Abstract
Since low bit-rate speech codecs used for voice over internet protocol (VoIP), such as iLBC (internet low bit-rate codec), G.723.1 and G.729A, have less redundancy due to high compression, it is more challenging to embed information in low bit-rate speech streams of VoIP. In this study, a new method is proposed for steganography in low bit-rate speech streams of VoIP. The core idea of this method is setting up a graph model for the codebook space of the quantizer. Based on the graph model, the method realises a quantization index modulation (QIM)-controlled algorithm for partitioning the codebook space. It can be proved that this method can minimize signal distortion while steganography taking place. Taking into account codeword partition balance and partition diversity, the proposed steganographic algorithm was based on QIM controlled by secret keys, i.e., mapping the ways of codebook division into secret keys, thereby significantly improving the undetectability and robustness of VoIP steganography. Performance measurements and steganalysis experiments showed that the proposed QIM-controlled steganographic algorithm was more secure and robust than the QIM algorithm, the conventional RANDOM algorithm and the original codebook algorithm.
Similar content being viewed by others
References
Cox I J, Miller M L, Bloom J A, et al. Digital Watermarking. San Francisco: Morgan Kaufmann, 2002
Bassia P, Pitas I, Nikolaidis N. Robust audio watermarking in the time domain. IEEE Trans Multimedia, 2001, 3: 232–241
Borges P V K, Mayer J, Izquierdo E. Robust and transparent color modulation for text data hiding. IEEE Trans Multimedia, 2008, 10: 1479–1489
Bao P, Ma X. MP3-resistant music steganography based on dynamic range transform. In: Proceedings of 2004 International Symposium on Intelligent Signal Processing and Communication Systems. Jeju: IEEE, 2004. 266–271
Lazic N, Aarabi P. Communication over an acoustic channel using data hiding techniques. IEEE Trans Multimedia, 2006, 8: 918–924
Akhaee M A, Saberian M J, Feizi S, et al. Robust audio data hiding using correlated quantization with histogram-based detector. IEEE Trans Multimedia, 2009, 11: 834–842
Xiang S J, Huang J W. Histogram-based audio watermarking against time-scale modification and cropping attacks. IEEE Trans Multimedia, 2007, 9: 1357–1372
Celik M U, Sharma G, Tekalp A M, et al. Lossless generalized-LSB data embedding. IEEE Trans Image Process, 2005, 14: 253–266
Huang C H, Chuang S C, Wu J L. Digital-invisible-ink data hiding based on spread-spectrum and quantization techniques. IEEE Trans Multimedia, 2008, 10: 557–569
Hu Y, Lee H K, Chen K, et al. Difference expansion based reversible data hiding using two embedding directions. IEEE Trans Multimedia, 2008, 10: 1500–1512
Yang H, Kot A C. Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans Multimedia, 2007, 9: 475–486
Vasic B, Vasic B. Simplification resilient ldpc-coded sparse-qim watermarking for 3d-meshes. IEEE Trans Multimedia, 2013, 15: 1532–1542
Wang C, Wu Q. Information hiding in real-time VoIP streams. In: Ninth IEEE International Symposium on Multimedia (ISM 2007). Taichung, 2007. 255–262
Mazurczyk W, Lubacz J. LACK—A VoIP steganographic method. Telecommun Syst, 2010, 45: 153–163
Huang Y, Liu C, Tang S, et al. Steganography integration into a lowbit rate speech codec. IEEE Trans Inform Forensic Secur, 2012, 7: 1865–1875
Huang Y F, Tang S, Yuan J. Steganography in inactive frames of voip streams encoded by source codec. IEEE Trans Inform Forensic Secur, 2011, 6: 296–306
Dittmann J, Hesse D. Network based intrusion detection to detect steganographic communication channels: On the example of audio data. In: IEEE 6th Workshop on Multimedia Signal Processing. Siena: IEEE, 2004. 343–346
Su Y, Huang Y, Li X. Steganography-oriented noisy resistance model of G. 729a. In: The Proceedings of the Multiconference on Computational Engineering in Systems Applications. Shanghai: IEEE, 2006. 11–15
Wang Y, Moulin P. Steganalysis of block-structured stegotext. In: Electronic Imaging 2004. Bellingham: International Society for Optics and Photonics. 2004. 477–488
Maor A, Merhav N. On joint information embedding and lossy compression. IEEE Trans Inform Theor, 2005, 51: 2998–3008
Chen B, Wornell G W. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans Inform Theor, 2001, 47: 1423–1443
Tute W T. Graph Theory. Cambridge: Cambridge University Press, 2001
ITU-T Recommendation. G.723.1 Annex A. Http://www.itu.int/net/itut/sigdb/speaudio/AudioForm-s.aspx?val=1117231, 2009
Xiao B, Huang Y, Tang S. An approach to information hiding in low bit-rate speech stream. In: Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. Los Angeles: IEEE, 2008. 1–5
ITU-T Recommendation G.729 Annex A. Http://www.itu.int/net/itut/sigdb/speaudio/AudioForm-s.aspx?val=111729, 2010
Li S, Tao H, Huang Y. Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis. J Zhejiang Univ Sci C, 2012, 13: 624–634
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Huang, Y., Tao, H., Xiao, B. et al. Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys. Sci. China Technol. Sci. 60, 1585–1596 (2017). https://doi.org/10.1007/s11431-016-0707-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11431-016-0707-3