著者
Xuping Huang Akira Nishimura Isao Echizen
雑誌
研究報告コンピュータセキュリティ(CSEC)
巻号頁・発行日
vol.2011, no.8, pp.1-8, 2011-11-28

We propose and implement a content-based tampering detective steganography scheme using acoustic data with probative value in this paper. The purpose is to verify and identify malicious modification. Content-based hash function SHA-1 is adapted to detect tampering. After transforming data from time-domain to frequency domain using integer Discrete Cosine Transform (int-DCT), the amplitude of the highest frequency domain is expanded to reserve embedding capacity which is necessary for hiding hash value and index table for hiding. Lossless embedding and extraction algorithm ensure this scheme a reversible alternative scheme to meet the requirements of acoustic media with probative value. Hash digest is applied to data units after the original data is divided to frames to detect tampering in frame unit and to ensure the reversibility of the rest data even tampering occurs partially. The numerical simulation experiments on detection precise and acoustic degradation indicate that the proposed scheme satisfied highly variability and reversibility, while the acoustic degradation of stego data is imperceptible on the basis of the ITU-R BS.1387 (PEAQ) standard.We propose and implement a content-based tampering detective steganography scheme using acoustic data with probative value in this paper. The purpose is to verify and identify malicious modification. Content-based hash function SHA-1 is adapted to detect tampering. After transforming data from time-domain to frequency domain using integer Discrete Cosine Transform (int-DCT), the amplitude of the highest frequency domain is expanded to reserve embedding capacity which is necessary for hiding hash value and index table for hiding. Lossless embedding and extraction algorithm ensure this scheme a reversible alternative scheme to meet the requirements of acoustic media with probative value. Hash digest is applied to data units after the original data is divided to frames to detect tampering in frame unit and to ensure the reversibility of the rest data even tampering occurs partially. The numerical simulation experiments on detection precise and acoustic degradation indicate that the proposed scheme satisfied highly variability and reversibility, while the acoustic degradation of stego data is imperceptible on the basis of the ITU-R BS.1387 (PEAQ) standard.

言及状況

Twitter (2 users, 2 posts, 0 favorites)

1 1 https://t.co/N7jMlAyPLQ
こんな論文どうですか? A novel content-based tampering detective steganography for acoustic data(Xuping Huangほか),2011 … https://t.co/Edrr7Kw32C

収集済み URL リスト