系统仿真学报 ›› 2019, Vol. 31 ›› Issue (3): 460-467.doi: 10.16182/j.issn1004731x.joss.17-0208

• 仿真系统与技术 • 上一篇    下一篇

基于LDPC码的可靠自同步网络语音隐写

高瞻瞻, 汤光明, 宋海涛   

  1. 解放军信息工程大学, 河南 郑州 450001
  • 收稿日期:2017-05-15 发布日期:2019-11-20
  • 作者简介:高瞻瞻(1988-),男,河北正定,博士,研究方向为信息隐藏、多媒体处理。
  • 基金资助:
    国家自然科学基金(61272488),河南省科技攻关项目(122102210047),全军军事类研究生课题(2015JY125)

Robust and Self-Synchronous Steganography for Voice-over-IP Based on LDPC Codes

Gao Zhanzhan, Tang Guangming, Song Haitao   

  1. PLA Information and Technology University, Zhengzhou 450001, China
  • Received:2017-05-15 Published:2019-11-20

摘要: 网络语音(Voice over IP,VoIP)建立在UDP/IP协议族上,网络分组丢失不可避免。VoIP隐写数据流无头无尾且实时性强,接收方难以准确提取秘密信息。提出一种可靠自同步的VoIP隐写框架,在兼顾隐蔽性的前提下解决了以上问题。利用LDPC(Low density parity check)码对秘密信息进行纠删预处理,再结合矩阵嵌入实现隐写,增强了隐蔽通信的可靠性;利用LDPC码的译码特性和校验约束关系建立编码辅助同步,实现秘密信息的自同步提取。实验结果表明,所提隐写框架可以有效同步收发双方,且抗分组丢失能力优于已有算法。

关键词: 网络语音, 自适应隐写, 分组丢失恢复, 隐写同步

Abstract: VoIP (Voice over IP) is a kind of voice communication technology based on UDP/IP protocols, so packet loss will inevitably happen when the channel environment deteriorates. Besides that, stego VoIP data flows are real-time and have no head or tail, which pose more challenges to accurately extract the secret messages. This paper proposes a robust and self-synchronous VoIP steganography method, which solves the above two problems under the premise of maintaining good imperceptibility. In this method, low density parity check (LDPC) codes are introduced to preprocess the secret data, and the encoded data are embedded into voice packets with minimum distortion using matrix embedding. In this way, the erasure correcting capability for covert communication is enhanced. Based on the decoding characteristics and the check constraints of LDPC codes, a code-aided synchronization scheme is established, which is used in the new method to realize self-synchronous message extraction. Experimental results show that the novel method can effectively synchronize both the sender and the receiver, and its resistance to packet loss is better than existing methods.

Key words: voice over IP, adaptive steganography, packet loss recovery, steganographic synchronization

中图分类号: