[go: up one dir, main page]

CN111755018B - Audio hiding method and device based on wavelet transform and quantized embedded key - Google Patents

Audio hiding method and device based on wavelet transform and quantized embedded key Download PDF

Info

Publication number
CN111755018B
CN111755018B CN202010407132.1A CN202010407132A CN111755018B CN 111755018 B CN111755018 B CN 111755018B CN 202010407132 A CN202010407132 A CN 202010407132A CN 111755018 B CN111755018 B CN 111755018B
Authority
CN
China
Prior art keywords
audio
key
frequency coefficient
extremum
carrier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010407132.1A
Other languages
Chinese (zh)
Other versions
CN111755018A (en
Inventor
曾德炉
廖敏瑜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China University of Technology SCUT
Original Assignee
South China University of Technology SCUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China University of Technology SCUT filed Critical South China University of Technology SCUT
Priority to CN202010407132.1A priority Critical patent/CN111755018B/en
Publication of CN111755018A publication Critical patent/CN111755018A/en
Application granted granted Critical
Publication of CN111755018B publication Critical patent/CN111755018B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/018Audio watermarking, i.e. embedding inaudible data in the audio signal
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

本发明公开了一种基于小波变换及量化嵌入密钥的音频隐藏方法及装置,方法包括以下步骤:获取载体音频和秘密音频,对载体音频进行二次小波变换,获得待嵌入隐蔽信息的位置;提取秘密音频的极值和极值坐标,根据极值和极值坐标获取隐蔽信息;根据待嵌入隐蔽信息的位置,将隐蔽信息嵌入载体音频中,获得第一音频;利用量化方法将密钥嵌入未含有隐蔽信息的载体音频,获得第二音频,串联第一音频和第二音频获得传输音频。本发明对载体音频做二次小波变换,以嵌入秘密音频的极值及其差分序列,以使在鲁棒性和透明性中达到均衡;另外,利用量化方法将密钥水印嵌入到载体音频中,进一步音频传输的安全性,可广泛应用于信息安全领域。

The invention discloses an audio concealment method and device based on wavelet transform and quantization embedding key. The method includes the following steps: acquiring carrier audio and secret audio, performing secondary wavelet transform on the carrier audio, and obtaining the position of concealed information to be embedded; Extract the extremum and extremum coordinates of the secret audio, and obtain the concealed information according to the extremum and extremum coordinates; according to the location of the concealed information to be embedded, embed the concealed information into the carrier audio to obtain the first audio; use the quantization method to embed the key The carrier audio that does not contain the concealed information is used to obtain the second audio, and the first audio and the second audio are concatenated to obtain the transmission audio. The present invention performs secondary wavelet transformation on the carrier audio to embed the extremum of the secret audio and its differential sequence, so as to achieve a balance in robustness and transparency; in addition, the key watermark is embedded into the carrier audio by using a quantization method , to further enhance the security of audio transmission, and can be widely used in the field of information security.

Description

基于小波变换及量化嵌入密钥的音频隐藏方法及装置Audio hiding method and device based on wavelet transform and quantized embedded key

技术领域technical field

本发明涉及信息安全领域,尤其涉及一种基于小波变换及量化嵌入密钥的音频隐藏方法及装置。The invention relates to the field of information security, in particular to an audio hiding method and device based on wavelet transform and quantized embedded key.

背景技术Background technique

随着多媒体技术的迅速发展,给人们带来了许多娱乐和便利,但同时也暴露出严重的安全问题。网络传输中信息的非法截取导致信息泄露也是一重要的信息安全问题,特别是军事、金融、商业等领域的机密信息,“保护信息”及“掩护通信”也是网络信息安全领域的研究热点之一。With the rapid development of multimedia technology, it has brought a lot of entertainment and convenience to people, but it also exposed serious security problems. Illegal interception of information in network transmission leads to information leakage is also an important information security issue, especially confidential information in military, financial, commercial and other fields, "protecting information" and "covering communication" are also one of the research hotspots in the field of network information security .

音频隐藏系统是将一段秘密音频隐藏到另一载体中,并且不会破坏原载体的信息,将携带秘密的载体传输完毕后仍可提取出嵌在里面的秘密音频。隐藏技术相较于“自我打乱顺序”的加密技术,隐藏技术在保护秘密音频上更具优势。音频文件相较于文字图片等文件,音频含有音调、音色、语速等难以替代且独一无二的个人特征,因此隐藏音频的研究更有意义。然而,秘密音频信息数据量大,数据的存储方式更加复杂和存在一些冗余信息,使得嵌入容量大导致隐藏难度大。但另一方面,音频数据的复杂性也说明了音频本身可作为载体,用于隐藏音频。The audio hiding system is to hide a piece of secret audio in another carrier without destroying the information of the original carrier. After the carrier carrying the secret is transmitted, the secret audio embedded in it can still be extracted. Concealment technology Compared with "self-scrambling" encryption technology, concealment technology has more advantages in protecting secret audio. Compared with files such as text and pictures, audio files contain irreplaceable and unique personal characteristics such as pitch, timbre, and speech rate, so research on hiding audio is more meaningful. However, the data volume of secret audio information is large, the storage method of data is more complex and there are some redundant information, which makes the embedding capacity large and makes hiding difficult. But on the other hand, the complexity of audio data also shows that audio itself can be used as a carrier to hide audio.

在音频隐藏技术发展史中,经典的音频隐藏技术有以下四种:最不重要位方法,扩展频谱方法,相位编码方法和回声编码方法,这四种方法操作简单且具有较好的透明性。隐藏系统在传输过程中虽不易受到有意攻击的影响,但是易受到无意攻击,例如:TSM攻击、噪声攻击、随机剪切攻击、点攻击、压缩攻击、降噪攻击等。这四种经典方法在抗各种攻击的效果相对较差,易于被这些无意攻击更改而难以提取出里面的秘密信息。小波分析最初用于压缩,去噪,但随着计算机技术的发展及数学理论的完善,在信号处理中也取得许多成果。小波分析在时域和频域都具有局部特性,有别于傅里叶变换会影响整个时域,因而更加适合动态隐藏技术。In the development history of audio concealment technology, there are four classic audio concealment techniques: least significant bit method, spread spectrum method, phase coding method and echo coding method. These four methods are simple to operate and have good transparency. Although the hidden system is not easily affected by intentional attacks during transmission, it is vulnerable to unintentional attacks, such as: TSM attack, noise attack, random clipping attack, point attack, compression attack, noise reduction attack, etc. These four classic methods are relatively poor in resisting various attacks, and are easy to be changed by these unintentional attacks, making it difficult to extract the secret information inside. Wavelet analysis was originally used for compression and denoising, but with the development of computer technology and the improvement of mathematical theory, many achievements have been made in signal processing. Wavelet analysis has local characteristics in both time domain and frequency domain, which is different from Fourier transform which affects the entire time domain, so it is more suitable for dynamic concealment technology.

发明内容Contents of the invention

为了解决上述技术问题之一,本发明的目的是提供一种基于小波变换及量化嵌入密钥的音频隐藏方法及装置。In order to solve one of the above technical problems, the object of the present invention is to provide an audio hiding method and device based on wavelet transform and quantized embedded key.

本发明所采用的技术方案是:The technical scheme adopted in the present invention is:

一种基于小波变换及量化嵌入密钥的音频隐藏方法,包括以下步骤:An audio hiding method based on wavelet transform and quantized embedded key, comprising the following steps:

获取载体音频和秘密音频,对载体音频进行二次小波变换,获得待嵌入隐蔽信息的位置;Obtain carrier audio and secret audio, perform secondary wavelet transform on the carrier audio, and obtain the position to be embedded with hidden information;

提取秘密音频的极值和极值坐标,根据极值和极值坐标获取隐蔽信息;Extract the extremum and extremum coordinates of the secret audio, and obtain hidden information according to the extremum and extremum coordinates;

根据待嵌入隐蔽信息的位置,将隐蔽信息嵌入载体音频中,获得第一音频;Embedding the concealed information into the carrier audio according to the position of the concealed information to be embedded to obtain the first audio;

利用量化方法将密钥嵌入未含有隐蔽信息的载体音频,获得第二音频,串联第一音频和第二音频获得传输音频。A quantization method is used to embed the key into the carrier audio that does not contain concealed information to obtain the second audio, and to concatenate the first audio and the second audio to obtain the transmission audio.

进一步,所述提取秘密音频的极值和极值坐标,根据极值和极值坐标获取隐蔽信息,包括:Further, the extracting the extremum and extremum coordinates of the secret audio, and obtaining concealed information according to the extremum and extremum coordinates include:

提取秘密音频的极值和极值坐标;extract the extrema and extrema coordinates of the secret audio;

提取极值坐标的差分序列,以及对极值及极值坐标的差分序列做伸缩变换;Extract the difference sequence of the extreme value coordinates, and perform stretching transformation on the difference sequence of the extreme value and the extreme value coordinates;

将伸缩变换后的极值及极值坐标的差分序列进行Haar小波一级重构,获得隐蔽信息。The difference sequence of extremum and extremum coordinates after telescopic transformation is reconstructed by Haar wavelet to obtain hidden information.

进一步,所述对载体音频进行二次小波变换,获得待嵌入隐蔽信息的位置,包括:Further, the second wavelet transform is performed on the carrier audio to obtain the position of the hidden information to be embedded, including:

对载体音频做二级Haar小波分解,获得第一高频系数、第一中频系数和第一低频系数;Carrier audio is decomposed by two-level Haar wavelets to obtain the first high-frequency coefficient, the first intermediate-frequency coefficient and the first low-frequency coefficient;

对第一中频系数进行Haar小波一级分解,获得第二高频系数和第二低频系数,将第二低频系数所处位置作为待嵌入隐蔽信息的位置。The Haar wavelet first-level decomposition is performed on the first intermediate-frequency coefficient to obtain the second high-frequency coefficient and the second low-frequency coefficient, and the position of the second low-frequency coefficient is used as the position to be embedded with hidden information.

进一步,所述根据待嵌入隐蔽信息的位置,将隐蔽信息嵌入载体音频中,获得第一音频,包括:Further, the embedding the concealed information into the carrier audio according to the position of the concealed information to be embedded to obtain the first audio includes:

将隐蔽信息嵌入第二低频系数,获得第三低频系数;Embedding the hidden information into the second low-frequency coefficient to obtain the third low-frequency coefficient;

将第二高频系数和第三低频系数进行二次Haar小波变换的重构,获得第三中频系数;The second high-frequency coefficient and the third low-frequency coefficient are subjected to the reconstruction of the second Haar wavelet transform to obtain the third intermediate-frequency coefficient;

将第一高频系数、第三中频系数和第一低频系数进行Haar小波一级重构,获得第一音频。The first audio frequency is obtained by performing Haar wavelet first-level reconstruction on the first high-frequency coefficient, the third intermediate-frequency coefficient and the first low-frequency coefficient.

进一步,所述利用量化方法将密钥水印嵌入未含有隐蔽信息的载体音频,获得第二音频,串联第一音频和第二音频获得传输音频,包括:Further, the method of embedding the key watermark into the carrier audio that does not contain concealed information using a quantization method to obtain the second audio, and concatenating the first audio and the second audio to obtain the transmission audio includes:

获取极值序列的长度作为密钥,将密钥转化为二值编码;Obtain the length of the extremum sequence as the key, and convert the key into a binary code;

将未含有隐蔽信息的载体音频进行离散余弦变换,获得第四低频系数和第四高频系数;performing discrete cosine transform on the carrier audio that does not contain concealed information to obtain a fourth low-frequency coefficient and a fourth high-frequency coefficient;

将二值编码量化嵌入第四低频系数,获得第五低频系数;Embedding the binary coded quantization into the fourth low-frequency coefficient to obtain the fifth low-frequency coefficient;

对第五低频系数和第四高频系数进行离散余弦逆变换,获得含有密钥的载体音频作为第二音频;Inverse discrete cosine transform is performed on the fifth low-frequency coefficient and the fourth high-frequency coefficient to obtain the carrier audio containing the key as the second audio;

将第一音频和第二音频进行串联,获得传输音频。Connect the first audio and the second audio in series to obtain transmission audio.

进一步,还包括以下步骤:Further, the following steps are also included:

获得传输音频,采用离散余弦变换从传输音频中提取密钥;Obtain the transmitted audio, and extract the key from the transmitted audio by discrete cosine transform;

结合密钥和二次小波变换从传输音频中获取秘密音频。Combining secret key and quadratic wavelet transform to obtain secret audio from transmitted audio.

进一步,所述采用离散余弦变换从传输音频中提取密钥,包括:Further, said adopting the discrete cosine transform to extract the key from the transmission audio includes:

对含有密钥的传输音频进行离散余弦变换,获得第六低频系数;Discrete cosine transform is performed on the transmission audio containing the key to obtain the sixth low-frequency coefficient;

从第六低频系数中获取二值编码,将二值编码转化为密钥。A binary code is obtained from the sixth low-frequency coefficient, and the binary code is converted into a key.

进一步,所述结合密钥和二次小波变换从传输音频中获取秘密音频,包括:Further, the combination of key and secondary wavelet transform to obtain secret audio from transmission audio includes:

根据密钥从传输音频中获取含有隐蔽信息的第三音频,对第三音频进行Haar小波二级分解,获得第四中频系数;Obtaining a third audio containing concealed information from the transmission audio according to the key, and performing Haar wavelet secondary decomposition on the third audio to obtain a fourth intermediate frequency coefficient;

对第四中频系数进行Haar小波一级分解,获得第七低频系数;Perform Haar wavelet first-level decomposition on the fourth intermediate frequency coefficient to obtain the seventh low frequency coefficient;

从第七低频系数中获取隐蔽信息,所述隐蔽信息包括极值及极值坐标的差分序;obtaining concealed information from the seventh low-frequency coefficient, the concealed information including extremums and differential sequences of extremum coordinates;

将极值及极值坐标的差分序进行一阶样条插值,获得秘密音频。Perform first-order spline interpolation on the extreme value and the difference sequence of the extreme value coordinates to obtain the secret audio.

本发明所采用的另一技术方案是:Another technical scheme adopted in the present invention is:

一种基于小波变换及量化嵌入密钥的音频隐藏装置,音频变换模块,用于获取载体音频和秘密音频,对载体音频进行二次小波变换,获得待嵌入隐蔽信息的位置;An audio concealment device based on wavelet transform and quantized embedding key, an audio transform module, used to obtain carrier audio and secret audio, perform secondary wavelet transform on the carrier audio, and obtain the position of hidden information to be embedded;

极值提取模块,用于提取秘密音频的极值和极值坐标,根据极值和极值坐标获取隐蔽信息;The extremum extraction module is used to extract the extremum and extremum coordinates of the secret audio, and obtain hidden information according to the extremum and extremum coordinates;

音频嵌入模块,用于根据待嵌入隐蔽信息的位置,将隐蔽信息嵌入载体音频中,获得第一音频;The audio embedding module is used to embed the concealed information into the carrier audio according to the position of the concealed information to be embedded to obtain the first audio;

密钥嵌入模块,用于利用量化方法将密钥嵌入未含有隐蔽信息的载体音频,获得第二音频,串联第一音频和第二音频获得传输音频。The key embedding module is used to embed the key into the carrier audio that does not contain hidden information by using a quantization method to obtain the second audio, and concatenate the first audio and the second audio to obtain the transmission audio.

本发明所采用的另一技术方案是:Another technical scheme adopted in the present invention is:

一种基于小波变换及量化嵌入密钥的音频隐藏装置,包括:An audio concealment device based on wavelet transform and quantized embedded key, comprising:

至少一个处理器;at least one processor;

至少一个存储器,用于存储至少一个程序;at least one memory for storing at least one program;

当所述至少一个程序被所述至少一个处理器执行,使得所述至少一个处理器实现上所述方法。When the at least one program is executed by the at least one processor, the at least one processor implements the above method.

本发明的有益效果是:本发明对载体音频做二次小波变换,从而找到不可感知性和鲁棒性均衡的位置,以嵌入秘密音频的极值及其差分序列,以使在鲁棒性和透明性中达到均衡;另外,为了不再开通秘密通道来传输密钥,利用量化方法将密钥水印嵌入到载体音频中,进一步音频传输的安全性。The beneficial effect of the present invention is: the present invention does secondary wavelet transform to carrier audio frequency, thereby finds the position that imperceptibility and robustness are balanced, to embed extremum of secret audio frequency and difference sequence thereof, make in robustness and robustness In addition, in order not to open a secret channel to transmit the key, the quantization method is used to embed the key watermark into the carrier audio to further enhance the security of audio transmission.

附图说明Description of drawings

图1是实施例中音频隐藏系统的结构示意图;Fig. 1 is a schematic structural diagram of an audio hiding system in an embodiment;

图2是实施例中秘密音频嵌入过程及密钥水印嵌入过程的流程图;Fig. 2 is the flowchart of secret audio embedding process and key watermark embedding process in the embodiment;

图3是实施例中含有隐蔽信息的载体音频和原载体音频的对比示意图;Figure 3 is a schematic diagram of the comparison between the carrier audio containing concealed information and the original carrier audio in the embodiment;

图4是实施例中密钥水印提取过程及秘密音频提取过程的流程图;Fig. 4 is the flowchart of key watermark extraction process and secret audio extraction process in the embodiment;

图5是实施例中采用一阶样条插值得到的秘密音频与原秘密音频的对比图;Fig. 5 is the comparison chart of the secret audio obtained by first-order spline interpolation and the original secret audio in the embodiment;

图6是实施例中一种基于小波变换及量化嵌入密钥的音频隐藏装置的结构框图。Fig. 6 is a structural block diagram of an audio hiding device based on wavelet transform and quantization embedding key in an embodiment.

具体实施方式Detailed ways

下面详细描述本发明的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,仅用于解释本发明,而不能理解为对本发明的限制。Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

在本发明的描述中,需要理解的是,涉及到方位描述,例如上、下、前、后、左、右等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本发明和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本发明的限制。In the description of the present invention, it should be understood that the orientation descriptions, such as up, down, front, back, left, right, etc. indicated orientations or positional relationships are based on the orientations or positional relationships shown in the drawings, and are only In order to facilitate the description of the present invention and simplify the description, it does not indicate or imply that the device or element referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus should not be construed as limiting the present invention.

在本发明的描述中,若干的含义是一个或者多个,多个的含义是两个以上,大于、小于、超过等理解为不包括本数,以上、以下、以内等理解为包括本数。如果有描述到第一、第二只是用于区分技术特征为目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量或者隐含指明所指示的技术特征的先后关系。In the description of the present invention, several means one or more, and multiple means more than two. Greater than, less than, exceeding, etc. are understood as not including the original number, and above, below, within, etc. are understood as including the original number. If the description of the first and second is only for the purpose of distinguishing the technical features, it cannot be understood as indicating or implying the relative importance or implicitly indicating the number of the indicated technical features or implicitly indicating the order of the indicated technical features relation.

本发明的描述中,除非另有明确的限定,设置、安装、连接等词语应做广义理解,所属技术领域技术人员可以结合技术方案的具体内容合理确定上述词语在本发明中的具体含义。In the description of the present invention, unless otherwise clearly defined, words such as setting, installation, and connection should be understood in a broad sense, and those skilled in the art can reasonably determine the specific meanings of the above words in the present invention in combination with the specific content of the technical solution.

本实施例基于小波变换和量化嵌入密钥的音频隐藏系统,结构示意图如图1所示,分为秘密信息发送端和秘密信息接收端,其中,秘密音频发送端包含秘密信息嵌入过程和密钥水印嵌入过程,秘密音频接收端包含密钥水印提取过程和秘密信息提取过程。This embodiment is based on wavelet transform and quantized audio hiding system with embedded key. The structural diagram is shown in Figure 1, which is divided into a secret information sending end and a secret information receiving end, wherein the secret audio sending end includes a secret information embedding process and a key In the watermark embedding process, the secret audio receiver includes the key watermark extraction process and the secret information extraction process.

所述四个过程涉及到的具体方法如下:The specific methods involved in the four processes are as follows:

所述秘密信息嵌入过程,涉及到一种基于二次小波变换的信息嵌入方法,将另一段音频作为秘密音频隐藏的载体,包括如下步骤1.1-步骤1.6:The secret information embedding process involves a secondary wavelet transform-based information embedding method, using another segment of audio as a hidden carrier for secret audio, including the following steps 1.1-step 1.6:

步骤1.1:提取秘密音频的极值及极值坐标。Step 1.1: Extract the extrema and extremum coordinates of the secret audio.

设秘密音频的长度为n×1,将音频序列记为secret={secreti|0≤i≤n}。则该音频信号的极值坐标序列Loc为:Let the length of the secret audio be n×1, and record the audio sequence as secret={secret i |0≤i≤n}. Then the extreme value coordinate sequence Loc of the audio signal is:

Loc={i+1|tempi-tempi-1=-2or tempi-tempi-1=2,i=1,2,…,n-1}Loc={i+1|temp i -temp i-1 =-2or temp i -temp i-1 =2,i=1,2,…,n-1}

其中:temp=sign(diff(secret))。Where: temp=sign(diff(secret)).

那么极值序列optima为:Then the extreme value sequence optima is:

optima={secreti|i∈Loc}optima={secret i |i∈Loc}

步骤1.2:提取极值坐标的差分序列。Step 1.2: Extract the difference sequence of the extremal coordinates.

极值坐标的差分序列Locdiff如下:The differential sequence Loc diff of the extreme coordinates is as follows:

Locdiff={Loc1}∪{Loci-Loci-1|i>1}Loc diff ={Loc 1 }∪{Loc i -Loc i - 1 |i>1}

步骤1.3:将伸缩变换后的极值及其坐标差分序列进行Haar小波一级重构得到隐蔽信息。Step 1.3: Perform Haar wavelet first-level reconstruction on the extremum and its coordinate difference sequence after stretching transformation to obtain hidden information.

将极值序列optima变成原来的x倍,将坐标差分序列Locdiff变为原来的y倍,分别作为小波重构的低频系数和高频系数,两两匹配重构得到一个隐蔽序列S。The extremum sequence optima is changed to the original x times, and the coordinate difference sequence Loc diff is changed to the original y times, which are used as the low-frequency coefficients and high-frequency coefficients of the wavelet reconstruction respectively, and a hidden sequence S is obtained by pairwise matching reconstruction.

其中,参数x,y通常是根据音频的强度自适应调节,将变换因子x,y作为两个密钥。Among them, the parameters x, y are usually adaptively adjusted according to the intensity of the audio, and the transformation factors x, y are used as two keys.

步骤1.4:对载体音频做二次Haar小波分解。Step 1.4: Perform secondary Haar wavelet decomposition on the carrier audio.

步骤1.4.1:对载体音频做二级Haar小波分解。Step 1.4.1: Perform second-level Haar wavelet decomposition on the carrier audio.

记载体音频信号为carrier,先用Haar小波对载体信号做二级小波分解,得到分解后的低频系数cA10,高频系数cD10及中频系数cD10。The volume audio signal is recorded as carrier, and Haar wavelet is used to decompose the carrier signal by two-level wavelet first, and the decomposed low frequency coefficient cA10, high frequency coefficient cD10 and intermediate frequency coefficient cD10 are obtained.

步骤1.4.2:对步骤1.4.1产生的中频系数作Haar小波一级分解。Step 1.4.2: Perform Haar wavelet first-level decomposition on the intermediate frequency coefficients generated in step 1.4.1.

再用Haar小波对中频系数cD10做一级小波分解,得到低频相似系数cA11和高频系数cD11。Then, Haar wavelet is used to decompose the intermediate frequency coefficient cD10 to obtain the low frequency similarity coefficient cA11 and high frequency coefficient cD11.

步骤1.5:在步骤1.4.2中产生的低频系数cA11中嵌入隐蔽信息。Step 1.5: Embed concealed information in the low-frequency coefficient cA11 generated in step 1.4.2.

计算二次小波变换的低频系数cA11的长度LcA11,同时计算秘密音频极值序列optima的长度LoptimaCalculate the length L cA11 of the low-frequency coefficient cA11 of the quadratic wavelet transform, and at the same time calculate the length L optima of the secret audio extremum sequence optima.

若LcA11<2×Loptima,表明嵌入位置不够存放隐蔽序列,需要将载体音频加长,即跳转回步骤1.4。If L cA11 <2×L optima , it indicates that the embedding position is not enough to store the hidden sequence, and the carrier audio needs to be lengthened, that is, jump back to step 1.4.

若LcA11≥2×Loptima,将隐蔽序列S替换掉cA11的前部分,得到一个新的低频系数cA11newIf L cA11 ≥ 2×L optima , replace the front part of cA11 with the covert sequence S to obtain a new low-frequency coefficient cA11 new .

其中,将极值序列optima的长度Loptima作为一个密钥。Wherein, the length L optima of the extremum sequence optima is used as a key.

步骤1.6:对含有隐蔽信息的小波系数做二次Haar小波变换的重构。Step 1.6: Reconstruct the wavelet coefficients containing hidden information by secondary Haar wavelet transform.

步骤1.6.1:将高频系数和含有隐蔽信息的低频系数进行Haar小波一级重构。Step 1.6.1: Perform Haar wavelet first-level reconstruction on high-frequency coefficients and low-frequency coefficients containing hidden information.

将未变化的高频系数cD11和嵌有隐蔽信息的cA11new重构回新的中频系数cD1onewReconstruct the unchanged high-frequency coefficient cD11 and cA11 new embedded with hidden information into a new intermediate-frequency coefficient cD1o new ;

步骤1.6.2:将低频、高频和含有隐蔽信息的中频系数进行Haar小波二级重构。Step 1.6.2: Perform Haar wavelet secondary reconstruction on the low-frequency, high-frequency and intermediate-frequency coefficients containing hidden information.

再将cD10new和未变化的cD20和cA10进行Haar小波二级重构,得到嵌有秘密的音频carriernewThen carry out Haar wavelet secondary reconstruction on cD10 new and unchanged cD20 and cA10 to get the audio carrier new embedded with secret.

所述密钥水印嵌入过程,涉及到一种量化嵌入密钥的隐藏算法,具体量化嵌入过程包括步骤2.1-步骤2.6:The key watermark embedding process involves a hidden algorithm for quantifying the embedding key, and the specific quantifying embedding process includes steps 2.1-step 2.6:

步骤2.1:将密钥key={Loptima,x,y}转化二值编码。Step 2.1: Convert the key key={L optima , x, y} into a binary code.

用L1个比特值存储Loptima的二值编码,即十进制的Loptima转化为二进制的0,1编码;Use L1 bit values to store the binary code of L optima , that is, the decimal L optima is converted into binary 0, 1 code;

用L2个比特来存储a的二值编码,其中第一个比特值取为sign(a-1),若a<1,则后L2-1个比特值存储1/a的编码,否则直接存储a的编码;Use L2 bits to store the binary code of a, where the first bit value is taken as sign(a-1), if a<1, then the last L2-1 bit value stores the code of 1/a, otherwise it is stored directly the code of a;

类似地,用L3个比特存储b的二值编码,其中第一个比特值取为sign(b-1),若b<1,则后L3-1个比特值存储1/b的编码,否则直接存储b的编码;Similarly, use L3 bits to store the binary code of b, where the first bit value is taken as sign(b-1), if b<1, then the last L3-1 bit value stores the code of 1/b, otherwise Directly store the encoding of b;

将三串二值序列串联起来得到二值序列W。其中,L1,L2,L3为事先根据经验确定的。Concatenate the three strings of binary sequences to obtain the binary sequence W. Among them, L1, L2, and L3 are determined in advance based on experience.

步骤2.2:判断未含有隐蔽信息的载体是否够存储二值编码。Step 2.2: Judging whether the carrier that does not contain hidden information can store binary codes.

由于含有隐蔽信号的载体是carriernew[1:16×Loptima],则不含有隐蔽信息的载体为carriernew[16×Loptima+1:end],简记为carrier1。Since the carrier containing concealed signal is carrier new [1:16×L optima ], the carrier not containing concealed information is carrier new [16×L optima +1:end], which is abbreviated as carrier1.

其中,end表示取到向量的最后一个分量,下同。Among them, end means to get the last component of the vector, the same below.

若Lcarrier1<(L1+L2+L3)*num,表明嵌入位置不够存放二值序列W,则说明需要将载体音频加长后,才能够存储编码。If L carrier1 <(L1+L2+L3)*num, it means that the embedding position is not enough to store the binary sequence W, and it means that the carrier audio needs to be lengthened before the code can be stored.

若Lcarrier1≥(L1+L2+L3)*num,表明嵌入位置能够存放二值序列W,则说明载体音频是足够存储二值编码。If L carrier1 ≥ (L1+L2+L3)*num, it means that the embedding position can store the binary sequence W, which means that the carrier audio is enough to store the binary code.

其中,Lcarrier1表示carrier1的长度;num是每帧音频片段长度,是事先根据经验确定的。Among them, L carrier1 represents the length of carrier1; num is the length of each audio segment, which is determined in advance based on experience.

步骤2.3:将未含有隐蔽信息的载体音频进行离散余弦变换。Step 2.3: Discrete cosine transform is performed on the carrier audio without concealed information.

截取carriernew[end-(L1+L2+L3)*num+1:end],简记为carrier2。Intercept carrier new [end-(L1+L2+L3)*num+1: end], abbreviated as carrier2.

对carrier2进行分帧,分为L1+L2+L3帧,每帧num个信号点。Carrier2 is divided into frames, divided into L1+L2+L3 frames, and each frame has num signal points.

对每帧进行离散余弦(DCT)变换,得到num个展开点,将其中一半频率较低的记为低频系数;一半频率较高的记为高频系数。Discrete cosine (DCT) transform is performed on each frame to obtain num expansion points, and half of them with lower frequencies are recorded as low-frequency coefficients; half of them with higher frequencies are recorded as high-frequency coefficients.

循环对每帧音频做DCT变换,直到L1+L2+L3帧音频都DCT分解完毕。The DCT transformation is performed on each frame of audio in a loop until the DCT decomposition of the L1+L2+L3 frame audio is completed.

步骤2.4:在每帧DCT变换的低频系数上量化嵌入二值编码。Step 2.4: Quantize and embed binary coding on the low-frequency coefficients transformed by DCT in each frame.

将第i个水印wi嵌入到第i帧音频中,记第i帧音频作DCT变换的低频系数序列Fi,对于任一低频系数fii∈Fi,进行水印嵌入,规则如下:Embed the i-th watermark w i into the i-th frame of audio, record the i-th frame of audio as the low-frequency coefficient sequence F i of DCT transformation, and perform watermark embedding for any low-frequency coefficient fi i ∈ F i , the rules are as follows:

若wi=0,则低频系数转化为Q(fij)=k*round(fij/k);If w i =0, the low-frequency coefficients are transformed into Q(f ij )=k*round(fi j /k);

若wi=1,则低频系数转化为Q(fij)=k*round(fij/k)+k/2;If w i =1, the low-frequency coefficients are transformed into Q(f ij )=k*round(fi j /k)+k/2;

其中,量化因子k为事先根据经验值确定的正偶数。Wherein, the quantization factor k is a positive even number determined in advance according to empirical values.

循环在Fi的低频系数fij嵌入水印,直到所有的低频系数fij都嵌入水印wiCirculate to embed the watermark in the low-frequency coefficients fi j of F i until all the low-frequency coefficients fi j are embedded with the watermark w i .

循环在每一帧音频的低频系数嵌入水印,直到所有的水印都嵌入完毕。Loop embedding watermarks in the low-frequency coefficients of each frame of audio until all watermarks are embedded.

步骤2.5:将量化后的DCT变换的系数进行DCT逆变换得到含有密钥水印的载体信号。Step 2.5: Perform DCT inverse transform on the quantized DCT transformed coefficients to obtain the carrier signal containing the key watermark.

步骤2.6:将携带隐蔽信息的载体音频与携带密钥水印的载体音频串联起来,得到传输音频carriertsmStep 2.6: Concatenate the carrier audio carrying the concealed information and the carrier audio carrying the key watermark to obtain the transmission audio carrier tsm .

所述密钥水印提取过程,涉及到一种量化提取密钥的方法,为密钥嵌入过程的逆过程,具体量化提取步骤3.1-步骤3.3:The key watermark extraction process involves a method of quantifying and extracting keys, which is the inverse process of the key embedding process, specifically quantified extraction steps 3.1-step 3.3:

步骤3.1:对含有密钥的传输音频进行DCT变换。Step 3.1: Perform DCT transformation on the transmission audio containing the key.

提取含有密钥的传输音频:尾部算起,长度为(L1+L2+L3)*num,即carriertsm[end-(L1+L2+L3)*num+1,end],记为carrier3;Extract the transmission audio containing the key: counting from the tail, the length is (L1+L2+L3)*num, that is, carrier tsm [end-(L1+L2+L3)*num+1, end], recorded as carrier3;

将音频carrier3分为长度为num的L1+L2+L3帧,对每帧音频信号进行DCT变换;Divide the audio carrier3 into L1+L2+L3 frames with a length of num, and perform DCT transformation on each frame of audio signal;

步骤3.2:从DCT变换的低频系数中阈值量化提取出二值编码。Step 3.2: Threshold quantization to extract binary codes from DCT transformed low-frequency coefficients.

从第i帧低频系数集合Fi中提取出第i个二值编码wi,即Extract the i-th binary code w i from the low-frequency coefficient set F i of the i-th frame, namely

若#(abs(f’-round(f’/num)×num)≤k/4)≥num/2,则说明wi=0;If #(abs(f'-round(f'/num)×num)≤k/4)≥num/2, then w i =0;

若#(abs(f’一round(f’/num)×num)≥k/4)>num/2,则说明wi=1;If #(abs(f'-round(f'/num)×num)≥k/4)>num/2, then w i =1;

其中#(·),abs(·),round(·)分别为计数函数、取绝对值函数、四舍五入函数。Among them, #(·), abs(·), round(·) are counting function, absolute value function and rounding function respectively.

步骤3.3:将二值编码转化为密钥。Step 3.3: Convert the binary code into a key.

对于前面的L1个编码,直接将这L1个二进制数字变为十进制的密钥m;For the previous L1 codes, directly convert these L1 binary numbers into decimal key m;

对于中间的L2个编码,若第一个编码为0,则说明x≤1,将后L2-1个二值编码转化为十进制的z,从而得到x=1/z。否则说明x>1,再将后L2-1个二值编码转化为十进制的密钥x;For the middle L2 codes, if the first code is 0, it means that x≤1, and the last L2-1 binary codes are converted into decimal z, so that x=1/z is obtained. Otherwise, it means x>1, and then convert the last L2-1 binary codes into decimal key x;

类似地,对于最后的L3个编码,若第一个编码为0,则说明y≤1,将后L3-1个二值编码转化为十进制的z,从而得到y=1/z。否则说明y>1,再将后L3-1个二值编码转化为十进制的密钥y;Similarly, for the last L3 codes, if the first code is 0, it means y≤1, and the last L3-1 binary codes are converted into decimal z, so that y=1/z is obtained. Otherwise, it means y>1, and then convert the last L3-1 binary codes into decimal key y;

最终,获得密钥key={m,x,y}。Finally, the key key={m, x, y} is obtained.

所述秘密音频提取过程,是秘密音频嵌入过程的逆过程,即需要根据密钥提取出传输音频中的隐蔽信息,提取方法的具体步骤如下:The secret audio extraction process is the reverse process of the secret audio embedding process, that is, the hidden information in the transmission audio needs to be extracted according to the key, and the specific steps of the extraction method are as follows:

步骤4.1:对传输音频做二次Haar小波分解。Step 4.1: Perform secondary Haar wavelet decomposition on the transmitted audio.

步骤4.1.1:对传输音频做Haar小波二级分解。Step 4.1.1: Perform Haar wavelet secondary decomposition on the transmitted audio.

根据密钥极值序列的长度Loptima,确定出含有隐蔽信息的传输音频部分为carriertsm[1:Loptima×16],简记为carrier4。According to the length L optima of the key extremum sequence, it is determined that the transmission audio part containing concealed information is carrier tsm [1: L optima × 16], which is abbreviated as carrier4.

用Haar小波对含有隐蔽信息的音频carrier4做二级小波变换,得到分解后的低频系数cA10,高频系数cD20及中频系数cD10。Use Haar wavelet to do two-stage wavelet transform on the audio carrier4 containing hidden information, and obtain the decomposed low-frequency coefficient cA10, high-frequency coefficient cD20 and intermediate-frequency coefficient cD10.

步骤4.1.2:对步骤4.1.1产生的中频系数做Haar小波一级分解。Step 4.1.2: Perform Haar wavelet first-level decomposition on the intermediate frequency coefficients generated in step 4.1.1.

再对中频系数cD10new做一级小波分解,提取分解后的低频系数cA11new和高频系数cD11。Then perform a first-level wavelet decomposition on the intermediate frequency coefficient cD10 new , and extract the decomposed low frequency coefficient cA11 new and high frequency coefficient cD11.

步骤4.2:从步骤4.1.2中产生的低频系数cA11new中提取隐蔽信息。Step 4.2: Extract hidden information from the low-frequency coefficients cA11 new generated in Step 4.1.2.

对低频系数cA11new作一级离散Haar小波变换,得到低频系数和高频系数,分别对应伸缩变换的极值序列和极值坐标差分序列。The low-frequency coefficient cA11 new is subjected to a first-level discrete Haar wavelet transform to obtain low-frequency coefficients and high-frequency coefficients, which correspond to the extremum sequence and extremum coordinate difference sequence of the stretching transformation respectively.

再利用密钥伸缩因子x,y得到秘密音频的极值序列optima及其坐标的差分序列Locdiff,再通过以下公式得到极值的坐标序列Loc:Then use the key expansion factor x, y to obtain the extreme value sequence optima of the secret audio and the differential sequence Loc diff of its coordinates, and then obtain the coordinate sequence Loc of the extreme value by the following formula:

当i=1时,Loci=Loc_diff1;当i>1时,Loci=Loc_diffi-1+Loci-1When i=1, Loc i =Loc_diff 1 ; when i>1, Loc i =Loc_diff i-1 +Loc i-1 .

步骤4.3:将极值及其坐标差分序列进行一阶样条插值从而得到模拟的秘密音频。Step 4.3: Perform first-order spline interpolation on the extremum and its coordinate difference sequence to obtain the simulated secret audio.

将极值序列optima及其坐标序列Loc对应匹配成点,采用一阶样条的方法插值,得到原秘密信号的模拟secretnewThe extremum sequence optima and its coordinate sequence Loc are correspondingly matched into points, and the first-order spline method is used to interpolate to obtain the simulated secret new of the original secret signal.

基于上述的系统,本实施例还提供了一种基于小波变换及量化嵌入密钥的音频隐藏方法,包括但不限定以下步骤:Based on the above system, this embodiment also provides an audio hiding method based on wavelet transform and quantized embedded key, including but not limited to the following steps:

秘密音频嵌入过程:将秘密音频嵌入到载体音频中,获得密钥携带秘密的音频;Secret audio embedding process: embed the secret audio into the carrier audio, and obtain the key-carrying secret audio;

密钥水印嵌入过程:将密钥量化嵌入到载体音频中,获得可从秘密信息发送端传输到秘密信息接收端的音频;Key watermark embedding process: quantify the key and embed it into the carrier audio to obtain audio that can be transmitted from the secret information sender to the secret information receiver;

密钥水印提取过程:从传输音频中提取出密钥和携带秘密的音频,以协助秘密音频提取过程提取秘密音频;Key watermark extraction process: extract the key and the audio carrying the secret from the transmitted audio to assist the secret audio extraction process to extract the secret audio;

秘密音频提取过程:利用密钥从携带秘密的音频中获得模拟的秘密音频。Secret audio extraction process: Use the key to obtain simulated secret audio from the audio carrying the secret.

在本实施例中,载体音频采用中文内容为“路漫漫其修远兮,吾将上下而求索”的音频,秘密音频采用英文内容为“It is my report from the north,which cheekilyinduced people to buy.”的音频。In this embodiment, the carrier audio uses the audio content in Chinese as "The road is long and long, I will search up and down", and the secret audio uses the English content as "It is my report from the north, which cheekily induced people to buy. " audio.

参照图2,在秘密音频嵌入过程,利用秘密音频极值及其位置的信息替代原秘密音频嵌入以压缩嵌入容量;对载体音频进行二次小波变换以获取透明性和鲁棒性均衡的位置以嵌入隐蔽信息;详细步骤1.1-步骤1.6:Referring to Figure 2, in the secret audio embedding process, the secret audio extremum and its position information are used to replace the original secret audio embedding to compress the embedding capacity; the carrier audio is subjected to secondary wavelet transform to obtain the position of transparency and robustness balance to obtain Embed covert information; detail steps 1.1-step 1.6:

步骤1.1:提取秘密音频的极值及极值坐标。Step 1.1: Extract the extrema and extremum coordinates of the secret audio.

由于本实施例将音频信号作为秘密信号,而音频信号数据量大,而且存在一些冗余信息,会因增大嵌入容量而加大难度,因此提取出音频信号的极值序列及其坐标序列作为音频特征。实验证明,仅用极值及其坐标可以通过一阶样条插值还原出可解释的音频信号。Since this embodiment uses the audio signal as a secret signal, and the audio signal has a large amount of data, and there are some redundant information, it will increase the difficulty due to the increase in the embedding capacity, so the extremum sequence of the audio signal and its coordinate sequence are extracted as audio characteristics. Experiments have shown that interpretable audio signals can be restored by first-order spline interpolation using only extreme values and their coordinates.

步骤1.2:提取极值坐标的差分序列。Step 1.2: Extract the difference sequence of the extremal coordinates.

随着音频信号长度的增加,极值坐标值也是递增的,为了避免对嵌入效果产生负面影响,因此对极值的坐标序列做差分运算,会得到一个较为平稳,且不受音频信号长度影响的极值坐标差分序列。As the length of the audio signal increases, the extreme value coordinates also increase. In order to avoid negative effects on the embedding effect, a differential operation is performed on the extreme value coordinate sequence to obtain a relatively stable one that is not affected by the length of the audio signal. Sequence of extreme value coordinate differences.

步骤1.3:将伸缩变换后的极值及其坐标差分序列进行Haar小波一级重构得到隐蔽信息。Step 1.3: Perform Haar wavelet first-level reconstruction on the extremum and its coordinate difference sequence after stretching transformation to obtain hidden information.

对极值序列和极值坐标差分序列分别做伸缩变换,使得二者的数值大小相近。极值序列与坐标差分序列是两两匹配的,为了让秘密信息的量纲相同,将伸缩变换的极值序列和极值坐标差分序列作为Haar小波重构的低频系数和高频系数,重构得到一个各分量量纲相同的隐蔽序列。The extremum sequence and the extremum coordinate difference sequence are respectively stretched and transformed, so that the values of the two are similar. The extremum sequence and the coordinate difference sequence are matched in pairs. In order to make the dimensions of the secret information the same, the extremum sequence and the extremum coordinate difference sequence of the stretching transformation are used as the low-frequency coefficients and high-frequency coefficients of the Haar wavelet reconstruction, and the reconstructed Obtain a covert sequence whose components have the same dimension.

其中,所述的Haar小波一级重构,设低频系数序列为A=[a1,a2,…,an],高频系数序列为B=[b1,b2,…,bn],则Haar小波重构的结果为:第2i-1个信号值为f2i-1=ai+bi;第2i个信号值为f2i=ai-bi。另外下面步骤1.6.1所述的Haar小波二级重构,即在一级重构的基础上,对低频系数再做一次Haar小波一级重构。Wherein, for the Haar wavelet first-level reconstruction, set the low-frequency coefficient sequence as A=[a 1 ,a 2 ,…,a n ], and the high-frequency coefficient sequence as B=[b 1 ,b 2 ,…,b n ], then the Haar wavelet reconstruction result is: the 2i-1th signal value is f 2i-1 =a i +b i ; the 2ith signal value is f 2i =a i -b i . In addition, the second-level Haar wavelet reconstruction described in step 1.6.1 below is to perform a first-level Haar wavelet reconstruction on the low-frequency coefficients on the basis of the first-level reconstruction.

步骤1.4:对载体音频做二次Haar小波分解。Step 1.4: Perform secondary Haar wavelet decomposition on the carrier audio.

步骤1.4.1:对载体音频做二级Haar小波分解。Step 1.4.1: Perform second-level Haar wavelet decomposition on the carrier audio.

对载体音频做Haar小波二级分解,得到低频系数、中频系数、高频系数。由于低频系数表示音频包络,对其做操作易对音频产生过大影响;而高频系数表述音频细节,易受到去噪攻击等的影响;综上,将在中频系数上作隐蔽信号的嵌入。Perform Haar wavelet secondary decomposition on the carrier audio to obtain low-frequency coefficients, intermediate-frequency coefficients, and high-frequency coefficients. Since the low-frequency coefficients represent the audio envelope, operations on them can easily have a large impact on the audio; while the high-frequency coefficients represent audio details and are easily affected by denoising attacks; in summary, the hidden signal will be embedded on the intermediate frequency coefficients .

步骤1.4.2:对步骤1.4.1产生的中频系数作Haar小波一级分解。Step 1.4.2: Perform Haar wavelet first-level decomposition on the intermediate frequency coefficients generated in step 1.4.1.

再对中频系数作一级小波分解,得到低频系数和高频系数。根据小波理论,该步骤中获得的低频系数比原序列更稳定,即比步骤1.4.1产生的中频系数更稳定。又因为该系数不表示音频包络,因此可用于存放秘密音频。Then, the first-level wavelet decomposition is performed on the intermediate frequency coefficients to obtain low frequency coefficients and high frequency coefficients. According to wavelet theory, the low-frequency coefficients obtained in this step are more stable than the original sequence, that is, more stable than the intermediate-frequency coefficients generated in step 1.4.1. And because this coefficient does not represent the audio envelope, it can be used to store secret audio.

其中,所述的Haar小波一级分解,设信号序列为f=[f1,f2,…,fn-1,fn],则Haar小波分解的结果为:第i个低频系数为ai=(f2i-1+f2i)/2;第i个高频系数为bi=(f2i-f2i-1)/2。另外,Haar小波二级分解,即在一级分解的基础上,对低频系数再做一次Haar小波一级分解。Wherein, the first-level decomposition of the Haar wavelet, assuming that the signal sequence is f=[f 1 , f 2 ,..., f n-1 , f n ], then the result of the Haar wavelet decomposition is: the i-th low-frequency coefficient is a i =(f 2i-1 +f 2i )/2; the i-th high frequency coefficient is b i =(f 2i -f 2i-1 )/2. In addition, the Haar wavelet two-level decomposition, that is, on the basis of the first-level decomposition, perform a Haar wavelet first-level decomposition on the low-frequency coefficients.

步骤1.5:在步骤1.4.2中产生的低频系数中嵌入隐蔽信息。Step 1.5: Embedding hidden information in the low-frequency coefficients produced in Step 1.4.2.

在保证存储位置足够的情况下,将步骤1.3中产生的隐蔽序列替换掉步骤1.4.2中的低频系数前部分。Under the condition that the storage location is sufficient, replace the part before the low-frequency coefficients in step 1.4.2 with the covert sequence generated in step 1.3.

步骤1.6:对含有隐蔽信息的小波系数做二次Haar小波变换的重构。Step 1.6: Reconstruct the wavelet coefficients containing hidden information by secondary Haar wavelet transform.

步骤1.6.1:将高频系数和含有隐蔽信息的低频系数进行Haar小波一级重构。Step 1.6.1: Perform Haar wavelet first-level reconstruction on high-frequency coefficients and low-frequency coefficients containing hidden information.

为步骤1.4.2的逆步骤,进行Haar小波一级重构得到含有隐蔽信息的中频系数。As the inverse step of step 1.4.2, Haar wavelet first-level reconstruction is performed to obtain intermediate frequency coefficients containing hidden information.

步骤1.6.2:将低频、高频和含有隐蔽信息的中频系数进行Haar小波二级重构。Step 1.6.2: Perform Haar wavelet secondary reconstruction on the low-frequency, high-frequency and intermediate-frequency coefficients containing hidden information.

为步骤1.4.1的逆步骤,进行Haar小波二级重构得到含有隐蔽信息的载体音频。请参阅图3,为嵌有隐蔽信息的载体音频与原载体音频的对比图,容易发现,二值在波形上都及其相似。另外,通过直观的听力对嵌有隐蔽信息的载体音频做检验,可以发现仅有些许噪声,但是其音色、音质、音调、内容等并无差异。As the inverse step of step 1.4.1, Haar wavelet secondary reconstruction is performed to obtain the carrier audio containing hidden information. Please refer to Figure 3, which is a comparison chart between the carrier audio embedded with hidden information and the original carrier audio. It is easy to find that the two values are extremely similar in waveform. In addition, through intuitive listening to the carrier audio embedded with hidden information, it can be found that there is only a little noise, but there is no difference in timbre, sound quality, pitch, content, etc.

参照图2,在密钥水印嵌入过程,将密钥量化嵌入载体音频中,使得不额外开通秘密通道来传输密钥,具体包括步骤2.1-步骤2.6:Referring to Figure 2, in the key watermark embedding process, the key is quantized and embedded in the carrier audio, so that no additional secret channel is opened to transmit the key, specifically including steps 2.1-step 2.6:

步骤2.1:将密钥转化为二值编码。Step 2.1: Convert the key into a binary code.

在本实施例的系统中,密钥仅为三个数据,数据量少,因此可以转化为二进制数据,利用量化的盲水印技术嵌入到载体音频中。分别用固定长度的比特来存取二值编码,以便量化提取出密钥。由于秘密音频极值序列的长度为整数,因此直接用十进制转二进制编码;在做伸缩变换时可以控制倍率或者倍率的倒数二者中的一个为整数,以得到伸缩功能,用一个比特来存储倍率的大小情况,再用十进制转二进制的方法来存取整数,即倍率或者倍率的倒数。In the system of this embodiment, the key is only three pieces of data, and the amount of data is small, so it can be converted into binary data and embedded into the carrier audio by using quantized blind watermarking technology. The fixed-length bits are used to access the binary codes respectively, so as to quantize and extract the key. Since the length of the secret audio extremum sequence is an integer, it is directly converted from decimal to binary code; when performing scaling transformation, one of the magnification or the reciprocal of the magnification can be controlled to be an integer to obtain the stretching function, which is stored in one bit The magnitude of the magnification, and then use the method of converting decimal to binary to access the integer, that is, the magnification or the reciprocal of the magnification.

步骤2.2:判断未含有隐蔽信息的载体是否够存储二值编码。Step 2.2: Judging whether the carrier that does not contain hidden information can store binary codes.

为了不让密钥的嵌入干扰到隐蔽信息,因此考虑在未含有隐蔽信息的载体中量化嵌入密钥的二值编码。In order not to let the embedding of the key interfere with the hidden information, it is considered to quantize the binary code of the embedded key in the carrier that does not contain the hidden information.

步骤2.3:将未含有隐蔽信息的载体音频进行离散余弦变换。Step 2.3: Discrete cosine transform is performed on the carrier audio without concealed information.

为了方便传输后确认出含有密钥的载体音频,从载体音频的尾部开始截取足够长的音频信号。In order to confirm the carrier audio containing the key after transmission, a sufficiently long audio signal is intercepted from the end of the carrier audio.

其中,设信号为F={f0,f1,f2,…,fN},则所述离散余弦变换公式为:Wherein, if the signal is F={f 0 , f 1 , f 2 ,..., f N }, then the discrete cosine transform formula is:

其中,当u=0时,当u=1时,/> Among them, when u=0, When u=1, />

相应地,DCT逆变换公式为:Correspondingly, the DCT inverse transform formula is:

在以下步骤4是对一半的DCT变换的低频系数做量化嵌入编码,为了提高量化嵌入二值编码的鲁棒性,因此每帧音频的长度应该越大越好,实验表明每帧信号一般是至少取32个信号。In the following step 4, the low-frequency coefficients of half of the DCT transformation are quantized and embedded coded. In order to improve the robustness of the quantized embedded binary code, the length of each frame of audio should be as large as possible. Experiments show that each frame signal is generally at least 32 signals.

步骤2.4:在每帧DCT变换的低频系数上量化嵌入二值编码。Step 2.4: Quantize and embed binary coding on the low-frequency coefficients transformed by DCT in each frame.

类似于经典水印方法,若编码为0,则将每帧中的低频系数转化为邻近的偶数;若编码为1,则将每帧中的低频系数转化为邻近的奇数。通过量化因子来量化嵌入二值编码,量化因子越大则水印的可感知性越强且鲁棒性越强,反之亦然。因此,通过取适当的量化因子来获得感知性和鲁棒性的均衡。Similar to the classical watermarking method, if the code is 0, the low-frequency coefficients in each frame are converted into adjacent even numbers; if the code is 1, the low-frequency coefficients in each frame are converted into adjacent odd numbers. The quantization factor is used to quantize and embed the binary code. The larger the quantization factor, the stronger the perceptibility and robustness of the watermark, and vice versa. Therefore, a balance of perceptuality and robustness is obtained by taking an appropriate quantization factor.

相较于高频系数,在低频系数中量化嵌入二值编码的鲁棒性更强。Compared with high-frequency coefficients, quantization embedding binary codes in low-frequency coefficients is more robust.

步骤2.5:将量化后的DCT变换的系数进行DCT逆变换得到含有密钥水印的载体信号。Step 2.5: Perform DCT inverse transform on the quantized DCT transformed coefficients to obtain the carrier signal containing the key watermark.

步骤2.6:将携带隐蔽信息的载体音频与携带密钥水印的载体音频串联起来,得到传输音频。Step 2.6: Concatenate the carrier audio carrying the concealed information with the carrier audio carrying the key watermark to obtain the transmission audio.

在密钥水印提取过程,采用阈值量化提取密钥水印以增强算法的鲁棒性;通过信道传输后,需要先提取出密钥,如图4,为密钥嵌入过程的逆过程,具体阈值量化提取过程步骤3.1-In the key watermark extraction process, threshold quantization is used to extract the key watermark to enhance the robustness of the algorithm; after transmission through the channel, the key needs to be extracted first, as shown in Figure 4, which is the reverse process of the key embedding process, and the specific threshold quantization Extraction Process Step 3.1-

步骤3.3:Step 3.3:

步骤3.1:对含有密钥的传输音频进行DCT变换。Step 3.1: Perform DCT transformation on the transmission audio containing the key.

由于在密钥水印嵌入过程中,是从尾部开始嵌入密钥的,在这里也从尾部算起,提取长为(L1+L2+L3)*num,然后分帧,每帧为num个信号值,对这num个信号值做DCT变换分解,得到低频系数和高频系数,其中低频系数嵌有二值编码。Since the key is embedded from the end in the process of key watermark embedding, it is also counted from the end here, and the extracted length is (L1+L2+L3)*num, and then divided into frames, each frame is num signal values , decompose the num signal values by DCT transformation to obtain low-frequency coefficients and high-frequency coefficients, wherein the low-frequency coefficients are embedded with binary codes.

步骤3.2:从DCT变换的低频系数中阈值量化提取出二值编码。Step 3.2: Threshold quantization to extract binary codes from DCT transformed low-frequency coefficients.

针对任意一帧,按照二值编码嵌入低频系数的规则,理应找出其中一个乃至所有的低频系数,若低频系数为量化因子的整数倍,则说明嵌入的编码为0;若低频系数为量化因子的整数倍再加0.5倍,则说明嵌入的编码为1。但是考虑到传输过程中可能会有无意攻击的影响,使得低频系数有一定的波动,因此采用阈值量化,即将低频系数归为离量化因子整数倍较近的一类和离量化因子整数倍再加0.5倍较近的一类,分别计算每类含有低频系数的个数,那么个数较多的一类对应的编码则为最终的编码。显然,采用阈值量化,可以进一步提高算法的鲁棒性。For any frame, according to the rules of binary coding to embed low-frequency coefficients, one or even all of the low-frequency coefficients should be found. If the low-frequency coefficient is an integer multiple of the quantization factor, the embedded code is 0; if the low-frequency coefficient is the quantization factor An integer multiple of , plus 0.5 times, means that the embedded code is 1. However, considering that there may be unintentional attacks during the transmission process, the low-frequency coefficients have certain fluctuations, so threshold quantization is used, that is, the low-frequency coefficients are classified into the category that is closer to the integer multiple of the quantization factor and the integer multiple of the quantization factor is added. For the class that is 0.5 times closer, the number of low-frequency coefficients in each class is calculated separately, and the code corresponding to the class with a larger number is the final code. Obviously, using threshold quantization can further improve the robustness of the algorithm.

步骤3.3:将二值编码转化为密钥。Step 3.3: Convert the binary code into a key.

在密钥转二值编码时,已经固定了每一密钥的比特长度,因此,这里也容易获得各串比特对应的编码。然后再根据密钥转二值编码的规则,确定出逆规则,可以得到二值编码转化为密钥的规则。When the key is converted to binary encoding, the bit length of each key has been fixed, so it is also easy to obtain the encoding corresponding to each string of bits here. Then, according to the rules of converting the key to the binary code, the inverse rule is determined, and the rule of converting the binary code into the key can be obtained.

在秘密音频提取过程,采用一阶样条插值秘密音频的极值及其位置;拥有密钥之后,再根据密钥提取出传输音频中模拟的秘密音频,如图4,提取算法的具体步骤4.1-步骤4.3:In the secret audio extraction process, first-order spline interpolation is used to interpolate the extreme value and position of the secret audio; after having the key, the secret audio simulated in the transmitted audio is extracted according to the key, as shown in Figure 4, the specific steps of the extraction algorithm 4.1 - Step 4.3:

步骤4.1:对传输音频做二次Haar小波分解。Step 4.1: Perform secondary Haar wavelet decomposition on the transmitted audio.

步骤4.1.1:对传输音频做Haar小波二级分解。Step 4.1.1: Perform Haar wavelet secondary decomposition on the transmitted audio.

步骤4.1.2:对步骤4.1.1产生的中频系数做Haar小波一级分解。Step 4.1.2: Perform Haar wavelet first-level decomposition on the intermediate frequency coefficients generated in step 4.1.1.

步骤4.2:从步骤4.1.2中产生的低频系数中提取隐蔽信息。Step 4.2: Extract hidden information from the low-frequency coefficients produced in Step 4.1.2.

由于嵌入隐蔽信息时,为了让每一个信息量纲相同,因此做了Haar小波一级重构,在这里要做Haar小波一级分解,可以得到伸缩变换的极值序列和极值坐标的差分序列。When embedding concealed information, in order to make each information dimension the same, Haar wavelet first-level reconstruction is performed. Here, Haar wavelet first-level decomposition is required to obtain the extremum sequence of scaling transformation and the difference sequence of extremum coordinates. .

再将极值坐标的差分序列转化为极值坐标。Then the difference sequence of the extreme value coordinates is transformed into the extreme value coordinates.

由于可能会受到噪声的影响,极值坐标不为整数,但是不影响最终模拟音频,因此无需再做处理。Because it may be affected by noise, the extreme value coordinates are not integers, but it does not affect the final analog audio, so no further processing is required.

步骤4.3:将极值及其坐标差分序列进行一阶样条插值。Step 4.3: Perform first-order spline interpolation on the extremum and its coordinate difference sequence.

虽然三阶样条插值相对于一阶样条插值,得到的效果更加圆润,模拟的声音也更加真实、可解释,但是其在实验中不能做到很好的效果,因为三阶样条在数据间距较大的情况下,插值的结果与原音频相差较大从而影响音频整体的形状。因此实验中,采用一阶插值对极值及其位置序列做一阶样条插值,参加图5,为采用一阶样条插值得到的模拟音频与原秘密音频的对比图,容易发现模拟的秘密音频的轮廓与原来秘密音频的及其相似。另外,也从听力上直接对比模拟音频与原秘密音频,会发现二者在音色、音调、内容上无差异。Although the third-order spline interpolation is more rounded than the first-order spline interpolation, and the simulated sound is more real and interpretable, but it cannot achieve good results in the experiment, because the third-order spline in the data When the spacing is large, the result of interpolation will differ greatly from the original audio, which will affect the overall shape of the audio. Therefore, in the experiment, first-order interpolation is used to perform first-order spline interpolation on the extremum and its position sequence. Refer to Figure 5, which is a comparison chart between the simulated audio obtained by using first-order spline interpolation and the original secret audio, and it is easy to find the secret of the simulation. The profile of the audio is strikingly similar to that of the original secret audio. In addition, if you directly compare the analog audio and the original secret audio from the listening point of view, you will find that there is no difference in timbre, pitch, and content between the two.

综上所述,本实施例的方法,相对与现有的技术,至少具有如下有益效果:To sum up, the method of this embodiment, compared with the existing technology, has at least the following beneficial effects:

将秘密音频的极值及其坐标信息配对后,通过一阶样条插值可获得模拟的秘密音频。因此,在秘密音频嵌入中仅需嵌入秘密音频的极值及其坐标信息,以达到压缩音频的效果,从而提高嵌入容量。与传统压缩方法相比,该方法的压缩率更高且模拟秘密音频与原秘密音频在听觉上无语义理解上的差异。After pairing the extremum of the secret audio and its coordinate information, the simulated secret audio can be obtained by first-order spline interpolation. Therefore, only the extremum of the secret audio and its coordinate information need to be embedded in the secret audio embedding, so as to achieve the effect of compressing the audio and improve the embedding capacity. Compared with traditional compression methods, this method has a higher compression rate and there is no difference in semantic understanding between the simulated secret audio and the original secret audio.

对载体音频进行二级小波分解,获得低频、中频、高频序列;再将中频系数做一级小波分解,获得低频、高频序列。由于低频序列鲁棒性强,但是第一次小波分解中的低频信号表示载体音频的轮廓,其不容更改,因此选取第二次小波分解的低频信号作为隐蔽位置,于鲁棒性与透明性中达到均衡。Carrier audio is decomposed by two-level wavelet to obtain low-frequency, intermediate-frequency, and high-frequency sequences; then the intermediate-frequency coefficients are decomposed by first-level wavelet to obtain low-frequency and high-frequency sequences. Due to the robustness of the low-frequency sequence, but the low-frequency signal in the first wavelet decomposition represents the contour of the carrier audio, which cannot be changed, so the low-frequency signal in the second wavelet decomposition is selected as the hidden position, in terms of robustness and transparency. reach equilibrium.

将密钥作为水印量化嵌入到载体音频中,使得语音隐藏系统不需要另外开通秘密通道传输密钥。由于采用盲水印隐藏技术,即不需要原载体音频就可以提取出密钥,这进一步说明了该系统的安全性。The key is quantized and embedded into the carrier audio as a watermark, so that the voice hiding system does not need to open a secret channel to transmit the key. Due to the blind watermark hiding technology, the key can be extracted without the original carrier audio, which further illustrates the security of the system.

在密钥水印量化嵌入过程中,在离散余弦变换的低频系数上做量化,提高了算法的鲁棒性;另外,量化因子的选取也控制了鲁棒性和透明性的均衡。在密钥水印提取过程中,采用阈值量化,进一步提高了算法的鲁棒性。In the process of key watermark quantization and embedding, quantization is performed on the low-frequency coefficients of discrete cosine transform, which improves the robustness of the algorithm; in addition, the choice of quantization factor also controls the balance between robustness and transparency. In the key watermark extraction process, threshold quantization is used to further improve the robustness of the algorithm.

如图6所述,本实施例还提供了一种基于小波变换及量化嵌入密钥的音频隐藏装置,音频变换模块,用于获取载体音频和秘密音频,对载体音频进行二次小波变换,获得待嵌入隐蔽信息的位置;As shown in Figure 6, the present embodiment also provides an audio hiding device based on wavelet transform and quantization embedding key, the audio transform module is used to obtain carrier audio and secret audio, and carry out secondary wavelet transform to carrier audio to obtain the location of the hidden information to be embedded;

极值提取模块,用于提取秘密音频的极值和极值坐标,根据极值和极值坐标获取隐蔽信息;The extremum extraction module is used to extract the extremum and extremum coordinates of the secret audio, and obtain hidden information according to the extremum and extremum coordinates;

音频嵌入模块,用于根据待嵌入隐蔽信息的位置,将隐蔽信息嵌入载体音频中,获得第一音频;The audio embedding module is used to embed the concealed information into the carrier audio according to the position of the concealed information to be embedded to obtain the first audio;

密钥嵌入模块,用于利用量化方法将密钥嵌入未含有隐蔽信息的载体音频,获得第二音频,串联第一音频和第二音频获得传输音频。The key embedding module is used to embed the key into the carrier audio that does not contain hidden information by using a quantization method to obtain the second audio, and concatenate the first audio and the second audio to obtain the transmission audio.

本实施例的一种基于小波变换及量化嵌入密钥的音频隐藏装置,可执行本发明方法实施例所提供的一种基于小波变换及量化嵌入密钥的音频隐藏方法,可执行方法实施例的任意组合实施步骤,具备该方法相应的功能和有益效果。An audio hiding device based on wavelet transform and quantization embedding key in this embodiment can execute an audio hiding method based on wavelet transform and quantization embedding key provided in the method embodiment of the present invention, and can execute the method embodiment Any combination of implementation steps has the corresponding functions and beneficial effects of the method.

本实施例还提供了一种基于小波变换及量化嵌入密钥的音频隐藏装置,包括:This embodiment also provides an audio hiding device based on wavelet transform and quantized embedded key, including:

至少一个处理器;at least one processor;

至少一个存储器,用于存储至少一个程序;at least one memory for storing at least one program;

当所述至少一个程序被所述至少一个处理器执行,使得所述至少一个处理器实现上所述方法。When the at least one program is executed by the at least one processor, the at least one processor implements the above method.

本实施例的一种基于小波变换及量化嵌入密钥的音频隐藏装置,可执行本发明方法实施例所提供的一种基于小波变换及量化嵌入密钥的音频隐藏方法,可执行方法实施例的任意组合实施步骤,具备该方法相应的功能和有益效果。An audio hiding device based on wavelet transform and quantization embedding key in this embodiment can execute an audio hiding method based on wavelet transform and quantization embedding key provided in the method embodiment of the present invention, and can execute the method embodiment Any combination of implementation steps has the corresponding functions and beneficial effects of the method.

可以理解的是,上文中所公开方法中的全部或某些步骤、系统可以被实施为软件、固件、硬件及其适当的组合。某些物理组件或所有物理组件可以被实施为由处理器,如中央处理器、数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其他存储器技术、CD-ROM、数字多功能盘(DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。It can be understood that all or some of the steps and systems in the methods disclosed above can be implemented as software, firmware, hardware and an appropriate combination thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application-specific integrated circuit . Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). As known to those of ordinary skill in the art, the term computer storage media includes both volatile and nonvolatile media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data. permanent, removable and non-removable media. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cartridges, tape, magnetic disk storage or other magnetic storage devices, or can Any other medium used to store desired information and which can be accessed by a computer. In addition, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and may include any information delivery media .

上面结合附图对本发明实施例作了详细说明,但是本发明不限于上述实施例,在所述技术领域普通技术人员所具备的知识范围内,还可以在不脱离本发明宗旨的前提下作出各种变化。The embodiments of the present invention have been described in detail above in conjunction with the accompanying drawings, but the present invention is not limited to the above embodiments. Within the scope of knowledge possessed by those of ordinary skill in the art, various modifications can be made without departing from the gist of the present invention. kind of change.

Claims (8)

1.一种基于小波变换及量化嵌入密钥的音频隐藏方法,其特征在于,包括以下步骤:1. an audio concealment method based on wavelet transform and quantization embedding key, it is characterized in that, comprising the following steps: 获取载体音频和秘密音频,对载体音频进行二次小波变换,获得待嵌入隐蔽信息的位置;Obtain carrier audio and secret audio, perform secondary wavelet transform on the carrier audio, and obtain the position to be embedded with hidden information; 提取秘密音频的极值和极值坐标,根据极值和极值坐标获取隐蔽信息;Extract the extremum and extremum coordinates of the secret audio, and obtain hidden information according to the extremum and extremum coordinates; 根据待嵌入隐蔽信息的位置,将隐蔽信息嵌入载体音频中,获得第一音频;利用量化方法将密钥嵌入未含有隐蔽信息的载体音频,获得第二音频,串联第一音频和第二音频获得传输音频;According to the location of the concealed information to be embedded, embed the concealed information into the carrier audio to obtain the first audio; use the quantization method to embed the key into the carrier audio that does not contain the concealed information to obtain the second audio, and concatenate the first audio and the second audio to obtain transmit audio; 所述提取秘密音频的极值和极值坐标,根据极值和极值坐标获取隐蔽信息,Said extracting the extremum and extremum coordinates of the secret audio, obtaining concealed information according to the extremum and extremum coordinates, 包括:include: 提取秘密音频的极值和极值坐标;extract the extrema and extrema coordinates of the secret audio; 提取极值坐标的差分序列,以及对极值及极值坐标的差分序列做伸缩变换;将伸缩变换后的极值及极值坐标的差分序列进行Haar小波一级重构,获得隐蔽信息;Extract the differential sequence of the extreme value coordinates, and perform stretching transformation on the extreme value and the difference sequence of the extreme value coordinates; perform Haar wavelet first-level reconstruction on the extremum and the difference sequence of the extreme value coordinates after the stretching transformation, to obtain hidden information; 所述利用量化方法将密钥嵌入未含有隐蔽信息的载体音频,获得第二音频,The second audio is obtained by using a quantization method to embed the key into the carrier audio that does not contain hidden information, 串联第一音频和第二音频获得传输音频,包括:Connecting the first audio and the second audio in series to obtain transmission audio, including: 获取极值序列的长度作为密钥,将密钥转化为二值编码;Obtain the length of the extremum sequence as the key, and convert the key into a binary code; 将未含有隐蔽信息的载体音频进行离散余弦变换,获得第四低频系数和第四高频系数;performing discrete cosine transform on the carrier audio that does not contain concealed information to obtain a fourth low-frequency coefficient and a fourth high-frequency coefficient; 将二值编码量化嵌入第四低频系数,获得第五低频系数;Embedding the binary coded quantization into the fourth low-frequency coefficient to obtain the fifth low-frequency coefficient; 对第五低频系数和第四高频系数进行离散余弦逆变换,获得含有密钥的载体音频作为第二音频;Inverse discrete cosine transform is performed on the fifth low-frequency coefficient and the fourth high-frequency coefficient to obtain the carrier audio containing the key as the second audio; 将第一音频和第二音频进行串联,获得传输音频。Connect the first audio and the second audio in series to obtain transmission audio. 2.根据权利要求1所述的一种基于小波变换及量化嵌入密钥的音频隐藏方法,其特征在于,所述对载体音频进行二次小波变换,获得待嵌入隐蔽信息的位置,包括:2. a kind of audio hiding method based on wavelet transform and quantization embedding key according to claim 1, it is characterized in that, described carrier audio is carried out secondary wavelet transform, obtains the position to be embedded concealed information, comprises: 对载体音频做二级Haar小波分解,获得第一高频系数、第一中频系数和第一低频系数;Carrier audio is decomposed by two-level Haar wavelets to obtain the first high-frequency coefficient, the first intermediate-frequency coefficient and the first low-frequency coefficient; 对第一中频系数进行Haar小波一级分解,获得第二高频系数和第二低频系数,将第二低频系数所处位置作为待嵌入隐蔽信息的位置。The Haar wavelet first-level decomposition is performed on the first intermediate-frequency coefficient to obtain the second high-frequency coefficient and the second low-frequency coefficient, and the position of the second low-frequency coefficient is used as the position to be embedded with hidden information. 3.根据权利要求2所述的一种基于小波变换及量化嵌入密钥的音频隐藏方法,其特征在于,所述根据待嵌入隐蔽信息的位置,将隐蔽信息嵌入载体音频中,3. a kind of audio concealment method based on wavelet transform and quantization embedding key according to claim 2, it is characterized in that, described according to the position to be embedded concealed information, concealed information is embedded in the carrier audio frequency, 获得第一音频,包括:Get first audio, including: 将隐蔽信息嵌入第二低频系数,获得第三低频系数;Embedding the hidden information into the second low-frequency coefficient to obtain the third low-frequency coefficient; 将第二高频系数和第三低频系数进行二次Haar小波变换的重构,获得第三中频系数;The second high-frequency coefficient and the third low-frequency coefficient are subjected to the reconstruction of the second Haar wavelet transform to obtain the third intermediate-frequency coefficient; 将第一高频系数、第三中频系数和第一低频系数进行Haar小波一级重构,获得第一音频。The first audio frequency is obtained by performing Haar wavelet first-level reconstruction on the first high-frequency coefficient, the third intermediate-frequency coefficient and the first low-frequency coefficient. 4.根据权利要求1所述的一种基于小波变换及量化嵌入密钥的音频隐藏方法,4. a kind of audio hiding method based on wavelet transform and quantization embedding key according to claim 1, 其特征在于,还包括以下步骤:It is characterized in that it also includes the following steps: 获得传输音频,采用离散余弦变换从传输音频中提取密钥;Obtain the transmitted audio, and extract the key from the transmitted audio by discrete cosine transform; 结合密钥和二次小波变换从传输音频中获取秘密音频。Combining secret key and quadratic wavelet transform to obtain secret audio from transmitted audio. 5.根据权利要求4所述的一种基于小波变换及量化嵌入密钥的音频隐藏方法,5. a kind of audio hiding method based on wavelet transform and quantization embedding key according to claim 4, 其特征在于,所述采用离散余弦变换从传输音频中提取密钥,包括:It is characterized in that said adopting discrete cosine transform to extract key from transmission audio includes: 对含有密钥的传输音频进行离散余弦变换,获得第六低频系数;Discrete cosine transform is performed on the transmission audio containing the key to obtain the sixth low-frequency coefficient; 从第六低频系数中获取二值编码,将二值编码转化为密钥。A binary code is obtained from the sixth low-frequency coefficient, and the binary code is converted into a key. 6.根据权利要求5所述的一种基于小波变换及量化嵌入密钥的音频隐藏方法,其特征在于,所述结合密钥和二次小波变换从传输音频中获取秘密音频,包括:6. A kind of audio hiding method based on wavelet transform and quantization embedding key according to claim 5, it is characterized in that, described combination key and secondary wavelet transform obtain secret audio from transmission audio, comprising: 根据密钥从传输音频中获取含有隐蔽信息的第三音频,对第三音频进行Haar小波二级分解,获得第四中频系数;Obtaining a third audio containing concealed information from the transmission audio according to the key, and performing Haar wavelet secondary decomposition on the third audio to obtain a fourth intermediate frequency coefficient; 对第四中频系数进行Haar小波一级分解,获得第七低频系数;Perform Haar wavelet first-level decomposition on the fourth intermediate frequency coefficient to obtain the seventh low frequency coefficient; 从第七低频系数中获取隐蔽信息,所述隐蔽信息包括极值及极值坐标的差分序;obtaining concealed information from the seventh low-frequency coefficient, the concealed information including extremums and differential sequences of extremum coordinates; 将极值及极值坐标的差分序进行一阶样条插值,获得秘密音频。Perform first-order spline interpolation on the extreme value and the difference sequence of the extreme value coordinates to obtain the secret audio. 7.一种基于小波变换及量化嵌入密钥的音频隐藏装置,其特征在于,包括:7. An audio concealment device based on wavelet transform and quantization embedding key, characterized in that, comprising: 音频变换模块,用于获取载体音频和秘密音频,对载体音频进行二次小波变换,获得待嵌入隐蔽信息的位置;The audio conversion module is used to obtain carrier audio and secret audio, and perform secondary wavelet transform on the carrier audio to obtain the position of the concealed information to be embedded; 极值提取模块,用于提取秘密音频的极值和极值坐标,根据极值和极值坐标获取隐蔽信息;The extremum extraction module is used to extract the extremum and extremum coordinates of the secret audio, and obtain hidden information according to the extremum and extremum coordinates; 音频嵌入模块,用于根据待嵌入隐蔽信息的位置,将隐蔽信息嵌入载体音频中,获得第一音频;The audio embedding module is used to embed the concealed information into the carrier audio according to the position of the concealed information to be embedded to obtain the first audio; 密钥嵌入模块,用于利用量化方法将密钥嵌入未含有隐蔽信息的载体音频,The key embedding module is used to embed the key into the carrier audio that does not contain hidden information by using a quantization method, 获得第二音频,串联第一音频和第二音频获得传输音频;Obtaining the second audio, concatenating the first audio and the second audio to obtain the transmission audio; 所述提取秘密音频的极值和极值坐标,根据极值和极值坐标获取隐蔽信息,Said extracting the extremum and extremum coordinates of the secret audio, obtaining concealed information according to the extremum and extremum coordinates, 包括:include: 提取秘密音频的极值和极值坐标;extract the extrema and extrema coordinates of the secret audio; 提取极值坐标的差分序列,以及对极值及极值坐标的差分序列做伸缩变换;将伸缩变换后的极值及极值坐标的差分序列进行Haar小波一级重构,获得隐蔽信息;Extract the differential sequence of the extreme value coordinates, and perform stretching transformation on the extreme value and the difference sequence of the extreme value coordinates; perform Haar wavelet first-level reconstruction on the extremum and the difference sequence of the extreme value coordinates after the stretching transformation, to obtain hidden information; 所述利用量化方法将密钥嵌入未含有隐蔽信息的载体音频,获得第二音频,The second audio is obtained by using a quantization method to embed the key into the carrier audio that does not contain hidden information, 串联第一音频和第二音频获得传输音频,包括:Connecting the first audio and the second audio in series to obtain transmission audio, including: 获取极值序列的长度作为密钥,将密钥转化为二值编码;Obtain the length of the extremum sequence as the key, and convert the key into a binary code; 将未含有隐蔽信息的载体音频进行离散余弦变换,获得第四低频系数和第四高频系数;performing discrete cosine transform on the carrier audio that does not contain concealed information to obtain a fourth low-frequency coefficient and a fourth high-frequency coefficient; 将二值编码量化嵌入第四低频系数,获得第五低频系数;Embedding the binary coded quantization into the fourth low-frequency coefficient to obtain the fifth low-frequency coefficient; 对第五低频系数和第四高频系数进行离散余弦逆变换,获得含有密钥的载体音频作为第二音频;Inverse discrete cosine transform is performed on the fifth low-frequency coefficient and the fourth high-frequency coefficient to obtain the carrier audio containing the key as the second audio; 将第一音频和第二音频进行串联,获得传输音频。Connect the first audio and the second audio in series to obtain transmission audio. 8.一种基于小波变换及量化嵌入密钥的音频隐藏装置,其特征在于,包括:8. An audio concealment device based on wavelet transform and quantization embedding key, characterized in that, comprising: 至少一个处理器;at least one processor; 至少一个存储器,用于存储至少一个程序;at least one memory for storing at least one program; 当所述至少一个程序被所述至少一个处理器执行,使得所述至少一个处理器实现权利要求1-6任一项所述的一种基于小波变换及量化嵌入密钥的音频隐藏方法。When the at least one program is executed by the at least one processor, the at least one processor implements the audio concealment method based on wavelet transform and quantization embedding key according to any one of claims 1-6.
CN202010407132.1A 2020-05-14 2020-05-14 Audio hiding method and device based on wavelet transform and quantized embedded key Active CN111755018B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010407132.1A CN111755018B (en) 2020-05-14 2020-05-14 Audio hiding method and device based on wavelet transform and quantized embedded key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010407132.1A CN111755018B (en) 2020-05-14 2020-05-14 Audio hiding method and device based on wavelet transform and quantized embedded key

Publications (2)

Publication Number Publication Date
CN111755018A CN111755018A (en) 2020-10-09
CN111755018B true CN111755018B (en) 2023-08-22

Family

ID=72673490

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010407132.1A Active CN111755018B (en) 2020-05-14 2020-05-14 Audio hiding method and device based on wavelet transform and quantized embedded key

Country Status (1)

Country Link
CN (1) CN111755018B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112968766A (en) * 2021-01-29 2021-06-15 电子科技大学 Key negotiation method and system
CN115696253B (en) * 2021-07-28 2025-01-10 上海交通大学 Data transmission method, system, sensor and base station based on wavelet transformation
CN114205168B (en) * 2021-12-20 2023-07-18 全球能源互联网研究院有限公司 A terminal device key distribution method and system for identity authentication
CN115116452B (en) * 2021-12-30 2024-11-15 昆明理工大学 An information hiding method based on speech GFCC feature parameters

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1658555A (en) * 2004-02-17 2005-08-24 三洋电机株式会社 Electronic watermark embedding device and method and electronic watermark extraction device and method
CN104795071A (en) * 2015-04-18 2015-07-22 广东石油化工学院 Blind audio watermark embedding and watermark extraction processing method
CN104851428A (en) * 2015-04-15 2015-08-19 东莞中山大学研究院 Method for realizing watermark encryption and decryption based on audio signal
CN106504757A (en) * 2016-11-09 2017-03-15 天津大学 An Adaptive Audio Blind Watermarking Method Based on Auditory Model
CN106878827A (en) * 2017-03-22 2017-06-20 河海大学 A Highly Robust Audio-Video Cross-Watermarking Algorithm
CN108648761A (en) * 2018-05-10 2018-10-12 北京泛融科技有限公司 A method of the embedded block chain account book in audio watermarking
CN111028850A (en) * 2018-10-10 2020-04-17 中国移动通信集团浙江有限公司 An audio watermark embedding method and extraction method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7035700B2 (en) * 2002-03-13 2006-04-25 The United States Of America As Represented By The Secretary Of The Air Force Method and apparatus for embedding data in audio signals
US7460684B2 (en) * 2003-06-13 2008-12-02 Nielsen Media Research, Inc. Method and apparatus for embedding watermarks

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1658555A (en) * 2004-02-17 2005-08-24 三洋电机株式会社 Electronic watermark embedding device and method and electronic watermark extraction device and method
CN104851428A (en) * 2015-04-15 2015-08-19 东莞中山大学研究院 Method for realizing watermark encryption and decryption based on audio signal
CN104795071A (en) * 2015-04-18 2015-07-22 广东石油化工学院 Blind audio watermark embedding and watermark extraction processing method
CN106504757A (en) * 2016-11-09 2017-03-15 天津大学 An Adaptive Audio Blind Watermarking Method Based on Auditory Model
CN106878827A (en) * 2017-03-22 2017-06-20 河海大学 A Highly Robust Audio-Video Cross-Watermarking Algorithm
CN108648761A (en) * 2018-05-10 2018-10-12 北京泛融科技有限公司 A method of the embedded block chain account book in audio watermarking
CN111028850A (en) * 2018-10-10 2020-04-17 中国移动通信集团浙江有限公司 An audio watermark embedding method and extraction method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
An Audio Steganography based on Twi-DWT and Audio-extremum Features;Minyu Liao;《Proceedings of the 38th Chinese Control Conference》;正文第一节介绍、第3节二次小波变换、第4.1节嵌入算法、第4.2节提取算法及图2、图3 *

Also Published As

Publication number Publication date
CN111755018A (en) 2020-10-09

Similar Documents

Publication Publication Date Title
Ali et al. High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain
CN111755018B (en) Audio hiding method and device based on wavelet transform and quantized embedded key
Pérez-González et al. Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications
JP2008191675A (en) Method for hashing digital signal
CN108648761B (en) Method for embedding blockchain account book in audio digital watermark
Kanhe et al. A DCT–SVD-based speech steganography in voiced frames
Tareef et al. A highly secure oblivious sparse coding-based watermarking system for ownership verification
Zhang et al. Digital watermarking based on joint DWT–DCT and OMP reconstruction
CN108198563A (en) A kind of Multifunctional audio guard method of digital copyright protection and content authentication
Liu et al. A security watermark scheme used for digital speech forensics
Zhang et al. Coverless video steganography based on audio and frame features
Bhat K et al. Design of a blind quantization‐based audio watermarking scheme using singular value decomposition
Wang et al. Privacy-preserving reversible data hiding based on quad-tree block encoding and integer wavelet transform
CN102664014B (en) Blind audio watermark implementing method based on logarithmic quantization index modulation
Hemalatha et al. Audio data hiding technique using integer wavelet transform
Voloshynovskiy et al. Conception and limits of robust perceptual hashing: towards side information assisted hash functions.
Jain et al. Effective Audio Steganography by using Coefficient Comparison in DCT Domain
Valenzise et al. Identification of sparse audio tampering using distributed source coding and compressive sensing techniques
Al-Ghamdi et al. Improve the security for voice cryptography in the RSA algorithm
CN109346091B (en) An adaptive steganography method and system for compressed audio based on equal-length entropy codeword replacement
Wu et al. Robust and blind audio watermarking scheme based on genetic algorithm in dual transform domain
CN108492241A (en) Watermark insertion based on LWT algorithms and AES encryption algorithm and extracting method
Zhu et al. Optimal watermark embedding combining spread spectrum and quantization
Korkmaz et al. Secure Audio Steganography Using Vectorized LSB and Chaos-Based Encryption
Qian et al. VICTOR: An Adaptive Framing-based Speech Content Authentication and Recovery Algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant