Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys

  • Article
  • Published:
Science China Technological Sciences Aims and scope Submit manuscript

Abstract

Since low bit-rate speech codecs used for voice over internet protocol (VoIP), such as iLBC (internet low bit-rate codec), G.723.1 and G.729A, have less redundancy due to high compression, it is more challenging to embed information in low bit-rate speech streams of VoIP. In this study, a new method is proposed for steganography in low bit-rate speech streams of VoIP. The core idea of this method is setting up a graph model for the codebook space of the quantizer. Based on the graph model, the method realises a quantization index modulation (QIM)-controlled algorithm for partitioning the codebook space. It can be proved that this method can minimize signal distortion while steganography taking place. Taking into account codeword partition balance and partition diversity, the proposed steganographic algorithm was based on QIM controlled by secret keys, i.e., mapping the ways of codebook division into secret keys, thereby significantly improving the undetectability and robustness of VoIP steganography. Performance measurements and steganalysis experiments showed that the proposed QIM-controlled steganographic algorithm was more secure and robust than the QIM algorithm, the conventional RANDOM algorithm and the original codebook algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Cox I J, Miller M L, Bloom J A, et al. Digital Watermarking. San Francisco: Morgan Kaufmann, 2002

    Google Scholar 

  2. Bassia P, Pitas I, Nikolaidis N. Robust audio watermarking in the time domain. IEEE Trans Multimedia, 2001, 3: 232–241

    Article  Google Scholar 

  3. Borges P V K, Mayer J, Izquierdo E. Robust and transparent color modulation for text data hiding. IEEE Trans Multimedia, 2008, 10: 1479–1489

    Article  Google Scholar 

  4. Bao P, Ma X. MP3-resistant music steganography based on dynamic range transform. In: Proceedings of 2004 International Symposium on Intelligent Signal Processing and Communication Systems. Jeju: IEEE, 2004. 266–271

    Google Scholar 

  5. Lazic N, Aarabi P. Communication over an acoustic channel using data hiding techniques. IEEE Trans Multimedia, 2006, 8: 918–924

    Article  Google Scholar 

  6. Akhaee M A, Saberian M J, Feizi S, et al. Robust audio data hiding using correlated quantization with histogram-based detector. IEEE Trans Multimedia, 2009, 11: 834–842

    Article  Google Scholar 

  7. Xiang S J, Huang J W. Histogram-based audio watermarking against time-scale modification and cropping attacks. IEEE Trans Multimedia, 2007, 9: 1357–1372

    Article  Google Scholar 

  8. Celik M U, Sharma G, Tekalp A M, et al. Lossless generalized-LSB data embedding. IEEE Trans Image Process, 2005, 14: 253–266

    Article  Google Scholar 

  9. Huang C H, Chuang S C, Wu J L. Digital-invisible-ink data hiding based on spread-spectrum and quantization techniques. IEEE Trans Multimedia, 2008, 10: 557–569

    Article  Google Scholar 

  10. Hu Y, Lee H K, Chen K, et al. Difference expansion based reversible data hiding using two embedding directions. IEEE Trans Multimedia, 2008, 10: 1500–1512

    Article  Google Scholar 

  11. Yang H, Kot A C. Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans Multimedia, 2007, 9: 475–486

    Article  Google Scholar 

  12. Vasic B, Vasic B. Simplification resilient ldpc-coded sparse-qim watermarking for 3d-meshes. IEEE Trans Multimedia, 2013, 15: 1532–1542

    Article  Google Scholar 

  13. Wang C, Wu Q. Information hiding in real-time VoIP streams. In: Ninth IEEE International Symposium on Multimedia (ISM 2007). Taichung, 2007. 255–262

    Chapter  Google Scholar 

  14. Mazurczyk W, Lubacz J. LACK—A VoIP steganographic method. Telecommun Syst, 2010, 45: 153–163

    Article  Google Scholar 

  15. Huang Y, Liu C, Tang S, et al. Steganography integration into a lowbit rate speech codec. IEEE Trans Inform Forensic Secur, 2012, 7: 1865–1875

    Article  Google Scholar 

  16. Huang Y F, Tang S, Yuan J. Steganography in inactive frames of voip streams encoded by source codec. IEEE Trans Inform Forensic Secur, 2011, 6: 296–306

    Article  Google Scholar 

  17. Dittmann J, Hesse D. Network based intrusion detection to detect steganographic communication channels: On the example of audio data. In: IEEE 6th Workshop on Multimedia Signal Processing. Siena: IEEE, 2004. 343–346

    Google Scholar 

  18. Su Y, Huang Y, Li X. Steganography-oriented noisy resistance model of G. 729a. In: The Proceedings of the Multiconference on Computational Engineering in Systems Applications. Shanghai: IEEE, 2006. 11–15

    Chapter  Google Scholar 

  19. Wang Y, Moulin P. Steganalysis of block-structured stegotext. In: Electronic Imaging 2004. Bellingham: International Society for Optics and Photonics. 2004. 477–488

    Google Scholar 

  20. Maor A, Merhav N. On joint information embedding and lossy compression. IEEE Trans Inform Theor, 2005, 51: 2998–3008

    Article  MathSciNet  MATH  Google Scholar 

  21. Chen B, Wornell G W. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans Inform Theor, 2001, 47: 1423–1443

    Article  MathSciNet  MATH  Google Scholar 

  22. Tute W T. Graph Theory. Cambridge: Cambridge University Press, 2001

    Google Scholar 

  23. ITU-T Recommendation. G.723.1 Annex A. Http://www.itu.int/net/itut/sigdb/speaudio/AudioForm-s.aspx?val=1117231, 2009

  24. Xiao B, Huang Y, Tang S. An approach to information hiding in low bit-rate speech stream. In: Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. Los Angeles: IEEE, 2008. 1–5

    Google Scholar 

  25. ITU-T Recommendation G.729 Annex A. Http://www.itu.int/net/itut/sigdb/speaudio/AudioForm-s.aspx?val=111729, 2010

  26. Li S, Tao H, Huang Y. Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis. J Zhejiang Univ Sci C, 2012, 13: 624–634

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to YongFeng Huang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, Y., Tao, H., Xiao, B. et al. Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys. Sci. China Technol. Sci. 60, 1585–1596 (2017). https://doi.org/10.1007/s11431-016-0707-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11431-016-0707-3

Keywords

Navigation