Skip to main content

2018 | OriginalPaper | Buchkapitel

A Steganographic Method Based on High Bit Rates Speech Codec of G.723.1

verfasst von : Fufang Li, Binbin Li, Lingxi Peng, Wenbin Chen, Ligang Zheng, Kefu Xu

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With compressed speech codecs having been widely used as the key technology for VoIP and mobile communications, steganography based on compressed speech streams has been flourishing in recent years. In this paper, based on the codec’s characteristic features, we present a steganographic method using the excitation pulse positions of the high bit rate speech codec of ITU-T G.723.1. In the proposed method, the codes of excitation pulse-positions in the speech codec (i.e., codebook positions) are finely modulated according to the secret information that is being hidden. Sensitive data may thus be transmitted in secret without affecting the transmission quality of the normal speech data. Using the algorithm developed in this work and with the all-odd/even characteristics of pulse code positions being utilized, steganography experiments at high bit rates (6.3 Kbit/s) ware conducted on four kinds of voices: male or female voices speaking Mandarin or English. By using the proposed approach, an embedding rate of 2.6% and secret information transfer rate of 166 bits/s resulted in <5.0% degradations of the Perceptual Evaluation of Speech Quality (PESQ) score. And when the data hiding capacity reached 8.8% and the rate of secret information transfer came to 566 bits/s, the PESQ score was still reduced by <12.1%. The experiments show that our algorithm performs a higher degree of secrecy and steganographic efficacy compared with existing similar algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Liu, L., Li, M., Li, Q., Liang, Y.: Perceptually transparent information hiding in G.729 bitstream. In: Proceedings of 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Proceeding, IIH-MSP 2008, Harbin, pp. 406–409. IEEE Press (2008) Liu, L., Li, M., Li, Q., Liang, Y.: Perceptually transparent information hiding in G.729 bitstream. In: Proceedings of 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Proceeding, IIH-MSP 2008, Harbin, pp. 406–409. IEEE Press (2008)
2.
Zurück zum Zitat Wang, C.-D., Ma, D.F.: Information hiding based on real-time voice in DCT domain. Comput. Eng. Des. 33(2), 474–478+555 (2012). in Chinese Wang, C.-D., Ma, D.F.: Information hiding based on real-time voice in DCT domain. Comput. Eng. Des. 33(2), 474–478+555 (2012). in Chinese
3.
Zurück zum Zitat Gu, C., Cao, X.L.: Research on information hiding technolgy. In: Proceedings of the 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012, Yichang, pp. 2035–2037. IEEE Press (2012) Gu, C., Cao, X.L.: Research on information hiding technolgy. In: Proceedings of the 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012, Yichang, pp. 2035–2037. IEEE Press (2012)
4.
Zurück zum Zitat Wei, Z., et al.: An ovel steganography approach for voice over IP. J. Ambient Intell. Humaniz. Comput. 5(4), 601–610 (2014)CrossRef Wei, Z., et al.: An ovel steganography approach for voice over IP. J. Ambient Intell. Humaniz. Comput. 5(4), 601–610 (2014)CrossRef
5.
Zurück zum Zitat Mazurczyk, W.: VOIP steganography and its detection: a survey. ACM Comput. Surv. 2(46), 20 (2013) Mazurczyk, W.: VOIP steganography and its detection: a survey. ACM Comput. Surv. 2(46), 20 (2013)
6.
Zurück zum Zitat Fraczek, W., Mazurczyk, W., Szczypiorskik, K.: Hiding information in a stream control transmission protocol. Comput. Commun. 2(35), 159–169 (2012)CrossRef Fraczek, W., Mazurczyk, W., Szczypiorskik, K.: Hiding information in a stream control transmission protocol. Comput. Commun. 2(35), 159–169 (2012)CrossRef
7.
Zurück zum Zitat Xu, T.T., Yang, Z.: Simple and effective speech steganography in G.723.1 low-rate codes. In: 2009 International Conference on Wireless Communications and Signal Processing, WCSP 2009, Nanjing, pp. 1–4. IEEE Press (2009) Xu, T.T., Yang, Z.: Simple and effective speech steganography in G.723.1 low-rate codes. In: 2009 International Conference on Wireless Communications and Signal Processing, WCSP 2009, Nanjing, pp. 1–4. IEEE Press (2009)
8.
Zurück zum Zitat Yang, J., Bai, S., Zhu, G.B., Liu, J.: Information hiding algorithm of G.723.1 high-rate speech flow. Comput. Eng. 37(22), 114–115+118 (2011). (in Chinese) Yang, J., Bai, S., Zhu, G.B., Liu, J.: Information hiding algorithm of G.723.1 high-rate speech flow. Comput. Eng. 37(22), 114–115+118 (2011). (in Chinese)
10.
Zurück zum Zitat Liu, P., Li, S., Wang, H.: Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec. Multimedia Syst. 23(4), 485–497 (2017)CrossRef Liu, P., Li, S., Wang, H.: Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec. Multimedia Syst. 23(4), 485–497 (2017)CrossRef
11.
Zurück zum Zitat Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)CrossRef Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)CrossRef
12.
Zurück zum Zitat Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inform. Forensics Secur. 6(2), 296–306 (2011)CrossRef Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inform. Forensics Secur. 6(2), 296–306 (2011)CrossRef
13.
Zurück zum Zitat Chunhui, W., Yongfeng, H., Weihua, W., Beixing, D.: A large-capability self-adaptive steganography algorithm based on G.723.1. J. Wuhan Univ. Technol. (Inf. Manage. Eng.) 32(4), 522–525 (2010). (in Chinese) Chunhui, W., Yongfeng, H., Weihua, W., Beixing, D.: A large-capability self-adaptive steganography algorithm based on G.723.1. J. Wuhan Univ. Technol. (Inf. Manage. Eng.) 32(4), 522–525 (2010). (in Chinese)
14.
Zurück zum Zitat Yang, W.-X., Sun, D.-H., Huang, Y.-F.: Steganographic method in Self-adaptive codebooks of speech codec. Comput. Eng. Des. 34(8), 2656–2661 (2013). (in Chinese) Yang, W.-X., Sun, D.-H., Huang, Y.-F.: Steganographic method in Self-adaptive codebooks of speech codec. Comput. Eng. Des. 34(8), 2656–2661 (2013). (in Chinese)
15.
Zurück zum Zitat Guo, S.T., Tian, H.: An information hiding method based on G.729a speech. J. Huaqiao Univ (Nat. Sci.) 3(35), 277–282 (2014). (in Chinese) Guo, S.T., Tian, H.: An information hiding method based on G.729a speech. J. Huaqiao Univ (Nat. Sci.) 3(35), 277–282 (2014). (in Chinese)
16.
Zurück zum Zitat Yang, W.-X., Yu, H., Hu, P.: Research on steganographic method integrated in the compressed speech codec. Acta Electron. Sin. 07(42), 1305–1310 (2014). (in Chinese) Yang, W.-X., Yu, H., Hu, P.: Research on steganographic method integrated in the compressed speech codec. Acta Electron. Sin. 07(42), 1305–1310 (2014). (in Chinese)
17.
Zurück zum Zitat Lin, R.S.:. An imperceptible information hiding in encoded bits of speech signal. In: Proceedings - 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2015, pp. 37–40 (2015) Lin, R.S.:. An imperceptible information hiding in encoded bits of speech signal. In: Proceedings - 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2015, pp. 37–40 (2015)
18.
Zurück zum Zitat Lin, R.S.: Imperceptible data hiding in the encoded bits of ACELP codebook. In: Ubi-Media 2017 - Proceedings of the 10th International Conference on Ubi-Media Computing and Workshops with the 4th International Workshop on Advanced E-Learning and the 1st International Workshop on Multimedia and IoT: Networks, Systems and Applications, Ubi-Media 2017, pp. 201–225 (2017) Lin, R.S.: Imperceptible data hiding in the encoded bits of ACELP codebook. In: Ubi-Media 2017 - Proceedings of the 10th International Conference on Ubi-Media Computing and Workshops with the 4th International Workshop on Advanced E-Learning and the 1st International Workshop on Multimedia and IoT: Networks, Systems and Applications, Ubi-Media 2017, pp. 201–225 (2017)
19.
Zurück zum Zitat Peng, X., Huang, Y., Li, F.: A steganography scheme in a low-bit rate speech codec based on 3D-sudoku matrix. In: Proceedings of 2016 8th IEEE International Conference on Communication Software and Networks, ICCSN 2016, pp. 13–18 (2016) Peng, X., Huang, Y., Li, F.: A steganography scheme in a low-bit rate speech codec based on 3D-sudoku matrix. In: Proceedings of 2016 8th IEEE International Conference on Communication Software and Networks, ICCSN 2016, pp. 13–18 (2016)
20.
Zurück zum Zitat Li, C., Shen, B.: Analysis and optimization of ITU-T G.723.1 speech coder. Electron. Meas. Technol. 30(9), 104–106+139 (2007). (in Chinese) Li, C., Shen, B.: Analysis and optimization of ITU-T G.723.1 speech coder. Electron. Meas. Technol. 30(9), 104–106+139 (2007). (in Chinese)
21.
Zurück zum Zitat Yang, S.T., Zhou, J.-L., Yu, S.-S.: Clustering optimization strategy for G.723.1 speech coder and its application. J. Commun. 22(2), 113–117 (2001). (in Chinese) Yang, S.T., Zhou, J.-L., Yu, S.-S.: Clustering optimization strategy for G.723.1 speech coder and its application. J. Commun. 22(2), 113–117 (2001). (in Chinese)
Metadaten
Titel
A Steganographic Method Based on High Bit Rates Speech Codec of G.723.1
verfasst von
Fufang Li
Binbin Li
Lingxi Peng
Wenbin Chen
Ligang Zheng
Kefu Xu
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00021-9_29