Skip to main content
Erschienen in: Multimedia Systems 2/2014

01.03.2014 | Regular Paper

Improving security of quantization-index-modulation steganography in low bit-rate speech streams

verfasst von: Hui Tian, Jin Liu, Songbin Li

Erschienen in: Multimedia Systems | Ausgabe 2/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this study, we mainly concentrate on quantization-index-modulation (QIM) steganography in low bit-rate speech streams, and contribute to improve its security. Exploiting the characteristics of codebook division diversity in the complementary neighbor vertices algorithm, we first design a key-based codebook division strategy, which follows Kerckhoff’s principle and provides a better security than the previous QIM approach. Further, to resist the state-of-the-art steganalysis, following a general belief that fewer and smaller cover changes are less detectable and more secure, we present an improved QIM steganography, which introduces random position selection to adjust the embedding rate dynamically, and employs matrix encoding strategy to enhance the embedding efficiency. The proposed approach is evaluated with ITU-T G.723.1 as the codec of cover speech and compared with the previous work. The experimental results demonstrate that the proposed approach outperforms the traditional QIM approach on both steganographic transparency and steganalysis resistance. Moreover, it is worth pointing out that our approach can effectively work in conjunction with not only G.723.1 codec but also all other parametric speech coders, and be successfully applied into Voice-over-Internet-Protocol systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The parameters of SVM are set as c = 20, g = 20 in each experiment.
 
Literatur
1.
Zurück zum Zitat Lubacz, J., Mazurczyk, W., Szczypiorski, K.: Vice over IP. IEEE Spectr. 47(2), 42–47 (2010)CrossRef Lubacz, J., Mazurczyk, W., Szczypiorski, K.: Vice over IP. IEEE Spectr. 47(2), 42–47 (2010)CrossRef
2.
Zurück zum Zitat Tian, H., Jiang, H., Zhou, K., Feng, D.: Adaptive partial-matching steganography for voice over IP using triple M sequences. Comput. Commun. 34(18), 2236–2247 (2011)CrossRef Tian, H., Jiang, H., Zhou, K., Feng, D.: Adaptive partial-matching steganography for voice over IP using triple M sequences. Comput. Commun. 34(18), 2236–2247 (2011)CrossRef
4.
Zurück zum Zitat Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP Streams. In: Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE, Monterrey, Mexico, November 2008, Part II. LNCS, vol. 5332, pp. 1001–1018 (2008) Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP Streams. In: Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE, Monterrey, Mexico, November 2008, Part II. LNCS, vol. 5332, pp. 1001–1018 (2008)
5.
Zurück zum Zitat Tian, H., Jiang, H., Zhou, K., Feng, D.: Transparency-orientated encoding strategies for voice-over-IP steganography. Comput. J. 55(6), 702–716 (2012)CrossRef Tian, H., Jiang, H., Zhou, K., Feng, D.: Transparency-orientated encoding strategies for voice-over-IP steganography. Comput. J. 55(6), 702–716 (2012)CrossRef
6.
Zurück zum Zitat Bai, L.Y., Huang, Y., Hou, G., Xiao, B.: Covert channels based on jitter field of the RTCP header. In: Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, August 2008, pp. 1388–1391 (2008) Bai, L.Y., Huang, Y., Hou, G., Xiao, B.: Covert channels based on jitter field of the RTCP header. In: Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, August 2008, pp. 1388–1391 (2008)
7.
Zurück zum Zitat Huang, Y., Yuan, J., Chen, M., Xiao, B.: Key distribution over the Covert communication based on VoIP. Chin. J. Electron. 20(2), 357–360 (2011) Huang, Y., Yuan, J., Chen, M., Xiao, B.: Key distribution over the Covert communication based on VoIP. Chin. J. Electron. 20(2), 357–360 (2011)
8.
Zurück zum Zitat Tian, H., Guo, R., Lu, J., Chen, Y.: Implementing Covert communication over voice conversations with Windows Live Messenger. Adv. Inf. Sci. Serv. Sci. 4(4), 18–26 (2012) Tian, H., Guo, R., Lu, J., Chen, Y.: Implementing Covert communication over voice conversations with Windows Live Messenger. Adv. Inf. Sci. Serv. Sci. 4(4), 18–26 (2012)
9.
Zurück zum Zitat Mazurczyk, W., Szczypiorski, K.: Covert channels in SIP for VoIP signalling. In: Proceedings of the 4th International Conference on Global E-security, London, United Kingdom, June 2008, pp. 65–70 (2008) Mazurczyk, W., Szczypiorski, K.: Covert channels in SIP for VoIP signalling. In: Proceedings of the 4th International Conference on Global E-security, London, United Kingdom, June 2008, pp. 65–70 (2008)
10.
Zurück zum Zitat Mazurczyk, W., Lubacz, J.: LACK—a VoIP steganographic method. Telecommun. Syst. 45(2–3), 53–163 (2010) Mazurczyk, W., Lubacz, J.: LACK—a VoIP steganographic method. Telecommun. Syst. 45(2–3), 53–163 (2010)
11.
Zurück zum Zitat Dittmann, J., Hesse, D., Hillert, R.: Steganography and steganalysis in voice over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia, Contents VII, vol. 5681, Springer, Berlin Heidelberg New York, March 2005, pp. 607–618 (2005) Dittmann, J., Hesse, D., Hillert, R.: Steganography and steganalysis in voice over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia, Contents VII, vol. 5681, Springer, Berlin Heidelberg New York, March 2005, pp. 607–618 (2005)
12.
Zurück zum Zitat Wang, C., Wu, Q.: Information hiding in real-time VoIP streams. In: Proceedings of the 9th IEEE International Symposium on Multimedia (ISM), Taichung, Taiwan, December 2007, pp. 255–262 (2007) Wang, C., Wu, Q.: Information hiding in real-time VoIP streams. In: Proceedings of the 9th IEEE International Symposium on Multimedia (ISM), Taichung, Taiwan, December 2007, pp. 255–262 (2007)
13.
Zurück zum Zitat Aoki, N.: A semi-lossless steganography technique for G.711 telephony speech. In: Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, October 2010, pp. 534–537 (2010) Aoki, N.: A semi-lossless steganography technique for G.711 telephony speech. In: Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, October 2010, pp. 534–537 (2010)
14.
Zurück zum Zitat Su, Y., Huang, Y., Li, X.: Steganography-oriented noisy resistance model of G.729a. In: Proceedings of the 2006 IMACS Multi-conference on Computational Engineering in Systems Applications, Beijing, China, October 2006, pp. 11–15 (2006) Su, Y., Huang, Y., Li, X.: Steganography-oriented noisy resistance model of G.729a. In: Proceedings of the 2006 IMACS Multi-conference on Computational Engineering in Systems Applications, Beijing, China, October 2006, pp. 11–15 (2006)
15.
Zurück zum Zitat Liu, L., Li, M., Li, Q., Liang, Y.: Perceptually transparent information hiding in G.729 bitstream. In: Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, August 2008, pp. 406–409 (2008) Liu, L., Li, M., Li, Q., Liang, Y.: Perceptually transparent information hiding in G.729 bitstream. In: Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, August 2008, pp. 406–409 (2008)
16.
Zurück zum Zitat Xu, T., Yang, Z.: Simple and effective speech steganography in G.723.1 low-rate codes. In: Proceedings of the 1st International Conference on Wireless Communications and Signal Processing, Nanjing, China, November 2009, pp. 1–4 (2009) Xu, T., Yang, Z.: Simple and effective speech steganography in G.723.1 low-rate codes. In: Proceedings of the 1st International Conference on Wireless Communications and Signal Processing, Nanjing, China, November 2009, pp. 1–4 (2009)
17.
Zurück zum Zitat Huang, Y., Xiao, B., Xiao, H.: Implementation of Covert communication based on steganography. In: Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, August 2008, pp. 1512–1515 (2008) Huang, Y., Xiao, B., Xiao, H.: Implementation of Covert communication based on steganography. In: Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, August 2008, pp. 1512–1515 (2008)
18.
Zurück zum Zitat Xu, E., Liu, B., Xu, L., Wei, Z., Zhao, B., Su, J.: Adaptive VoIP steganography for information hiding within network audio streams. In: Proceedings of the 14th International Conference on Network-Based Information Systems, Tirana, Albania, September 2011, pp. 612–617 (2011) Xu, E., Liu, B., Xu, L., Wei, Z., Zhao, B., Su, J.: Adaptive VoIP steganography for information hiding within network audio streams. In: Proceedings of the 14th International Conference on Network-Based Information Systems, Tirana, Albania, September 2011, pp. 612–617 (2011)
19.
Zurück zum Zitat Miao, R., Huang, Y.: An approach of Covert communication based on the adaptive steganography scheme on voice over IP. In: Proceedings of the 46th IEEE International Conference on Communications (ICC), Kyoto, Japan, June 2011, pp. 1–5 (2011) Miao, R., Huang, Y.: An approach of Covert communication based on the adaptive steganography scheme on voice over IP. In: Proceedings of the 46th IEEE International Conference on Communications (ICC), Kyoto, Japan, June 2011, pp. 1–5 (2011)
20.
Zurück zum Zitat Liu, J., Zhou, K., Tian, H.: Least-significant-digit steganography in low bit-rate speech. In: Proceedings of the 47th IEEE International Conference on Communications (ICC), Ottawa, Canada, June 2012, pp. 1–5 (2012) Liu, J., Zhou, K., Tian, H.: Least-significant-digit steganography in low bit-rate speech. In: Proceedings of the 47th IEEE International Conference on Communications (ICC), Ottawa, Canada, June 2012, pp. 1–5 (2012)
21.
Zurück zum Zitat Tian, H., Zhou, K., Feng, D.: Dynamic matrix encoding strategy for voice-over-IP steganography. J. Central South Univ. Technol. 17(6), 1285–1292 (2010)CrossRef Tian, H., Zhou, K., Feng, D.: Dynamic matrix encoding strategy for voice-over-IP steganography. J. Central South Univ. Technol. 17(6), 1285–1292 (2010)CrossRef
22.
Zurück zum Zitat Chen, O., Wu, W.: Highly robust, secure, and perceptual-quality echo hiding scheme. IEEE Trans. Audio, Speech Lang. 16(3), 629–638 (2008)CrossRef Chen, O., Wu, W.: Highly robust, secure, and perceptual-quality echo hiding scheme. IEEE Trans. Audio, Speech Lang. 16(3), 629–638 (2008)CrossRef
23.
Zurück zum Zitat Rachoń, J., Piotrowski, Z., Gajewski, P.: Authentication in VoIP telephony with use of the echo hiding method. J. Telecommun. Inf. Technol. 3(1), 17–21 (2011) Rachoń, J., Piotrowski, Z., Gajewski, P.: Authentication in VoIP telephony with use of the echo hiding method. J. Telecommun. Inf. Technol. 3(1), 17–21 (2011)
24.
Zurück zum Zitat Huang, Y., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)CrossRef Huang, Y., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)CrossRef
26.
Zurück zum Zitat Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: Proceedings of the 27th IEEE Global Telecommunications Conference (GLOBECOM), New Orleans, LA, USA, December 2008, pp. 1–5 (2008) Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: Proceedings of the 27th IEEE Global Telecommunications Conference (GLOBECOM), New Orleans, LA, USA, December 2008, pp. 1–5 (2008)
27.
Zurück zum Zitat Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)CrossRefMATHMathSciNet Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)CrossRefMATHMathSciNet
28.
Zurück zum Zitat Li, S., Tao, H., Huang, Y.: Detection of QIM steganography in G.723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. Sci. C 13(8), 624–634 (2012)CrossRef Li, S., Tao, H., Huang, Y.: Detection of QIM steganography in G.723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. Sci. C 13(8), 624–634 (2012)CrossRef
30.
Zurück zum Zitat Westfeld, A.: F5—a steganographic algorithm. In: Proceedings of the 4th International Workshop on Information Hiding, Pittsburgh, PA, USA, April 2001, pp. 289–302 (2001) Westfeld, A.: F5—a steganographic algorithm. In: Proceedings of the 4th International Workshop on Information Hiding, Pittsburgh, PA, USA, April 2001, pp. 289–302 (2001)
31.
Zurück zum Zitat ITU-T G.723.1: Dual Rate Speech Coder for Multimedia Communications Transmitting at 5.3 and 6.3 kbit/s. International Telecommunications Union, Geneva, Switzerland (2006) ITU-T G.723.1: Dual Rate Speech Coder for Multimedia Communications Transmitting at 5.3 and 6.3 kbit/s. International Telecommunications Union, Geneva, Switzerland (2006)
32.
Zurück zum Zitat Matsumoto, M., Nishimura, T.: Mersenne Twister: a 623-dimensionally equidistributed uniform pseudorandom number generator. ACM Trans. Model. Comput. Simul. 8(1), 3–30 (1998)CrossRefMATH Matsumoto, M., Nishimura, T.: Mersenne Twister: a 623-dimensionally equidistributed uniform pseudorandom number generator. ACM Trans. Model. Comput. Simul. 8(1), 3–30 (1998)CrossRefMATH
33.
Zurück zum Zitat ITU-T P.862: Perceptual Evaluation of Speech Quality (PESQ): an Objective Method for End-to-end Speech Quality Assessment of Narrow-band Telephone Networks and Speech Codecs. International Telecommunications Union, Geneva, Switzerland (2001) ITU-T P.862: Perceptual Evaluation of Speech Quality (PESQ): an Objective Method for End-to-end Speech Quality Assessment of Narrow-band Telephone Networks and Speech Codecs. International Telecommunications Union, Geneva, Switzerland (2001)
34.
Zurück zum Zitat ITU-T P.800: Methods for Subjective Determination of Transmission Quality. International Telecommunications Union, Geneva, Switzerland (1996) ITU-T P.800: Methods for Subjective Determination of Transmission Quality. International Telecommunications Union, Geneva, Switzerland (1996)
35.
Zurück zum Zitat ITU-T. P.501: Test Signals for Use in Telephonometry. International Telecommunications Union, Geneva, Switzerland (2007) ITU-T. P.501: Test Signals for Use in Telephonometry. International Telecommunications Union, Geneva, Switzerland (2007)
Metadaten
Titel
Improving security of quantization-index-modulation steganography in low bit-rate speech streams
verfasst von
Hui Tian
Jin Liu
Songbin Li
Publikationsdatum
01.03.2014
Verlag
Springer Berlin Heidelberg
Erschienen in
Multimedia Systems / Ausgabe 2/2014
Print ISSN: 0942-4962
Elektronische ISSN: 1432-1882
DOI
https://doi.org/10.1007/s00530-013-0302-8

Weitere Artikel der Ausgabe 2/2014

Multimedia Systems 2/2014 Zur Ausgabe

Neuer Inhalt