Computer Science ›› 2021, Vol. 48 ›› Issue (9): 298-305.doi: 10.11896/jsjkx.200800199

• Information Security • Previous Articles     Next Articles

High Capacity Reversible Data Hiding Algorithm for Audio Files Based on Code Division Multiplexing

MA Bin1, HOU Jin-cheng1, WANG Chun-peng1, LI Jian1, SHI Yun-qing2   

  1. 1 School of Computer Science, Technology (School of Cyber Security), Qilu University of Technology, Jinan 250300, China
    2 Electrical and Computer Engineering,New Jersey Institute of Technology,Newark,New Jersey 07102,USA
  • Received:2020-08-30 Revised:2020-10-06 Online:2021-09-15 Published:2021-09-10
  • About author:MA Bin,born in 1973,Ph.D,professor.His main research interests include reversible data hiding,multimedia security and image processing.
  • Supported by:
    National Natural Science Foundation of China(61872203,61802212)

Abstract: Aiming at the problem of small embedding capacity and low security of reversible data hiding algorithm for audio files,a reversible data hiding(RDH) algorithm for audio files based on code division multiplexing(CDM) is proposed in this paper.The orthogonal spreading sequences are employed to carry secret message.For reversible data hiding in the proposed scheme,they enable the original image can be recovered completely after the secret data having been extracted accurately.At the same time,according the orthogonal character of the embedding vector,the secret data can be overlapping embedded into the audio files and most elements of the sequence are mutually canceled in the process of the data embedding,and thus higher audio fidelity ability is obtained even at large data embedding capacity.Moreover,only the receiver who holds the same embedding vector as the sender can restore the embedded information and the original audio file losslessly,which improves the security performance of the algorithm effectively.Experimental results show that,compared with other audio reversible data hiding algorithms,the CDM based reversible data hiding (RDH) algorithm of audio file can achieve higher data embedding capacity at same audio distortion.

Key words: Audio files, Code division multiplexing(CDM), High capacity, Reversible data hiding(RDH)

CLC Number: 

  • TP391
[1]BARTONJ M.Method and apparatus for embedding authentication information within digital data[OL].https://xueshu.baidu.com/usercenter/paper/show?paperid=1e1k02f0kp2c00s0fp4f0gh08n324784&site=xueshu_se.
[2]SHI Y Q,NI Z,ZOU D,et al.Lossless data hiding:fundamentals,algorithms and applications[C]//International Symposium on Circuits & Systems.IEEE,2004:33-36.
[3]COX I.Digital watermarking[J].Journal of Electronic Imaging,2002,11(3):414.
[4]FRIDRICH J,GOLJAN M,DU R.Lossless Data Embedding-New Paradigm in Digital Watermarking[J].EURASIP Journal on Advances in Signal Processing,2002,2002(2):185-196.
[5]FRIDRICH J,GOLJAN M,DU R.Invertible authentication[J].Proceedings of SPIE-The International Society for Optical Engineering,2001,4314:197-208.
[6]CELIK M U,SHARMA G,TEKALP A M,et al.Lossless ge-neralized-LSB data embedding[J].IEEE Transactions on Image Processing,2005,14(2):253-266.
[7]KALKER T,WILLEMS F M J.Capacity bounds and constructions for reversible data-hiding[C]// Electronic Imaging.International Society for Optics and Photonics,2003:71-76.
[8]TIAN J.Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896.
[9]ALATTAR A M.Reversible Watermark Using the DifferenceExpansion of a Generalized Integer Transform[J].IEEE Tran-sactions on Image Processing,2004,13(8):1147-1156.
[10]HEIJMANS H.Reversible data embedding into images usingwavelet techniques and sorting[J].IEEE Trans.Image Process,2005,14(12):2082-2090.
[11]KIM H J,SACHNEV V,SHI Y Q,et al.A Novel Difference Expansion Transform for Reversible Data Embedding[J].IEEE Transactions on Information Forensics and Security,2008,3(3):456-465.
[12]NI Z,SHI Y Q,ANSARI N,et al.Reversible data hiding[J].IEEE Transactions on Circuits and Systems for Video Technology,2006,16(3):354-362.
[13]NI Z,SHI Y Q,ANSARI N,et al.Robust lossless image data hiding[J].IEEE Trans.on Circuits & Systems for Video Technology,2008,18(4):497-509.
[14]TAI W L,YEH C M,CHANG C C.Reversible Data HidingBased on Histogram Modification of Pixel Differences[J].IEEE Transactions on Circuits and Systems for Video Technology,2009,19(6):906-910.
[15]THODI D M,RODRIGUEZ J J.Expansion Embedding Techniques for Reversible Watermarking[M].IEEE Press,2007,16(3):721-730.
[16]SACHNEV V,KIM H J,NAM J,et al.Reversible data embedding using sorting and prediction[J].IEEE Transactions on Circuits and Systems for Video Technology,2009,19(7):989-999.
[17]ZHANG X P.Reversible Data Hiding with Optimal ValueTransfer[J].IEEE Transactions on Multimedia,2013,15(2):316-325.
[18]COLTUC D.Low Distortion Transform for Reversible Watermarking[J].IEEE Transactions on Image Processing,2012,21(1):412-417.
[19]DRAGOI I C,COLTUC D.Local-Prediction-Based DifferenceExpansion Reversible Watermarking[J].IEEE Trans.Image Process,2014.23(4):1779-1790.
[20]MA B,WANG X Y,LI Q,et al.Adaptive error prediction me-thod based on multiple linear regression for reversible data hi-ding[J].Journal of Real-Time Image Processing,2019,16(4):821-834.
[21]VEEN M V D,BRUEKERS F,LEEST A V,et al.High capacity reversible watermarking for audio[C]//Proceedings of SPIE-The International Society for Optical Engineering.2003:2565-2568.
[22] YAN D,WANG R.Reversible Data Hiding for Audio Based on Prediction Error Expansion[C]// International Conference on Intelligent Information Hiding and Multimedia Signal Proces-sing,2008(IIHMSP'08).IEEE Computer Society,2008.
[23]NISHIMURA A.Reversible audio data hiding using linear prediction and error expansion[C]// 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.IEEE,2011:318-321.
[24]WANG F ,XIE Z X,CHEN Z.High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion[J/OL].The Scientific World Journal,2014.https://www.researchgate.net/publication/264537755_High_Capacity_Reversible_Watermarking_for_Audio_by_Histogram_Shifting_and_Predicted_Error_Expansion.
[25]XIANG S J.Non-integer expansion embedding for prediction-based reversible watermarking[C]// International Workshop on Information Hiding.Berlin,Heidelberg:Springer,2012:224-239.
[26]HUANG X P,ONO N,ECHIZEN I,et al.Reversible audio information hiding based on integer DCT coefficients with adaptive hiding locations[C]// International Workshop on Digital Watermarking.Berlin,Heidelberg:Springer,2013:376-389.
[27]XIANG S J,LI Z H.Reversible audio data hiding algorithmusing noncausal prediction of alterable orders[J].EURASIP
Journal on Audio,Speech,and Music Processing,2017(4):2017.
[28]EBU Committee:sound quality assessment material recordings for subjective tests[OL].https://tech.ebu.ch/publications/sqamcd.
[1] CHEN Zhi-qiang, HAN Meng, LI Mu-hang, WU Hong-xin, ZHANG Xi-long. Survey of Concept Drift Handling Methods in Data Streams [J]. Computer Science, 2022, 49(9): 14-32.
[2] WANG Ming, WU Wen-fang, WANG Da-ling, FENG Shi, ZHANG Yi-fei. Generative Link Tree:A Counterfactual Explanation Generation Approach with High Data Fidelity [J]. Computer Science, 2022, 49(9): 33-40.
[3] ZHANG Jia, DONG Shou-bin. Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer [J]. Computer Science, 2022, 49(9): 41-47.
[4] ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63.
[5] SONG Jie, LIANG Mei-yu, XUE Zhe, DU Jun-ping, KOU Fei-fei. Scientific Paper Heterogeneous Graph Node Representation Learning Method Based onUnsupervised Clustering Level [J]. Computer Science, 2022, 49(9): 64-69.
[6] CHAI Hui-min, ZHANG Yong, FANG Min. Aerial Target Grouping Method Based on Feature Similarity Clustering [J]. Computer Science, 2022, 49(9): 70-75.
[7] ZHENG Wen-ping, LIU Mei-lin, YANG Gui. Community Detection Algorithm Based on Node Stability and Neighbor Similarity [J]. Computer Science, 2022, 49(9): 83-91.
[8] LYU Xiao-feng, ZHAO Shu-liang, GAO Heng-da, WU Yong-liang, ZHANG Bao-qi. Short Texts Feautre Enrichment Method Based on Heterogeneous Information Network [J]. Computer Science, 2022, 49(9): 92-100.
[9] XU Tian-hui, GUO Qiang, ZHANG Cai-ming. Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance [J]. Computer Science, 2022, 49(9): 101-110.
[10] NIE Xiu-shan, PAN Jia-nan, TAN Zhi-fang, LIU Xin-fang, GUO Jie, YIN Yi-long. Overview of Natural Language Video Localization [J]. Computer Science, 2022, 49(9): 111-122.
[11] CAO Xiao-wen, LIANG Mei-yu, LU Kang-kang. Fine-grained Semantic Reasoning Based Cross-media Dual-way Adversarial Hashing Learning Model [J]. Computer Science, 2022, 49(9): 123-131.
[12] ZHOU Xu, QIAN Sheng-sheng, LI Zhang-ming, FANG Quan, XU Chang-sheng. Dual Variational Multi-modal Attention Network for Incomplete Social Event Classification [J]. Computer Science, 2022, 49(9): 132-138.
[13] DAI Yu, XU Lin-feng. Cross-image Text Reading Method Based on Text Line Matching [J]. Computer Science, 2022, 49(9): 139-145.
[14] QU Qian-wen, CHE Xiao-ping, QU Chen-xin, LI Jin-ru. Study on Information Perception Based User Presence in Virtual Reality [J]. Computer Science, 2022, 49(9): 146-154.
[15] ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!