Skip to main content

Advertisement

Log in

Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

In this paper, we focus on quantization-index-modulation (QIM) steganography in low-bit-rate speech codec and contribute to improve its steganalysis resistance. A novel QIM steganography is proposed based on the replacement of quantization index set in linear predictive coding (LPC). In this method, each quantization index set is seen as a point in quantization index space. Steganography is conducted in such space. Comparing with other methods, our algorithm significantly improves the embedding efficiency. One quantization index needs to be changed at most when three binary bits are hidden. The number of alterations introduced by the proposed approach is much lower than that of the current methods with the same embedding rate. Due to the fewer cover changes, the proposed steganography is less detectable. Moreover, a division strategy based on the genetic algorithm is proposed to reduce the additional distortion introduced by replacements. In our experiment, ITU-T G.723.1 is selected as the codec, and the experimental results show that the proposed approach outperforms the state-of-the-art LPC-based approach in low-bit-rate speech codec with respect to both steganographic capacity and steganalysis resistance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. TeleGeography Report. International Call Volumes and GrowthRates. http://www.telegeography.com/research-services/t-elegeography-report-database/index.html (2015)

  2. Tian, H., Zhou, K., Jiang, H., Huang, Y., Liu, J., Feng, D.: An adaptive steganography scheme for voice over IP. In: IEEE International Symposium on Circuits and Systems, ISCAS, pp. 2922–2925 (2009)

  3. Kratzer, C., Dittmann, J., Vogel, T., Hillert, R.: Design and evaluation of steganography for voice-over-IP. In: Proceedings on IEEE International Symposium on Circuits and Systems, ISCAS, p. 4 (2006)

  4. Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP streams. In: On the Move to Meaningful Internet Systems: OTM 2008, pp. 1001–1018. Springer (2008)

  5. Liu, L., Li, M., Li, Q., Liang, Y.: Perceptually transparent information hiding in G. 729 bitstream. In: 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 406–409 (2008)

  6. Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6, 296–306 (2011)

    Article  Google Scholar 

  7. Wu, Z.-J., Gao, W., Yang, W.: LPC parameters substitution for speech information hiding. J. China Univ. Posts Telecommun. 16, 103–112 (2009)

    Article  Google Scholar 

  8. Hui, T., Ke, Z., Hong, J., Jin, L., Yongfeng, H., Dan, F.: An M-sequence based steganography model for voice over IP. In: IEEE International Conference on Communications, ICC ‘09, pp. 1–5 (2009)

  9. Lihua, L., Mingyu, L., Qiong, L., Yan, L.: Perceptually transparent information hiding in G.729 Bitstream. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP ‘08, pp. 406–409 (2008)

  10. Jin, L., Ke, Z., Hui, T.: Least-significant-digit steganography in low bitrate speech. In: IEEE International Conference on Communications (ICC), pp. 1133–1137 (2012)

  11. Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: IEEE Global Telecommunications Conference, IEEE GLOBECOM, pp. 1–5 (2008)

  12. Tian, H., Liu, J., Li, S.: Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimed. Syst. 20, 143–154 (2014)

    Article  Google Scholar 

  13. Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7, 1865–1875 (2012)

    Article  Google Scholar 

  14. Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47, 1423–1443 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  15. Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: IEEE Global Telecommunications Conference, IEEE GLOBECOM, pp. 1–5 (2008)

  16. Lin, C., Pan, J.-S., Liao, B.-Y.: Robust VQ-based digital image watermarking for mobile wireless channel. In 2006 IEEE International Conference on Systems, Man and Cybernetics, October 8, 2006–October 11, 2006, Taipei, Taiwan, pp. 2380–2384 (2007)

  17. Wang, F.-H., Jain, L.C., Pan, J.-S.: VQ-based watermarking scheme with genetic codebook partition. J. Netw. Comput. Appl. 30, 4–23 (2007)

    Article  Google Scholar 

  18. Chiang, Y.-K., Tsai, P., Huang, F.-L.: Codebook partition based steganography without member restriction. Fundam. Inform. 82, 15–27 (2008)

    MathSciNet  MATH  Google Scholar 

  19. Lu, Z.-M., Yan, B., Sun, S.-H.: Watermarking combined with CELP speech coding for authentication. IEICE Trans. Inf. Syst. E88-D, 330–334 (2005)

    Article  Google Scholar 

  20. Li, S.-B., Tao, H.-Z., Huang, Y.-F.: Detection of quantization index modulation steganography in G. 723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. Sci. C 13, 624–634 (2012)

    Article  Google Scholar 

  21. Crandall, R.: Some notes on steganography. http://os.inf.tu-dresden.de/westfeld/crandall.pdf

  22. Westfeld, A.: High capacity depsite better steganalysis: F5—a steganographic algorithm. In: Presented at the Fourth Information Hiding Workshop (2001)

  23. Bierbrauer, J., Fridrich, J.: Constructing good covering codes for applications in steganography. In: Transactions on Data Hiding and Multimedia Security III, Tiergartenstrasse 17, Heidelberg, pp. 1–22 (2008)

  24. Fridrich, J., Soukal, D.: Matrix embedding for large payloads. IEEE Trans. Inf. Forensics Secur. 1, 390–395 (2006)

    Article  Google Scholar 

  25. Fridrich, J., Lisonek, P., Soukal, D.: On steganographic embedding efficiency. In: 8th International Workshop on Information Hiding, IH, 2006, June 10, 2006–June 12, 2006, Alexandria, VA, pp. 282–296 (2007)

  26. Tutte, W.T.: Graph Theory, pp. 233–237. Cambridge University Press, Cambridge (2001)

    Google Scholar 

  27. Böhme, R.: Advanced statistical steganalysis. Springer, Berlin (2010)

    Book  MATH  Google Scholar 

  28. Tian, H., Jiang, H., Zhou, K., Feng, D.: Transparency-orientated encoding strategies for voice-over-IP steganography. Comput. J. bxr111 (2011)

  29. Cachin, C.: An information-theoretic model for steganography. In: Information Hiding, pp. 306–318 (1998)

  30. ITU-T P.862: Perceptual Evaluation of Speech Quality (PESQ): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. International Telecommunications Union, Geneva (2001)

    Google Scholar 

  31. ITU-T. P.501: Test Signals for Use in Telephonometry. International Telecommunications Union, Geneva (2007)

    Google Scholar 

Download references

Acknowledgments

This work is supported partly by Natural Science Foundation of Nation and Hainan Province of China under Grant 61303249 and 614236, partly by Important Science and Technology Project of Hainan Province of China under Grant JDJS2013006, partly by Preferred Foundation of Director of Institute of Acoustics, Chinese Academy of Sciences, and partly by the Young Talent Frontier Project of Institute of Acoustics, Chinese Academy of Sciences.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Songbin Li.

Additional information

Communicated by B. Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, P., Li, S. & Wang, H. Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec. Multimedia Systems 23, 485–497 (2017). https://doi.org/10.1007/s00530-015-0500-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-015-0500-7

Keywords

Navigation