Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4681))

Included in the following conference series:

Abstract

This paper presents an approach for speech information hiding based on G.721 scheme. This approach proposes an Analysis-By-Synthesis (ABS)-based speech information hiding and extracting algorithm, is called ABS algorithm, which form the theoretical basis for designing a secure speech communication system. The ABS algorithm adopts a speech synthesizer in a speech coder. Speech embedding and coding are synchronous, i.e. fusing of secret speech information data into speech coding. Dynamic secret speech information data bits can be embedded into original carrier speech data, with high efficiency in steganography and good quality in output speech. This method is superior to available classical algorithms on hiding capacity and robustness. This paper implements the proposed approach based on speech coding scheme G.721 and the experiments show that this approach meets the requirements of information hiding, satisfies the constraints of speech quality for secure communication, and achieves high hiding capacity of 1.6Kbps with an excellent speech quality and complicating speakers’ recognition.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Moulin, P., Joseph, A.O.S.: Information-theoretic Analysis of Information Hiding. IEEE Trans. on Information Theory 49, 563–593 (2003)

    Article  MATH  Google Scholar 

  2. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding-A Survey. IEEE Trans. Proc. Thy 87, 1062–1078 (1999)

    Google Scholar 

  3. Moulin, P., Sullivan, J.A.: Information-theoretic Analysis of Watermarking. In: ICASSP ’00 Proc. of 2000 IEEE International Conference on Acoustics, Speech, and Signal, Istanbul, Turkey, vol. 6, pp. 3630–3633 (2000)

    Google Scholar 

  4. Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless Generalized-LSB Data Embedding. Image Processing, IEEE Trans. 14, 253–266 (2005)

    Article  Google Scholar 

  5. Dong, X.X., Bocko, M.F., Ignjatovic, Z.: Data Hiding via Phase Manipulation of Audio Signals. Acoustics, Speech, and Signal Processing, 2004. Proceedings (ICASSP apos 04) 5, 377–380 (2004)

    Google Scholar 

  6. Wu, W.C., Chen, O.T.C., Wang, Y.H.: An Echo Watermarking Method Using an Analysis-by-synthesis Approach. Proceeding (399) Signal and Image Processing (2003)

    Google Scholar 

  7. Jameel, M.Y., Ahmed, N.: Transform-domain and DSP Based Secure Speech Communication System. Microprocessors & Microsystems 31, 335–346 (2007)

    Article  Google Scholar 

  8. Gibson, J.D., Kokes, M.G.: Data Embedding for Secure Communications. MILCOM 2002. Proceedings 1, 406–410 (2002)

    Article  Google Scholar 

  9. Jameel, A., Siyal, M.Y., Ikram, N.: A Robust Secure Speech Communication System using G.723.1 and TMS320C6711 DSP. Microprocessors and Microsystems 30, 26–32 (2006)

    Article  Google Scholar 

  10. Wu, Z.J., Yang, W., Yang, Y.X.: ABS-based Speech Information Hiding Approach. IEE Electronics Letters 39, 1617–1619 (2003)

    Article  Google Scholar 

  11. Wu, Z.J., Hu, Y., Niu, X.X., et al.: Information Hiding Technique Based Speech Secure Communication over PSTN. The Chinese Journal of Electronics 15, 108–112 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

De-Shuang Huang Laurent Heutte Marco Loog

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Ma, L., Wu, Z., Yang, W. (2007). Approach to Hide Secret Speech Information in G.721 Scheme. In: Huang, DS., Heutte, L., Loog, M. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues. ICIC 2007. Lecture Notes in Computer Science, vol 4681. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74171-8_134

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74171-8_134

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74170-1

  • Online ISBN: 978-3-540-74171-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics