Skip to main content
Log in

Neighbor-index-division steganography based on QIM method for G.723.1 speech streams

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Quantization index modulation (QIM) is a commonly used steganography method exploiting redundancy in codebook quantization procedure of signal encoding. The feasibility of steganography based on QIM depends on codebook division algorithm which mainly determines embedding capacity, latency and complexity of embedding and extracting algorithm. A novel neighbor-index-division (NID) codebook division method with a simple and more security implementation for G.723.1 speech streams is proposed. Differing from existing complementary neighbor vertices (CNV) algorithm, NID divides neighbor-indexed codewords into separated sub-codebooks (partitions) combined with a suitable stego coding strategy. Moreover, NID method makes multiple division (k sub-codebooks, k ≥ 3) for one single codebook possible, thus increases embedding capacity. To take full advantage of the partitions especially for odd-numbered division, multi-ary coding strategy is introduced in embedding and extracting procedures. Experimental results demonstrate that proposed method has almost the same distortion compared with CNV in binary division condition but a much easier implementation and introduces flexible multiple division methods which is more suitable for practical covert communication applications. Further, by applying a commonly used COV(1, 3, 2) stego coding strategy, NID is able to resist the state-of-art steganalysis towards QIM with a still practical embedding rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Cai Y, Wang J (2013) Differential Evolution with neighborhood and direction information for numerical optimization. IEEE Trans Cybern 43(6):2202–2215

    Article  Google Scholar 

  • Cai Y, Wang J, Chen Y, Wang T, Tian H, Luo W (2014) Adaptive direction information in differential evolution for numerical optimization. Soft Comput (In press)

  • Castiglione A, D’Alessio B, Soriente C (2007) Taking advantages of a disadvantage: digital forensics and steganography using document metadata. J Syst Softw 80(5):750–764

    Article  Google Scholar 

  • Castiglione A, D’Alessio B, De Santis A (2011) Steganography and secure communication on online social networks and online photo sharing. In: International conference on broadband and wireless computing, communication and applications (BWCCA), 2011. IEEE, New York, pp 363–368

  • Chen B, Wornell G (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423–1443

    Article  MathSciNet  MATH  Google Scholar 

  • Huang Y, Tang S, Yuan J (2011) Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans Inf Forensics Secur 6(2):296–306

    Article  Google Scholar 

  • ITU-T Rec. G.723.1 (2006) Dual rate speech coder for multimedia communications transmitting at 5.3 and 6.3 kbit/s

  • ITU-T Rec. P.800.1 (2006) Mean opinion score (MOS) terminology

  • ITU-T Rec. P.800 (1996) Methods for subjective determination of transmission quality

  • ITU-T Rec. P.862 (2001) Perceptual evaluation of speech quality (PESQ): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs

  • Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: 29th IEEE international conference on computer communications (INFOCOM), 2010. IEEE, New York, pp 441–445

  • Li S, Tao H, Huang Y (2012) Detection of QIM steganography in G.723.1 bit stream based on quantization index sequence analysis. J Zhejiang Univ Sci C 13(8):624–634

  • Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210

    Article  Google Scholar 

  • Liu J, Zhou K, Tian H (2012) Least-significant-digit steganography in low bitrate speech. In: Proceedings of the IEEE international conference on communications (ICC), 2012. IEEE, New York, pp 1133–1337

  • Liu J, Tian H, Zhou K (2014) Frame-bitrate-change based steganography for voice-over-IP. J Central South Univ 21(12):4544–4552

    Article  Google Scholar 

  • Mazurczyk W, Szczypiorski K (2008a) Covert channels in SIP for VoIP signaling. Global E-Secur 12:65–72

    Article  Google Scholar 

  • Mazurczyk W, Szczypiorski K (2008b) Steganography of VoIP streams. Lect Notes Comput Sci 5332(2):1001–1018

    Article  Google Scholar 

  • Pascal V (2013) Code based cryptography and steganography. In: Fifth international conference on algebraic informatics, 2013, vol 8080, pp 9–46

  • Tian H, Zhou K, Feng D (2010) Dynamic matrix encoding strategy for voice-over-IP steganography. J Central South Univ Technol 17(6):1285–1292

    Article  Google Scholar 

  • Tian H, Jiang H, Zhou K, Feng D (2011) Adaptive partial-matching steganography for voice over ip using triple m sequences. Comput Commun 34(18):2236–2247

    Article  Google Scholar 

  • Tian H, Liu J, Li S (2013) Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimed Syst 1–12

  • Wang J, Cai Y (2015) Multiobjective evolutionary algorithm for frequency assignment problem in satellite communications. Soft Comput 19(5):1229–1253

    Article  Google Scholar 

  • Wang F, Jain L, Pan J (2007) VQ-based watermarking scheme with genetic codebook partition. J Netw Comput Appl 30(1):4–23

    Article  Google Scholar 

  • Wei Z, Zhao B, Liu B, Su J, Xu L, Xu E (2014) A novel steganography approach for voice over IP. J Ambient Intell Human Comput 5:601–610

    Article  Google Scholar 

  • Xiao B, Huang Y, Tang S (2008) An approach to information hiding in low bit-rate speech stream. In: Proceedings of the IEEE global telecommunications conference (GLOBECOM), 2008. IEEE, New York, pp 1940–1944

  • Yargicoglu A, Ilk H (2010) Hidden data transmission in mixed excitation linear prediction coded speech using quantisation index modulation. IET Inf Secur 4(3):158–166

    Article  Google Scholar 

  • Ying L, Huang Y, Yuan J, Linda B (2012) A novel covert timing channel based on RTP/RTCP. Chin J Electron 21(4):711–714

    Google Scholar 

  • Zhou K, Liu J, Tian H, Li C (2012) State-based steganography in low bit rate speech. In: Proceedings of the 20th ACM international conference on multimedia (ACMMM), 2012. ACM, New York, pp 1109–1112

Download references

Acknowledgments

The work described in this paper is supported in part by Natural Science Foundation of China (61302094, 61572206 and U1405254), Natural Science Foundation of Fujian Province of China (2014J01238), Education and Science Research Program for Young and Middle-aged Teacher of Fujian Province of China (JA13012), Promotion Program for Young and Middle-aged Teacher in Science and Technology Research of Huaqiao University (ZQN-PY115), Program for Science & Technology Innovation Teams and Leading Talents of Huaqiao University (2014KJTD13), Research Program for Outstanding Young Teachers in Higher Education Institutions of Fujian Province of China under grant no. MJK20 and the Fundamental Research Funds for the Central Universities (14BS210).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jin Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, J., Tian, H., Lu, J. et al. Neighbor-index-division steganography based on QIM method for G.723.1 speech streams. J Ambient Intell Human Comput 7, 139–147 (2016). https://doi.org/10.1007/s12652-015-0315-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-015-0315-6

Keywords

Navigation