A NOVEL COVERT SPEECH COMMUNICATION SYSTEM AND ITS IMPLEMENTATION

来源 :Journal of Electronics(China) | 被引量 : 0次 | 上传用户:mipanglin
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In this paper, a Covert Speech Telephone (CST) is designed and implemented based on the information hiding technique, which works on the internet. To solve the large embedding capacity problem for real-time information hiding, a steganographic system combined with a watermarking scheme is proposed, which skillfully transfers the secret speech into watermarking information. The basic idea is to use the speech recognition to significantly reduce the size of information that has to be transmitted in a hidden way. Furthermore, an improved DFT watermarking scheme is proposed which adaptively chooses the embedding locations and applies the multi-ary modulation technique. Based on the GUI (Graphical User Interface) software, the CST operates on both ordinary and secure mode. It is a completely digital system with high speech quality. Objective and subjective tests show that the CST is robust against normal signal processing attacks and steganalysis. The proposed scheme can be used in terms of military applications. In this paper, a Covert Speech Telephone (CST) is designed and implemented on the information hiding technique, which works on the internet. To solve the large embedding capacity problem for real-time information hiding, a steganographic system combined with a watermarking scheme is proposed, which skillfully transfers the secret speech into watermarking information. The basic idea is to use the speech recognition to significantly reduce the size of information that has to be transmitted in a hidden way. chooses the embedding locations and applies the multi-ary modulation technique. Based on the GUI (Graphical User Interface) software, the CST operates on both ordinary and secure mode. It is a completely digital system with high speech quality. Objective and subjective tests show that the CST is robust against normal signal processing attacks and steganalysis. The proposed scheme can be used in terms of military applications.
其他文献
作为“史上最强越野车”,奔驰G500已经在天涯海角征战了三十余年,它的传奇与历史就在这方形的棱角中一步步续写到今日。即便是停滞前进,五十年内也绝无冒犯之敌。每当在路上见到
2.修习禅定的入门方法rn俗话说,工欲善其事,必先利其器,如果要成功,必须藉用工具.修定习禅也是如此,我们的六根,正是入门的工具和对象.
一、企业上网rn企业上网,从字面上看,有两层含义.一是指解决企业内部人员的电脑上网问题,包括内部电脑连网,通过拨号方式联接到因特网,或者是通过ISDN、DDN等专线方式将企业
在我国的许多传统节日里和民俗中,蕴藏着浓郁的民族文化和丰富的卫生保健知识,人们不但应时按景的选用不同的节日食品,并且还蕴喻着优秀的文化及保健常识。例如,正月十五元
2018年春节刚过,山东省委书记刘家义在山东省全面展开新旧动能转换重大工程动员大会上的讲话刷爆了“朋友圈”,也吹响了山东向高质量发展进军的号角.rn随后,山东省属企业新旧
期刊
提出了一种基于2.4GHz/900MHz双射频蓝牙模块的研究与实现方案。该方法通过双射频通信模式来解决短距离无线通信中日益严重的共扰问题,为之提出了全新的解决思路。在不改变蓝
目的 分析中国汉族腓骨肌萎缩症(CMT)家系CX32基因突变及相应临床特点.方法 应用多聚酶链反应结合DNA直接测序法对34个于2004-2011年由湘雅医院、湘雅三医院神经内科门诊和医学遗传学国家重点实验室遗传门诊收集无PMP22基因大片段重复突变,无男传男的腓骨肌萎缩症家系进行CX32基因突变检测,并分析6个CMTX1家系中11例患者的临床、电生理及神经病理特点.结果 发现6个CMTX1家系5
异搏定的药学名称是维拉帕米,是一种非二氢吡啶类钙拮抗药。常用于治疗快速性室上性心律失常、房性早搏、高血压、食管失弛缓症和食管痉挛等。但这里强调,在应用异搏定时,不
期刊
北斗系统,国之重器;北斗产业,国之大计.我国自主的北斗卫星导航系统正处于全球组网的关键阶段,世人瞩目.相对于系统建设的高歌猛进,北斗应用产业如何发展,北斗如何与传统产业
期刊
高血压、肥胖、吸烟、抑郁等,是中风的危险因素,而其它的一些诱因却鲜为人知。这些诱因是: 气候 晚秋和早春是中风易发高峰,都发生在零摄氏度天气,所以应及时防寒、服药。
期刊