Abstract
To improve the imperceptibility without decreasing the steganographic capacity when steganography by a modification to an audio is carried out, this paper proposes an optimal matching path algorithm to reduce the modification to achieve it. A steganography operation unit is defined, which is composed of every N consecutive audio frames and each frame includes M LPC parameters. All these parameters in the same steganography operation unit will form an M × N matrix. A traversal path is a sequence of all these parameters in the matrix. Each parameter in the matrix will be converted into a one-bit binary digit based on two subcodebooks divided by the complementary neighbor vertex (CNV) method. Thus, every traversal path will have a corresponding binary string named PathBinStr. Steganography is performed by computing the Hamming distance between the binary secret and the corresponding PathBinStr and selecting the traversal path with minimal hamming distance expected value to hide the secret via the CNV embedding method. The experimental results show that the proposed steganography algorithm has better performance in audio quality and the modified bit rate decreases from 50 to 37.4% when only 6 traversal paths are predefined, and its processing time can satisfy the real-time requirement of VoIP services. Also, it does not change the audio size, and the theoretical analysis and experiments show its undetectability is good.
Similar content being viewed by others
Availability of data and material
(Data transparency): https://www.github.com/fjxmlzn/RNN-SM/. (Ref.: Lin et al. [35]).
Code availability
(Software application or custom code): No available temporarily. It will be open source on the github after the paper is accepted.
References
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1948)
Hai-Ying, G.: The MP3 steganography algorithm based on Huffman coding. Acta Scientiarum Naturalium Universitatis Sunyatse 046(004), 32–35 (2007)
Lv, Z., Haiping, T.: Random steganography algorithm of dynamic significant bits based on WAV audio. Comput. Appl. Softw. 27(11), 232–236 (2010)
Liu, X., Tian, H., Liu, J., Lu, J.: Survey for voice-over-IP steganography and steganalysis. J. Chongqing Univ. Posts Telecommun. (Nat. Sci. Ed.) 31(3), 407–418 (2019)
Su, Y.M., Huang, Y.F., Li, X.: Steganography-oriented noisy resistance model of G.729a. In: Conference on Computational Engineering in Systems Applications. IEEE (2006)
Liu, L., Li, M., Li, Q., et al.: Perceptually transparent information hiding in G.729 bitstream. In: 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE (2008)
Xu, T., Yang, Z.: Simple and effective speech steganography in G.723.1 low-rate codes. In: 2009 International Conference on Wireless Communications and Signal Processing. IEEE (2009)
Yang, J., Bai, S., Zhu, G., Liu, J.: Information hiding algorithm of G.723.1 high-rate speech flow. Comput. Eng. 37(22), 114–116 (2011)
Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)
Chenghao, L., Sen, B., Yongfeng, H., Yi, Y., Songbin, Li.: An information hiding algorithm based on pitch prediction. Comput. Eng. 39(2), 137–140 (2013)
Shufan, Y., Guangming, T., Yifeng, S., Zhanzhan, G., Liuqing, S.: A triple-layer steganography scheme for low bit-rate speech streams. Multimed. Tools Appl. 74(24), 11763–11782 (2015)
Hamdaqa, M., Tahvildari, L.: ReLACK: a reliable VoIP steganography approach. In: Fifth International Conference on Secure Software Integration and Reliability Improvement. IEEE (2011)
Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP streams. In: On the Move to Meaningful Internet Systems: OTM 2008, vol. 5332, pp. 1001–1018 (2008)
Xue, P.F., Hu, J.S., Liu, H.L., et al.: A new network steganographic method based on the transverse multi-protocol collaboration. J. Inf. Hiding Multimed. Signal Process. 8(2), 445–459 (2017)
Mazurczyk, W., Karas, M., Szczypiorski, K.: SkyDe: a Skype-based steganographic method. Int. J. Comput. Commun. Control 8(3), 432–443 (2013)
El-Atawy, A., Duan, Q., Al-Shaer, E.S.: A novel class of robust covert channels using out-of-order packets. IEEE Trans. Dependable Secure Comput. 14(2), 116–129 (2017)
Yongfeng, H., Shanyu, T.: Covert voice over internet protocol communications based on spatial model. Sci. China Technol. Sci. 059(001), 117–127 (2016)
Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)
Lin, C., Pan, J.S., Liao, B.Y.: Robust VQ-based digital image watermarking for mobile wireless channel. In: IEEE International Conference on Systems, Man and Cybernetics. IEEE, Taipei, Taiwan (2006)
Wang, F.H., Jain, L.C., Pan, J.S.: VQ-based watermarking scheme with genetic codebook partition. J. Netw. Comput. Appl. 30(1), 4–23 (2007)
Jo, M., Kim, H.: A digital image watermarking scheme based on vector quantisation. IEICE Trans. Inf. Syst. E85-D(6), 1054–1056 (2002)
Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November–4 December 2008. IEEE (2008)
Tian, H., Liu, J., Li, S.: Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimed. Syst. 20, 143–154 (2014)
Liu, P., Li, S., Wang, H.: Steganography integrated into linear predictive coding for low bit-rate speech codec. Multimed. Tools Appl. 76(2), 2837–2859 (2017)
Li, S.-B., Huang, Y.-F., Lu, J.-C.: Detection of QIM steganography in low bit-rate speech codec based on statistical models and SVM. Chin. J. Comput. 036(006), 1168–1176 (2013)
Yang, Z., Yang, H., Hu, Y., et al.: Real-time steganalysis for stream media based on multi-channel convolutional sliding windows, https://arxiv.org/abs/quant-ph/1902.01286 (2019)
Li, S.B., Tao, H.Z., Huang, Y.F.: Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. Sci. C (Comput. Electron.) 13(8), 624–634 (2012)
Su, Y.M., Huang, Y.F., Li, X.: Steganography-oriented noisy resistance model of G.729a. In: Conference on Computational Engineering in Systems Applications. IEEE (2007)
Liu, L., Li, M., Li, Q., et al.: Perceptually transparent information hiding in G.729 bitstream. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE (2008)
Huaqiao University.: A kind of ip voice steganography method matched based on best similarity degree. CN104269175A (2015)
Mazurczyk, W., Szczypiorski, K.: Covert channels in SIP for VoIP signaling. In: International Conference on Global e-Security. Springer, Berlin, Heidelberg (2008)
Bai, L.Y., Huang, Y., Hou, G., et al.: Covert channels based on jitter field of the RTCP header. In: Iihmsp 08 International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE (2008)
ITU-T.: Dual Rate Speech Coder for Multimedia Communication Transmitting at 5.3 and 6.3 kbit/s, ITU-T Recommendation G.723.1 (1996)
ITU-T.: Perceptual evaluation of speech quality (PESQ): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. ITU-T Recommendation P. 862 (2001)
Lin, Z., Huang, Y., Wang, J.: RNN-SM: fast steganalysis of VoIP streams using recurrent neural network. IEEE Trans. Inf. Forensics Secur. 13(7), 1854–1868 (2018)
Korzhik, V., Fedyanin, I.: Steganographic applications of the nearest-neighbor approach to Kullback–Leibler divergence estimation. In: 2015 Third International Conference on Digital Information, Networking, and Wireless Communications (DINWC), Moscow, Russia (2015)
Acknowledgements
This work was supported in part by the NSFC-General Technical Research Foundation Joint Fund of China under Grant U1536113.
Funding
This work was supported in part by the NSFC-General Technical Research Foundation Joint Fund of China under Grant U1536113.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The author(s) declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sun, X., Wang, K. & Li, S. Audio steganography with less modification to the optimal matching CNV-QIM path with the minimal hamming distance expected value to a secret. Multimedia Systems 27, 341–352 (2021). https://doi.org/10.1007/s00530-021-00790-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-021-00790-w