Skip to main content
Erschienen in: Multimedia Systems 4/2017

22.12.2015 | Regular Paper

Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec

verfasst von: Peng Liu, Songbin Li, Haiqiang Wang

Erschienen in: Multimedia Systems | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we focus on quantization-index-modulation (QIM) steganography in low-bit-rate speech codec and contribute to improve its steganalysis resistance. A novel QIM steganography is proposed based on the replacement of quantization index set in linear predictive coding (LPC). In this method, each quantization index set is seen as a point in quantization index space. Steganography is conducted in such space. Comparing with other methods, our algorithm significantly improves the embedding efficiency. One quantization index needs to be changed at most when three binary bits are hidden. The number of alterations introduced by the proposed approach is much lower than that of the current methods with the same embedding rate. Due to the fewer cover changes, the proposed steganography is less detectable. Moreover, a division strategy based on the genetic algorithm is proposed to reduce the additional distortion introduced by replacements. In our experiment, ITU-T G.723.1 is selected as the codec, and the experimental results show that the proposed approach outperforms the state-of-the-art LPC-based approach in low-bit-rate speech codec with respect to both steganographic capacity and steganalysis resistance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Tian, H., Zhou, K., Jiang, H., Huang, Y., Liu, J., Feng, D.: An adaptive steganography scheme for voice over IP. In: IEEE International Symposium on Circuits and Systems, ISCAS, pp. 2922–2925 (2009) Tian, H., Zhou, K., Jiang, H., Huang, Y., Liu, J., Feng, D.: An adaptive steganography scheme for voice over IP. In: IEEE International Symposium on Circuits and Systems, ISCAS, pp. 2922–2925 (2009)
3.
Zurück zum Zitat Kratzer, C., Dittmann, J., Vogel, T., Hillert, R.: Design and evaluation of steganography for voice-over-IP. In: Proceedings on IEEE International Symposium on Circuits and Systems, ISCAS, p. 4 (2006) Kratzer, C., Dittmann, J., Vogel, T., Hillert, R.: Design and evaluation of steganography for voice-over-IP. In: Proceedings on IEEE International Symposium on Circuits and Systems, ISCAS, p. 4 (2006)
4.
Zurück zum Zitat Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP streams. In: On the Move to Meaningful Internet Systems: OTM 2008, pp. 1001–1018. Springer (2008) Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP streams. In: On the Move to Meaningful Internet Systems: OTM 2008, pp. 1001–1018. Springer (2008)
5.
Zurück zum Zitat Liu, L., Li, M., Li, Q., Liang, Y.: Perceptually transparent information hiding in G. 729 bitstream. In: 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 406–409 (2008) Liu, L., Li, M., Li, Q., Liang, Y.: Perceptually transparent information hiding in G. 729 bitstream. In: 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 406–409 (2008)
6.
Zurück zum Zitat Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6, 296–306 (2011)CrossRef Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6, 296–306 (2011)CrossRef
7.
Zurück zum Zitat Wu, Z.-J., Gao, W., Yang, W.: LPC parameters substitution for speech information hiding. J. China Univ. Posts Telecommun. 16, 103–112 (2009)CrossRef Wu, Z.-J., Gao, W., Yang, W.: LPC parameters substitution for speech information hiding. J. China Univ. Posts Telecommun. 16, 103–112 (2009)CrossRef
8.
Zurück zum Zitat Hui, T., Ke, Z., Hong, J., Jin, L., Yongfeng, H., Dan, F.: An M-sequence based steganography model for voice over IP. In: IEEE International Conference on Communications, ICC ‘09, pp. 1–5 (2009) Hui, T., Ke, Z., Hong, J., Jin, L., Yongfeng, H., Dan, F.: An M-sequence based steganography model for voice over IP. In: IEEE International Conference on Communications, ICC ‘09, pp. 1–5 (2009)
9.
Zurück zum Zitat Lihua, L., Mingyu, L., Qiong, L., Yan, L.: Perceptually transparent information hiding in G.729 Bitstream. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP ‘08, pp. 406–409 (2008) Lihua, L., Mingyu, L., Qiong, L., Yan, L.: Perceptually transparent information hiding in G.729 Bitstream. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP ‘08, pp. 406–409 (2008)
10.
Zurück zum Zitat Jin, L., Ke, Z., Hui, T.: Least-significant-digit steganography in low bitrate speech. In: IEEE International Conference on Communications (ICC), pp. 1133–1137 (2012) Jin, L., Ke, Z., Hui, T.: Least-significant-digit steganography in low bitrate speech. In: IEEE International Conference on Communications (ICC), pp. 1133–1137 (2012)
11.
Zurück zum Zitat Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: IEEE Global Telecommunications Conference, IEEE GLOBECOM, pp. 1–5 (2008) Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: IEEE Global Telecommunications Conference, IEEE GLOBECOM, pp. 1–5 (2008)
12.
Zurück zum Zitat Tian, H., Liu, J., Li, S.: Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimed. Syst. 20, 143–154 (2014)CrossRef Tian, H., Liu, J., Li, S.: Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimed. Syst. 20, 143–154 (2014)CrossRef
13.
Zurück zum Zitat Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7, 1865–1875 (2012)CrossRef Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7, 1865–1875 (2012)CrossRef
14.
Zurück zum Zitat Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47, 1423–1443 (2001)MathSciNetCrossRefMATH Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47, 1423–1443 (2001)MathSciNetCrossRefMATH
15.
Zurück zum Zitat Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: IEEE Global Telecommunications Conference, IEEE GLOBECOM, pp. 1–5 (2008) Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: IEEE Global Telecommunications Conference, IEEE GLOBECOM, pp. 1–5 (2008)
16.
Zurück zum Zitat Lin, C., Pan, J.-S., Liao, B.-Y.: Robust VQ-based digital image watermarking for mobile wireless channel. In 2006 IEEE International Conference on Systems, Man and Cybernetics, October 8, 2006–October 11, 2006, Taipei, Taiwan, pp. 2380–2384 (2007) Lin, C., Pan, J.-S., Liao, B.-Y.: Robust VQ-based digital image watermarking for mobile wireless channel. In 2006 IEEE International Conference on Systems, Man and Cybernetics, October 8, 2006–October 11, 2006, Taipei, Taiwan, pp. 2380–2384 (2007)
17.
Zurück zum Zitat Wang, F.-H., Jain, L.C., Pan, J.-S.: VQ-based watermarking scheme with genetic codebook partition. J. Netw. Comput. Appl. 30, 4–23 (2007)CrossRef Wang, F.-H., Jain, L.C., Pan, J.-S.: VQ-based watermarking scheme with genetic codebook partition. J. Netw. Comput. Appl. 30, 4–23 (2007)CrossRef
18.
Zurück zum Zitat Chiang, Y.-K., Tsai, P., Huang, F.-L.: Codebook partition based steganography without member restriction. Fundam. Inform. 82, 15–27 (2008)MathSciNetMATH Chiang, Y.-K., Tsai, P., Huang, F.-L.: Codebook partition based steganography without member restriction. Fundam. Inform. 82, 15–27 (2008)MathSciNetMATH
19.
Zurück zum Zitat Lu, Z.-M., Yan, B., Sun, S.-H.: Watermarking combined with CELP speech coding for authentication. IEICE Trans. Inf. Syst. E88-D, 330–334 (2005)CrossRef Lu, Z.-M., Yan, B., Sun, S.-H.: Watermarking combined with CELP speech coding for authentication. IEICE Trans. Inf. Syst. E88-D, 330–334 (2005)CrossRef
20.
Zurück zum Zitat Li, S.-B., Tao, H.-Z., Huang, Y.-F.: Detection of quantization index modulation steganography in G. 723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. Sci. C 13, 624–634 (2012)CrossRef Li, S.-B., Tao, H.-Z., Huang, Y.-F.: Detection of quantization index modulation steganography in G. 723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. Sci. C 13, 624–634 (2012)CrossRef
22.
Zurück zum Zitat Westfeld, A.: High capacity depsite better steganalysis: F5—a steganographic algorithm. In: Presented at the Fourth Information Hiding Workshop (2001) Westfeld, A.: High capacity depsite better steganalysis: F5—a steganographic algorithm. In: Presented at the Fourth Information Hiding Workshop (2001)
23.
Zurück zum Zitat Bierbrauer, J., Fridrich, J.: Constructing good covering codes for applications in steganography. In: Transactions on Data Hiding and Multimedia Security III, Tiergartenstrasse 17, Heidelberg, pp. 1–22 (2008) Bierbrauer, J., Fridrich, J.: Constructing good covering codes for applications in steganography. In: Transactions on Data Hiding and Multimedia Security III, Tiergartenstrasse 17, Heidelberg, pp. 1–22 (2008)
24.
Zurück zum Zitat Fridrich, J., Soukal, D.: Matrix embedding for large payloads. IEEE Trans. Inf. Forensics Secur. 1, 390–395 (2006)CrossRef Fridrich, J., Soukal, D.: Matrix embedding for large payloads. IEEE Trans. Inf. Forensics Secur. 1, 390–395 (2006)CrossRef
25.
Zurück zum Zitat Fridrich, J., Lisonek, P., Soukal, D.: On steganographic embedding efficiency. In: 8th International Workshop on Information Hiding, IH, 2006, June 10, 2006–June 12, 2006, Alexandria, VA, pp. 282–296 (2007) Fridrich, J., Lisonek, P., Soukal, D.: On steganographic embedding efficiency. In: 8th International Workshop on Information Hiding, IH, 2006, June 10, 2006–June 12, 2006, Alexandria, VA, pp. 282–296 (2007)
26.
Zurück zum Zitat Tutte, W.T.: Graph Theory, pp. 233–237. Cambridge University Press, Cambridge (2001) Tutte, W.T.: Graph Theory, pp. 233–237. Cambridge University Press, Cambridge (2001)
28.
Zurück zum Zitat Tian, H., Jiang, H., Zhou, K., Feng, D.: Transparency-orientated encoding strategies for voice-over-IP steganography. Comput. J. bxr111 (2011) Tian, H., Jiang, H., Zhou, K., Feng, D.: Transparency-orientated encoding strategies for voice-over-IP steganography. Comput. J. bxr111 (2011)
29.
Zurück zum Zitat Cachin, C.: An information-theoretic model for steganography. In: Information Hiding, pp. 306–318 (1998) Cachin, C.: An information-theoretic model for steganography. In: Information Hiding, pp. 306–318 (1998)
30.
Zurück zum Zitat ITU-T P.862: Perceptual Evaluation of Speech Quality (PESQ): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. International Telecommunications Union, Geneva (2001) ITU-T P.862: Perceptual Evaluation of Speech Quality (PESQ): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. International Telecommunications Union, Geneva (2001)
31.
Zurück zum Zitat ITU-T. P.501: Test Signals for Use in Telephonometry. International Telecommunications Union, Geneva (2007) ITU-T. P.501: Test Signals for Use in Telephonometry. International Telecommunications Union, Geneva (2007)
Metadaten
Titel
Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec
verfasst von
Peng Liu
Songbin Li
Haiqiang Wang
Publikationsdatum
22.12.2015
Verlag
Springer Berlin Heidelberg
Erschienen in
Multimedia Systems / Ausgabe 4/2017
Print ISSN: 0942-4962
Elektronische ISSN: 1432-1882
DOI
https://doi.org/10.1007/s00530-015-0500-7

Weitere Artikel der Ausgabe 4/2017

Multimedia Systems 4/2017 Zur Ausgabe

Neuer Inhalt