PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Czasowo-częstotliwościowa metoda synchronizacji sygnałów akustycznych na potrzeby transmisji steganograficznej

Identyfikatory
Warianty tytułu
EN
Time and frequency method of synchronization of acoustic signal used to steganography
Konferencja
XXXIII Krajowe Sympozjum Telekomunikacji i Teleinformatyki (XXXIII ;13-15.09.2017 ; Warszawa, Polska)
Języki publikacji
PL
Abstrakty
PL
W artykule zaprezentowano metodę synchronizacji sygnałów akustycznych. Przedstawiony algorytm koryguje zniekształcenia powstające wskutek akwizycji sygnałów, a wynikające z różnic taktowania zegarów w przetwornikach analogowo – cyfrowych i cyfrowo – analogowych. Ponadto korzystając z własności funkcji korelacji wzajemnej algorytm wyznacza wartość opóźnienia sygnału odbieranego względem sygnału nadawanego.
EN
The paper presents a method of synchronization of acoustic signals. Described algorithm corrects the distortion caused by signal acquisition, resulting from clockspeed differences in analog-to-digital and digital-to- analog converters. In addition, using the properties of crosscorrelation function algorithm determines the value of the delay of the received signal relative to the transmitted signal.
Rocznik
Tom
Strony
902--907, CD
Opis fizyczny
Bibliogr. 38 poz., rys., tab.
Twórcy
autor
  • Wojskowa Akademia Techniczna, Wydział Elektroniki, ul. gen. Sylwestra Kaliskiego 2, 00-908 Warszawa 49
  • Wojskowa Akademia Techniczna, Wydział Elektroniki, ul. gen. Sylwestra Kaliskiego 2, 00-908 Warszawa 49
Bibliografia
  • [1] Cox I., J. 2008. „Digital Watermarking and Steganography”. Elsevier.
  • [2] Mosorov V. 2013. „Steganografia cyfrowa Sztuka ukrywania informacji”. Wydawnictwo Uniwersytetu Łódzkiego.
  • [3] https://en.wikipedia.org/wiki/Steganography
  • [4] Bender W., Gruhl D., Morimoto N., Lu A. 1996. „Techniques for data hiding”. IBM SYSTEM JOURNAL, Vol. 35, Nos. 3&4.
  • [5] Mazurczyk W. 2009. „Steganografia w telefonii IP”. Rozprawa doktorska, Politechnika Warszawska.
  • [6] Johnson N., F., Duric Z., Jajodia S. 2001. „Information hiding: steganography and watermarking: attacks and countermeasures”. Kluwer Academic Publishers.
  • [7] Zander S., Armitage G., Branch P. 2007. „A Survey of Covert Channels and Countermeasures in Computer Network Protocols”. IEEE Communications Surveys & Tutorials, Vol. 9, Issue 3.
  • [8] Anderson R., J., Petitcolas F., A., P. 1998. „On The Limits of Steganography”, IEEE Journal of Selected Areas in Communications, Vol. 6, Issue 4.
  • [9] Cvejic N., Seppanen T. 2002. „Increasing the capacity of LSB-based audio steganography”, 5th Workshop on Multimedia Signal Processing.
  • [10] Cvejic N., Seppanen T. 2004. „Increasing robustness of LSB audio steganography using a novel embedding method”, Information Technology: Coding and Computing.
  • [11] Zamani M., Manaf A., B., A., Ahmad R., B., Zeki A., M. 2009. „An approach to improve the robustness of substitution techniques of audio steganography”, 2nd IEEE International Conference on Computer Science and Information Technology.
  • [12] Kumar H., Anuradha. 2012. „Enhanced LSB technique for audio steganography”, 3rd International Conference on Computing, Communication and Networking Technologies.
  • [13] Gruhl D., Lu A., Bender W. 1996. „Echo Hiding”, Information Hiding Workshop.
  • [14] Mazharuddin S., A., Tirta P., Adi P., B. 2013. „Echo Data Hiding Steganography And RSA Cryptography On Audio Media”, Jurnal Industri, Vol. 11, Issue 1.
  • [15] Ansari R., Malik H., Khokhar A. 2004. „Data- Hiding In Audio Using Frequency-Selective Phase Alteration”, International Conference on Acoustics, Speech, and Signal Processing.
  • [16] Nutzinger M., Wurzer J. 2011. „A Novel Phase Coding Technique for Steganography in Auditive Media”, 6th International Conference on Availability, Reliability and Security.
  • [17] Xiaoxiao D., Bocko M., F., Ignjatovic Z. 2004. „Robustness analysis of a digital audio steganographic method based on phase manipulation”, 7th International Conference on Signal Processing.
  • [18] Tanwar R., Bisla M. 2014. „Audio Steganography”, International Conference on Reliability, Optimization and Information Technology.
  • [19] Djebbar F., Ayad B., Meraim K., A., Hamam H. 2012. „Comparative study of digital audio steganography techniques”, EURASIP Journal on Audio, Speech, and Music Processing.
  • [20] Gang L., Akansu A., N., Ramkumar M. 2001. „MP3 resistant oblivious steganography”, International Conference on Acoustics, Speech, and Signal Processing.
  • [21] Xiaoxiao D., Bocko M., F., Ignjatovic Z. 2004. „ Data hiding via phase manipulation of audio signals”, International Conference on Acoustics, Speech, and Signal Processing.
  • [22] Piotrowski Z. (submitted 25 January 2011, published 2013), „Drift Correction Modulation Scheme for Digital Signal Processing”. Mathematical And Computer Modelling, Vol. 57, Issue 11-12
  • [23] Djebbar F., Abed-Meraim K., Guerchi D., Hamam H. 2010. „Dynamic energy based text-in-speech spectrum hiding using speech masking properties”, 2nd International Conference on Industrial Mechatronics and Automation.
  • [24] Djebbar F., Hamam H., Abed-Meraim K., Guerchi D. 2010. „Controlled Distortion for High Capacity Data-in-Speech Spectrum Steganography”, 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
  • [25] Wodecki K., Piotrowski Z., Wojtuń J. 2012. „Acoustic Steganographic Transmission Algorithm Using Signal Coherent Averaging” Military Communications and Information Systems Conference.
  • [26] Dymarski P., Markiewicz R., 2011. “Time and sampling frequency offset correction in audio watermarking”, 18th International Conference on Systems, Signals and Image Processing.
  • [27] Delforouzi A., Pooyan M. 2007. „Adaptive Digital Audio Steganography Based on Integer Wavelet Transform”, 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
  • [28] Santosa R., A., Bao P. 2005. „Audio-to-image wavelet transform based audio steganography”, 47th International Symposium ELMAR.
  • [29] Wei S., Rong-Jun S., Fa-Xin Y., Zhe-Ming L. 2012. „Data Hiding in Audio Based on Audio-to-Image Wavelet Transform and Vector Quantization”, 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
  • [30] Sterling M., Titlebaum E. L., Xiaoxiao D., Bocko M. F. 2005. „An adaptive spread-spectrum data hiding technique for digital audio”, International Conference on Acoustics, Speech, and Signal Processing.
  • [31] Wei Qin Cheng, Fei Han, Man Juon Tung, Kai Xu. 2007. „Robust Audio Steganography using Direct- Sequence Spread Spectrum Technology”
  • [32] Nutzinger M., Fabian C., Marschalek M. 2010. „Secure Hybrid Spread Spectrum System for Steganography in Auditive Media”, 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
  • [33] Rupanshi, Preeti, Vandana. 2014. „Audio Steganography by Direct Sequence Spread Spectrum”, International Journal of Computer Trends and Technology, Vol. 12, Issue 2.
  • [34] Garcia R. 1999. „Digital watermarking of audio signals using a psychoacoustic auditory model and spread spectrum theory”, Master of Science Thesis, Music Engineering Technology, University of Miami.
  • [35] Garcia R. 1999. „Digital watermarking of audio signals using a psychoacoustic auditory model and spread spectrum theory”, 107th Convention, Audio Engineering Society.
  • [36] Piotrowski Z., Wojtuń J., Stasiewicz K. 2012. „Using Drift Correction Modulation for steganographic radio transmission”, Sensor Signal Processing for Defence.
  • [37] ITU–R BS.1116–3 Methods for the subjective assessment of small impairments in audio systems including multichannel sound system.
  • [38] http://www.itu.int/net/itut/sigdb/genaudio/AudioForm-g.aspx?val=1000050
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-99aba25a-2712-474b-b039-4398e96af806
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.