Skip to main content
Log in

A novel steganographic method for algebraic-code-excited-linear-prediction speech streams based on fractional pitch delay search

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Although a large number of steganography algorithms based on algebraic-code-excited-linear-prediction have been proposed, their performance, such as embedding capacity, embedding transparency and capability for resisting detection, can be further enhanced. Therefore, we are motivated to present a new steganographic scheme based on pitch delay search, which can achieve better performance by embedding secret information into the fractional pitch delay parameters while keeping the integer pitch delay parameters unchanged. Specifically, we treat all fractional pitch delays as replaceable cover bits to achieve maximum embedding capacity. Further, the steganographic process is encrypted and guided by m sequences for flexibility and security. The proposed method is evaluated with a large number of adaptive multi-rate speech samples and compared with the existing works. Experimental results show that the proposed method can provide larger embedding capacity than the existing works while achieving excellent embedding transparency. Moreover, we evaluate the performance of the proposed method for resisting the state-of-the-art steganalysis methods. The experimental results demonstrate that the proposed method is highly secure, since the state-of-the-art steganalysis methods cannot detect it efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Ali AH, George LE, Zaidan AA, Mokhtar MR (2018) High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimed Tools Appl: 1–30

  2. Aoki N (2010) A semi-lossless steganography technique for G.711 telephony speech. 2010 Sixth Int Conf Intell Inform Hiding Multimed Sign Process: 534–537

  3. Bailey K, Curran K (2006) An evaluation of image based steganography methods. Multimed Tools Appl 30(1):55–88

    Article  Google Scholar 

  4. Chakraborty S, Jalal AS, Bhatnagar C (2017) LSB based non blind predictive edge adaptive image steganography. Multimed Tools Appl 76(6):7973–7987

    Article  Google Scholar 

  5. Chang P-C, Yu H-M (2002) Dither-like data hiding in multistage vector quantization of MELP and G.729 speech coding. Conference Record of the Thirty-Sixth Asilomar Conference on Signals, Systems and Computers 2002 2:1199–1203

    Article  Google Scholar 

  6. Dittmann J, Hesse D, Hillert R (2005) Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set: 607

  7. Huang Y, Xiao B, Xiao H (2008) Implementation of covert communication based on steganography. 2008 Int Conf Intell Inform Hiding Multimed Sign Process: 1512–1515

  8. Huang Y, Liu C, Tang S, Bai S (2012) Steganography integration into a low-bit rate speech codec. IEEE Trans Inf Forensics Sec 7(6):1865–1875

    Article  Google Scholar 

  9. Kumar P, Singh K (2018) An improved data-hiding approach using skin-tone detection for video steganography. Multimed Tools Appl: 1–22

  10. Lin C, Pan JS, Liao BY (2006) Robust VQ-based digital image watermarking for mobile wireless channel. 2006 IEEE Int Conf Syst Man Cyber 3:2380–2384

    Article  Google Scholar 

  11. Liu L, Li M, Li Q, Liang Y (2008) Perceptually transparent information hiding in G.729 Bitstream. 2008 Int Conf Intell Inform Hiding Multimed Sign Process: 406–409

  12. Liu P, Li S, Wang H (2017) Steganography integrated into linear predictive coding for low bit-rate speech codec. Multimed Tools Appl 76(2):2837–2859

    Article  Google Scholar 

  13. Miao R, Huang Y (2011) An approach of covert communication based on the adaptive steganography scheme on voice over IP. 2011 IEEE Int Conf Commun (ICC): 1–5

  14. Mrak M, Izquierdo E (2008) Scalable video coding fundamentals. Encyclopedia of multimedia, Springer, Boston, MA: 771–775

  15. Qin J et al. (2015) An efficient VoIP steganography based on random binary matrix. 2015 10th Int Conf P2P, Parallel, Grid, Cloud Internet Comput (3PGCIC): 462–465

  16. Ramachandran RP, Kabal P (1989) Pitch prediction filters in speech coding. IEEE Trans Acoust Speech Signal Process 37(4):467–478

    Article  Google Scholar 

  17. Ren Y, Yang J, Wang J, Wang L (2017) AMR Steganalysis based on second-order difference of pitch delay. IEEE Trans Inf Forensics Sec 12(6):1345–1357

    Article  Google Scholar 

  18. Ren Y, Wu H, Wang L (2018) An AMR adaptive steganography algorithm based on minimizing distortion. Multimed Tools Appl. 77(10):12095–12110

    Article  Google Scholar 

  19. Samphaiboon N (2011) Steganography via running short text messages. Multimed Tools Appl 52(2–3):569–596

    Article  Google Scholar 

  20. Su YM, Huang YF, Li X (2006) Steganography-oriented noisy resistance model of G729a. Proc Multiconf Comput Eng Syst Appl 1:11–15

    Article  Google Scholar 

  21. Tian H, Zhou K, Jiang H, Huang Y, Liu J, Feng D (2009) An adaptive steganography scheme for voice over IP. 2009 IEEE Int Symp Circ Syst: 2922–2925

  22. Tian H, Jiang H, Zhou K, Feng D (2011) Adaptive partial-matching steganography for voice over IP using triple M sequences. Comput Commun 34(18):2236–2247

    Article  Google Scholar 

  23. Tian H, Liu J, Li S (2014) Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimed Syst 20(2):143–154

    Article  Google Scholar 

  24. Tian H et al (2015) Optimal matrix embedding for voice-over-IP steganography. Signal Process 117:33–43

    Article  Google Scholar 

  25. Wang C, Wu Q (2007) Information hiding in real-time VoIP streams. Ninth IEEE Int Symp Multimed (ISM 2007): 255–262

  26. Wang F-H, Jain LC, Pan J-S (2007) VQ-based watermarking scheme with genetic codebook partition. J Netw Comput Appl 30(1):4–23

    Article  Google Scholar 

  27. Xiao B, Huang Y, Tang S (2008) An approach to information hiding in low bit-rate speech stream. IEEE GLOBECOM 2008–2008 IEEE Global Telecomm Conf: 1–5

  28. Xu T, Yang Z (2009) Simple and effective speech steganography in G.723.1 low-rate codes. 2009 Int Conf Wireless Commun Sign Process: 1–4

  29. Xu E, Liu B, Xu L, Wei Z, Zhao B, Su J (2011) Adaptive VoIP steganography for information hiding within network audio streams. 2011 14th Int Conf Network-Based Inform Syst: 612–617

  30. Yan S, Tang G, Sun Y, Gao Z, Shen L (2015) A triple-layer steganography scheme for low bit-rate speech streams. Multimed Tools Appl 74(24):11763–11782

    Article  Google Scholar 

  31. Yan S, Tang G, Sun Y (2015) Steganography for low bit-rate speech based on pitch period prediction. Appl Res Comput

Download references

Acknowledgements

This work was supported in part by National Natural Science Foundation of China under Grant Nos. U1536115 and U1405254, Natural Science Foundation of Fujian Province of China under Grant No. 2018 J01093, Program for New Century Excellent Talents in Fujian Province University under Grant No. MJK2016-23, Program for Outstanding Youth Scientific and Technological Talents in Fujian Province University under Grant No. MJK2015-54, Promotion Program for Young and Middle-aged Teacher in Science & Technology Research of Huaqiao University under Grant No. ZQN-PY115, Program for Science & Technology Innovation Teams and Leading Talents of Huaqiao University under Grant No.2014KJTD13, Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security under Grant No. AGK201710.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Tian.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, X., Tian, H., Huang, Y. et al. A novel steganographic method for algebraic-code-excited-linear-prediction speech streams based on fractional pitch delay search. Multimed Tools Appl 78, 8447–8461 (2019). https://doi.org/10.1007/s11042-018-6867-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6867-7

Keywords

Navigation