Sequences 49 5.1 Motivation 49 5.2 Overview of Several Communication Sequences 50 5.2.1 Complementary Series 51 5.2.2 Complete complementary Codes 52 5.2.3 Binary Zero Correlation Zone Sequences 57 5.3 The Modified Embedding Algorithm 61 5.4 Experimental Results 62 5.4.1 Result I:Using a Series of Communication Sequence 62 5.4.2 Result II:Using More Than One Series of Communication Sequence 64 5.5 Discussion 67 Chapter 6 Audio and Optical Cryptography 69 6.1 Audio Cryptography 69 6.1.1 Interference of Sound and Stereo Conception 70 6.1.2 The Audio Cryptographic Scheme 71 6.1.3 Demonstration 72 6.2 Optical Cryptography 74 6.2.1 The Optical Cryptographic Scheme 74 6.2.2 Experimental Results 75 6.2.3 Demonstration 77 Chapter 7 Conclusion 79 References 81 | en |
dc.format.extent | 2529026 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.language | en-US | en |
dc.language.iso | en_US | - |
dc.subject | 音訊資料隱藏 | en |
dc.subject | 數位浮水印 | en |
dc.subject | 展頻通訊 | en |
dc.subject | 通信序列 | en |
dc.subject | 音訊加密 | en |
dc.subject | 光學加密 | en |
dc.subject | 秘密共享 | en |
dc.subject | audio data hiding | en |
dc.subject | digital watermarking | en |
dc.subject | spread-spectrum communication | en |
dc.subject | communication sequences | en |
dc.subject | audio cryptography | en |
dc.subject | optical cryptography | en |
dc.subject | secret sharing | en |
dc.title | 利用數位通信序列作音訊資料隱藏 | zh |
dc.title | Audio Data Hiding Using Digital Communication Sequences | en |
dc.type | thesis | en |
dc.identifier.uri.fulltext | http://ntur.lib.ntu.edu.tw/bitstream/246246/58622/1/ntu-96-R94942050-1.pdf | - |
dc.relation.reference | [1]Hamza Özer, Bülent Sankur, Nasir Memon and İsmail Avcıbaş,“Detection of audio covert channels using statistical footprints of hidden messages”, Digital Signal Processing 16, pp.389-401, 2006. [2] Boney L., Tewfik A.H and Hamdy K.N., “Digital Watermarks for Audio Signals”, Proceedings of the 3rd IEEE International Conference on Multimedia Computing and Systems, pp. 473-480, June 1996. [3] Yong Hun Kim, Hwan Il Kang, Kab Il Kim and Seung-Soo Han, “A Digital Audio Watermarking Using Two Masking Effects”, IEEE Pacific Rim Conference on Multimedia Hsinchu, pp. 655-662, Dec. 16-18, 2002. [4] Soo Chang Pei and Tuan Hsiang Yai, “Digital Audio Watermarking Technique Utilizing Human Auditory System”, the Chinese Image Processing and Pattern Recognition Society, vol. 6, no. 1, 2000. [5] Noll P., “MPEG Digital Audio Coding”, IEEE Signal Processing Magazine, pp.59-81, Sept. 1997. [6] R.Garcia, “Digital Watermarking of Audio Signals Using a Psychoacoustic Auditory Model and Spread Spectrum Theory”, 107th AES Convention, New York, Sept. 1999. [7] P. Ahrendt, A. Meng and J. Larsen, “Decision Time Horizon for Music Genre Classification Using Short Time Features”, Proc. of EUSIPCO, pp.1293-1296, 2004. [8] Jongwon Seok, Jinwoo Hong, and Jinwoong Kim, “A Novel Audio Watermarking Algorithm for Copyright Protection of Digital Audio“, ETRI Journal, vol. 24, no. 3, pp. 181-189, June 2002. [9] Ya Wen Lv,“Digital audio watermarking and audio retrieval”, Graduate Institute of Communication Engineeringof National Taiwan University, June 2003. [10] Foo Say Wei, Xue Feng and Li Mengyuan, “A Blind Audio Watermarking Scheme Using Peak Point Extraction”, IEEE International Symposium on Circuits and Systems, vol. 5, pp. 4409-4412, 23-26 May 2005. [11] Xiang-Yang Wang and Hong Zhao, “A Novel Synchronization Invariant Audio Watermarking Scheme Based on DWT and DCT”, IEEE Transactions on Signal Processing, vol. 54, no. 12, pp. 4835-4840, Dec. 2006. [12] W. Bender, D. Gruhl, N. Morimoto and A. Lu, “Techniques for data hiding”, IBM Systems Journal, vol. 35, pp. 313-336, 1996. [13] Tiberiu Muntean, Eric Grivel and Mohamed Najim, “Audio Digital Watermarking Based on Hybrid Spread Spectrum”. Proceedings. Second International Conference on Web Delivering of Music, pp. 150 – 155, Dec., 2002. [14] Sang-Kwang Lee; Yo-Sung Ho, “Digital Audio Watermarking in the Cepstrum Domain”, IEEE Transactions on Consumer Electronics, vol. 46, no.3, pp. 744-750, Aug. 2000. [15] G. Cano Rodríguez, M. Nakano Miyatake, H. M. Pérez Meana, “Analysis of Audio Watermarking Schemes”, 2nd International Conference on Electrical and Electronics Engineering and XI Conference on Electrical Engineering, pp. 17-20, Sept. 7-9, 2005. [16] Mark Sterling, Edward L. Titlebaum, Xiaoxiao Dong, Mark F. Bocko, ” An Adaptive Spread-spectrum Data Hiding Technique for Digital Audio”, IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 5, pp. 685-688, March 18-23, 2005. [17] Costas, J. P. "A Study of Detection Waveforms Having Nearly Ideal Range-Doppler Ambiguity Properties", Proceedings of the IEEE Publication properties, vol. 72, pp. 996-1009, Aug. 1984. [18] Maric, S.V.; Seskar, I.; Titlebaum, E.L. “On Cross-Ambiguity Properties of Welch-Costas Arrays,” IEEE Transactions on Aerospace and Electronic Systems , vol. 30, issue 4, pp. 1063 -1071, Oct. 1994. [19] S. W. Golomb and H. Taylor, “Two Dimensional Synchronization Patterns for Minimum Ambiguity,” IEEE Trans. Inform. Theory, vol. IT-28, no. 4, pp. 600-604, 1982. [20] Richard Y. Chiao and Xiaohui Hao, “Coded Excitation for Diagnostic Ultrasound: A System Developer’s Perspective”, IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control, vol. 52, no. 2, pp.160-170, Feb. 2005. [21] M. J. E. Golay, “Complementary Series,” IRE Trans. Info. Theory, vol. IT-7, pp. 82–87, Apr. 1961. [22] N. Suehiro and M. Hatori, “N-Shift Cross-Orthogonal Sequences,” IEEE Trans. Inform. Theory, vol. 34, pp. 143-146, 1988. [23] Hsiao-Hwa Chen, Jun-Feng Yeh, and Naoki Suehiro, “A Multicarrier CDMA Architecture Based on Orthogonal Complementary Codes for New Generations of Wideband Wireless Communication,” IEEE Communication Magazine, pp. 126-135, Oct. 2001. [24] H. Donelan and T. O’Farrell, “Large Families of Ternary Sequences with Aperiodic Zero Correlation Zones for a MC-DS-CDMA System,” The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, vol. 5, pp. 2322-2326, Sept. 2002. [25] P.Z. Fan, N. Suehiro, N. Kuroyanagi and X.M. Deng, “Class of Binary Sequences with Zero Correlation Zone,” IEEE Electronics Letters, vol.35, no.10, pp. 777-779, 13th May 1999. [26] Yvo Desmedt, Shuang Hou and Jean-Jacques Quisquater, “Audio and Optical Cryptography,” ASIACRYPT’98, Lecture Notes in Computer Science 1514, pp. 392-404, 1998. | en |
item.openairecristype | http://purl.org/coar/resource_type/c_46ec | - |
item.openairetype | thesis | - |
item.languageiso639-1 | en_US | - |
item.grantfulltext | open | - |
item.cerifentitytype | Publications | - |
item.fulltext | with fulltext | - |
顯示於: | 電信工程學研究所 |
檔案 | 描述 | 大小 | 格式 | |
---|---|---|---|---|
ntu-96-R94942050-1.pdf | 23.31 kB | Adobe PDF | 檢視/開啟 |
在 IR 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。