مقایسه اثر پنهان نگاری بر محتوای دیتای ارسالی در استانداردهای کدگذار صوتی LPC, CELP, MELP

نوع مقاله : مقاله پژوهشی

نویسندگان

1 گروه مخابرات، دانشکده مهندسی برق و کامپیوتر، دانشگاه جامع امام حسین (ع)، تهران، ایران

2 دانشجوی دکتری تخصصی مهندسی برق گرایش جنگ الکترونیک مخابراتی دانشگاعه جامام حسین (ع)

3 دانشکده مهندسی برق و کامپیوتر، دانشگاه جامع امام حسین (ع)، تهران، ایران

4 گروه جنگ الکترونیک- دانشگاه جامع امام حسین (ع)

چکیده

پنهان‌نگاری یکی از مهم‌ترین روش‌های انتقال امن اطلاعات حساس در دنیای جنگ الکترونیک است، همچنین پنهان‌نگاری داده‌های صوتی با توجه ظرفیت و پیچیدگی بالاتر، نسبت به سایر روش‌های پنهان‌نگاری که آن را شبیه به آنتروپی می‌کند موردتوجه و علاقه پژوهشگران حوزه امنیت اطلاعات قرار می‌گیرد. در این پژوهش کدینگ کدگذارهای صوتی LPC، CELP و MELP شکسته شده که به‌عنوان یک نوآوری مهم در حوزه امنیت ملی اطلاعات و جنگ الکترونیک مطرح می‌شود، چراکه این کدگذارها جزو قدرتمندترین روش‌های کدگذاری صوتی هستند که توسط نیروهای ناتو برای انتقال صوت مورداستفاده قرار می‌گیرند. در روش پیشنهادی این مقاله از روش جایگزینی بیت کم‌ارزش برای پنهان کردن اطلاعات مخفی در صوت حامل استفاده‌شده است. نتایج شبیه‌سازی و ارزیابی مطابق جدول1 نشان می‌دهد این روش با توجه به مقاومت بالا نسبت به سایر روش‌ها امنیت زیادی دارد و مقایسه این سه کدگذار بیانگر آن است که روش MELP دارای امنیت بالاتری نسبت به یکدیگر هستند.

کلیدواژه‌ها


1.    J. J. D. van Schalkwyk, D. J. Joubert and J. G. van der Linde, "Linear predictive speech coding at 2400 b/s," in Transactions of the South African Institute of Electrical Engineers, vol. 84, no. 3, pp. 146-152, June 1993.##2.    M. Schroeder and B. Atal, "Code-excited linear prediction (CELP): High-quality speech at very low bit rates," ICASSP '85. IEEE International Conference on Acoustics, Speech, and Signal Processing, 1985, pp. 937-940, doi: 10.1109/ICASSP.1985.1168147.##3.    A. V. McCree and T. P. Barnwell, "A mixed excitation LPC vocoder model for low bit rate speech coding," in IEEE Transactions on Speech and Audio Processing, vol. 3, no. 4, pp. 242-250, July 1995.##4.    Talati, S., Etezadifar, P. (2020). 'Providing an Optimal Way to Increase the Security of Data Transfer using Watermarking in Digital Audio Signals', Majlesi Journal of Telecommunication Devices, 9(1), pp. 35-46.##5.    Etezadifar, P., Talati, S., Hassani Ahangar, M. R., Molazade, M. (2023). 'Investigation of Steganography Methods in Audio Standard Coders: LPC, CELP, MELP', Majlesi Journal of Telecommunication Devices, doi: 10.30486/mjtd.2022.695928.##6.    Muhammad Asad; Junaid Gilani; Adnan Khalid, An enhanced least significant bit modification technique for audio steganography, International Conference on Computer Networks and Information Technology, July 2011.##7.    H. Liu, J. Liu, R. Hu, X. Yan and S. Wan, “Adaptive audio steganography scheme based on wavelet packet energy,” in IEEE International Conference on High Performance and Smart Computing (HPSC), 2017.##8.    Samir Kumar, Bandyopadhyay Barnali, Gupta Banik, LSB Modification and Phase Encoding Technique of Audio Steganography Revisited, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 4, June 2012.##9.    Bao, Ma, “Steganographic Techniques and their use in an Open Systems Environment”, Bret Dunbar, The information Security reading Room, SANS Institute 2002.##10.    N. Cvejic and T. Seppanen, "Increasing robustness of LSB audio steganography using a novel embedding method," International Conference on Information Technology: Coding and Computing. Proceedings. ITCC 2004, Las Vegas, NV, USA, 2004, pp. 533-537 Vol.2, doi: 10.1109/ITCC.2004.1286709.##11.    Cvejic, N. and Seppänen, T., 2005. Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB Coding. J. Univers. Comput. Sci, 11(1).##12.    Delforouzi, A., Pooyan, M. “Adaptive Digital Audio Steganography Based on Integer Wavelet Transform”. Circuits Syst Signal Process 27, 247–259 (2008). https://doi.org/10.1007/ s00034-008-9019-x.##13.    Mansour Sheikhan et al, High-Quality Audio steganography by Floating Substitution of LSBs in Wavelet Domain, world applied science Journal IDOSI publications, 2010.##14.    S. S. Divya and M. R. M. Reddy, “Hiding Text In Audio Using Multiple LSB Steganography And Provide Security Using Cryptography,” Int. J. Sci. Technol. Res., vol. 1, no. 6, pp. 68–70, 2012.##15.    Veselska, O.; Lavrynenko, O.; Odarchenko, R.; Zaliskyi, M.; Bakhtiiarov, D.; Karpinski, M.; Rajba, S. A “Wavelet-Based Steganographic Method for Text Hiding in an Audio Signal”. Sensors 2022.##16.    Mohsen Bazyar and Rubita Sudirma, “A Robust Data Embedding Method for MPEG Layer III Audio Steganography”, International Journal of Security and Its ApplicationsVol.9, No.12 (2015).##17.    M. Wakiyama, Y. Hidaka, and K. Nozaki, “An audio steganography by a low-bit coding method with wave files,” Proc. - 2010 6th Int. Conf. Intell. Inf. Hiding Multimed. Signal Process. IIHMSP 2010, pp. 530–533, 2010, doi: 10.1109/IIHMSP.2010.135.##18.    Hashemi, Seyed & Barati, Shahrokh & Talati, S. & Noori, H. (2016). “A genetic algorithm approach to optimal placement of switching and protective equipment on a distribution network”. Journal of Engineering and Applied Sciences. 11. 1395-1400.##19.    Hashemi, Seyed & Abyari, M. & Barati, Shahrokh & Tahmasebi, Sanaz & Talati, S. (2016). “A proposed method to controller parameter soft tuning as accommodation FTC after unknown input observer FDI”. Journal of Engineering and Applied Sciences. 11. 2818-2829.##20.    S. Talati, A. Rahmati, and H. Heidari. (2019) “Investigating the Effect of Voltage Controlled Oscillator Delay on the Stability of Phase Lock Loops”, MJTD, vol. 8, no. 2, pp. 57-61.##21.    Talati, S., & Alavi, S. M. (2020). “Radar Systems Deception using Cross-eye Technique”. Majlesi Journal of Mechatronic Systems, 9(3), 19-21.##22.    Saeed Talati, mohamadreza Hasani Ahangar   (2020) “Analysis, Simulation and Optimization of LVQ Neural Network Algorithm and Comparison with SOM”, MJTD, vol. 10, no. 1.##23.    Talati, S., & Hassani Ahangar. M. R. (2020) “Combining Principal Component Analysis Methods and Self-Organized and Vector Learning Neural Networks for Radar Data”, Majlesi Journal of Telecommunication Devices, 9(2), 65-69.##24.    Hassani Ahangar, M. R., Talati, S., Rahmati, A., & Heidari, H. (2020). “The Use of Electronic Warfare and Information Signaling in Network-based Warfare”. Majlesi Journal of Telecommunication Devices, 9(2), 93-97.##25.    Talati, S., & Amjadi, A. (2020). “Design and Simulation of a Novel Photonic Crystal Fiber with a Low Dispersion Coefficient in the Terahertz Band”. Majlesi Journal of Mechatronic Systems, 9(2), 23-28.##26.    Talati, Saeed, Hassani Ahangar, Mohammad Reza. (2021). “Radar Data Processing Using a Combination of Principal Component Analysis Methods and Self-Organized and Digitizing Learning Vector Neural Networks”, Electronic and Cyber Defense, 9 (2), pp. 1-7.##27.    Talati, S., Alavi, S. M., & Akbarzade, H. (2021). “Investigating the Ambiguity of Ghosts in Radar and Examining the Diagnosis and Ways to Deal with it”. Majlesi Journal of Mechatronic Systems, 10(2).##28.    Etezadifar, P., & Talati, S. (2021). “Analysis and Investigation of Disturbance in Radar Systems Using New Techniques of Electronic Attack”. Majlesi Journal of Telecommunication Devices, 10(2), 55-59.##29.    Saeed. Talati, Behzad. Ebadi, Houman. Akbarzade “Determining of the fault location in distribution systems in presence of distributed generation resources using the original post phasors”. QUID 2017, pp. 1806-1812, Special Issue No.1- ISSN: 1692-343X, Medellín-Colombia. April 2017.##30.    Talati, Saeed, Akbari Thani, Milad, Hassani Ahangar, Mohammad Reza. (2020). “Detection of Radar Targets Using GMDH Deep Neural Network”, Radar Journal, 8 (1), pp. 65-74.##31.    Talati, S., Abdollahi, R., Soltaninia, V., & Ayat, M. (2021). “A New Emitter Localization Technique Using Airborne Direction Finder Sensor”. Majlesi Journal of Mechatronic Systems, 10(4), 5-16.##32.    Ghazali, S. M., Baleghi, Y. “Pedestrian Detection in Infrared Outdoor Images Based on Atmospheric Situation Estimation” Journal of AI and Data Mining, 2019; 7(1): 1-16. doi: 10.22044/jadm.2018.5742.1696##33.    Talati, S., Ghazali, S. M., Hassani Ahangar, M., & Alavi, S. M. (2021). “Analysis and Evaluation of Increasing the Throughput of Processors by Eliminating the Lobe’s Disorder” Majlesi Journal of Telecommunication Devices, 10(3), 119-123. https://doi.org/10.52547/mjtd.10.3.119##34.    Talati, Saeed, Ghazali, Seyed Morteza, SoltaniNia, VahidReza, “Design and construct full invisible band metamaterial-based coating with layer-by-layer structure in the microwave range from 8 to 10 GHz” Journal of Physics D: Applied Physics. Volume 56, Number 17. 2023. DOI 10.1088/1361- 6463/acb8c7.##35.    EtezadiFar. P., Talati. S., Hassani Ahangar. M.R., Molazade. M., “Investigation of Steganography Methods in Audio Standard Coders: LPC, CELP, MELP” Majlesi Journal of Telecommunication Devices, 12(1), in press, 2023.##36.    Soltaninia, V., Talati, S., Hasani Ahangar, M., Samsami Khodadad, F., Baei, P. (2023). 'Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdroppشing UAV', Electronic and Cyber Defense, 11(2), pp. 45-56.##