貝蘇章臺灣大學:電信工程學研究所黃馨儀Huang, Hsin-YiHsin-YiHuang2007-11-272018-07-052007-11-272018-07-052007http://ntur.lib.ntu.edu.tw//handle/246246/58622隨著全球邁入網際網路發達與3C(電腦、通訊、消費性電子)產品普及的數位時代,傳播與下載數位資訊變得十分方便。然而,科技的進步雖然提昇了工作效率,卻令盜版及違法使用日益猖獗,因此,資料隱藏技術顯得格外重要,其中數位浮水印可以用來保護多媒體的智慧財產權;數位指紋則可以提供證據找出違法的拷貝者或傳播者。 本篇論文提出一項音訊資料隱藏技術,視數種數位的通信序列為祕密寫作的信號,將欲隱藏的二元資訊加入秘密寫作信號中,再一起藏入原來的音訊,且不被人耳察覺。通信序列包括跳頻展頻序列:Welch-Costas 陣列、完全互補碼與二元零相關區域序列。此方法具有自我同步的特性,且利用對應的匹配濾波器重新找回藏入的位元。進一步引入音訊秘密共享的概念,同時使用多組特定序列當作秘密寫作信號,更能增加偵測位元的正確率,使錯誤率降至0.1以下,達到資料隱藏的目的。 接下來,我們會介紹音訊及光學的密碼系統,兩組系統均以干涉特性為基礎,屬於秘密共享的範疇,分別共享音樂或靜態影像。這些共享資料不僅提供良好的隱密性,更保有原始資料的品質,讓人們不會懷疑其真偽。解密方式也不再侷限於使用電腦,透過收聽喇叭或耳機能解開音訊加密,而Mach-Zehnder干涉計則能解開光學加密。The whole world has evolved into a 3C (including computer, communication and consumer electronics products) age with booming Internet connectivity. By following progress of the digital age, it is easy for people to distribute and download digital files which have caused serious problem of piracy in media distribution. Therefore, data hiding techniques become important in particular. Digital watermarking scheme is used to protect the intellectual property rights of multimedia and digital fingerprinting is applied to provide an evidence for finding illegal users. In this paper, we propose an audio data hiding technique which takes several digital communication sequences, including Welch-Costas (W-C) arrays, complete complementary (CC) codes and binary zero correlation zone (ZCZ) sequences, as the steganographic signals. The binary information is embedded into the steganographic signal that is subsequently hidden to the host signal and the watermarked signal is inaudible for human hearing. The method is self-synchronizing and allows us to recover embedded bits with a corresponding matched filter. Furthermore, we use more than one series of the communication sequence to implement the embedding algorithm. This can reduce the error rate below 0.1 errors. Next, audio and optical cryptographic schemes based on interference property of waves are introduced. Two schemes are also secret sharing schemes in which shares are music or images and are not suspect to human perception. They guarantee perfect privacy as well as high quality. It is stated that using computer is not the only way to decrypt the message. For audio cryptographic scheme, we can play two shares on a stereo system, either players or headphones. For optical cryptographic scheme, the Mach-Zehnder interferometer is used as a decryption machine.Chapter 1 Introduction 1 1.1 Overview of Digital Data Hiding 1 1.2 Thesis Organization 3 Chapter 2 Related Works in Digital Audio Watermarking and Audio Data Hiding 5 2.1 Human Audio System 5 2.1.1 Critical Bands and Absolute Threshold 5 2.1.2 Frequency and Temporal Masking Effect 7 2.1.3 Psychoacoustics Model 10 2.2 Properties of Digital Watermarks 13 2.3 Attacks and Synchronization 15 2.3.1 Attacks 15 2.3.2 Synchronization 17 Chapter 3 Summaries of Audio Data Hiding Schemes 21 3.1 Audio Environments 21 3.2 Low-bit Coding 23 3.3 Phase Coding 23 3.4 Spread Spectrum Scheme 26 3.5 Cepstrum Domain Scheme 29 3.6 Echo Data Hiding 32 Chapter 4 An Adaptive Spread-Spectrum Data Hiding Technique for Digital Audio 35 4.1 Introduction 35 4.2 Welch-Costas Array 36 4.3 The Proposed Embedding Algorithm 40 4.4 The Proposed Detecting Algorithm 43 4.5 Experimental Results 44 Chapter 5 The Adaptive Spread-Spectrum Data Hiding Using Communication Sequences 49 5.1 Motivation 49 5.2 Overview of Several Communication Sequences 50 5.2.1 Complementary Series 51 5.2.2 Complete complementary Codes 52 5.2.3 Binary Zero Correlation Zone Sequences 57 5.3 The Modified Embedding Algorithm 61 5.4 Experimental Results 62 5.4.1 Result I:Using a Series of Communication Sequence 62 5.4.2 Result II:Using More Than One Series of Communication Sequence 64 5.5 Discussion 67 Chapter 6 Audio and Optical Cryptography 69 6.1 Audio Cryptography 69 6.1.1 Interference of Sound and Stereo Conception 70 6.1.2 The Audio Cryptographic Scheme 71 6.1.3 Demonstration 72 6.2 Optical Cryptography 74 6.2.1 The Optical Cryptographic Scheme 74 6.2.2 Experimental Results 75 6.2.3 Demonstration 77 Chapter 7 Conclusion 79 References 812529026 bytesapplication/pdfen-US音訊資料隱藏數位浮水印展頻通訊通信序列音訊加密光學加密秘密共享audio data hidingdigital watermarkingspread-spectrum communicationcommunication sequencesaudio cryptographyoptical cryptographysecret sharing利用數位通信序列作音訊資料隱藏Audio Data Hiding Using Digital Communication Sequencesthesishttp://ntur.lib.ntu.edu.tw/bitstream/246246/58622/1/ntu-96-R94942050-1.pdf