Skip to main content
Log in

Audio steganography with less modification to the optimal matching CNV-QIM path with the minimal hamming distance expected value to a secret

  • Special Issue Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

To improve the imperceptibility without decreasing the steganographic capacity when steganography by a modification to an audio is carried out, this paper proposes an optimal matching path algorithm to reduce the modification to achieve it. A steganography operation unit is defined, which is composed of every N consecutive audio frames and each frame includes M LPC parameters. All these parameters in the same steganography operation unit will form an M × N matrix. A traversal path is a sequence of all these parameters in the matrix. Each parameter in the matrix will be converted into a one-bit binary digit based on two subcodebooks divided by the complementary neighbor vertex (CNV) method. Thus, every traversal path will have a corresponding binary string named PathBinStr. Steganography is performed by computing the Hamming distance between the binary secret and the corresponding PathBinStr and selecting the traversal path with minimal hamming distance expected value to hide the secret via the CNV embedding method. The experimental results show that the proposed steganography algorithm has better performance in audio quality and the modified bit rate decreases from 50 to 37.4% when only 6 traversal paths are predefined, and its processing time can satisfy the real-time requirement of VoIP services. Also, it does not change the audio size, and the theoretical analysis and experiments show its undetectability is good.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Availability of data and material

(Data transparency): https://www.github.com/fjxmlzn/RNN-SM/. (Ref.: Lin et al. [35]).

Code availability

(Software application or custom code): No available temporarily. It will be open source on the github after the paper is accepted.

References

  1. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1948)

    Article  MathSciNet  Google Scholar 

  2. Hai-Ying, G.: The MP3 steganography algorithm based on Huffman coding. Acta Scientiarum Naturalium Universitatis Sunyatse 046(004), 32–35 (2007)

    Google Scholar 

  3. Lv, Z., Haiping, T.: Random steganography algorithm of dynamic significant bits based on WAV audio. Comput. Appl. Softw. 27(11), 232–236 (2010)

  4. Liu, X., Tian, H., Liu, J., Lu, J.: Survey for voice-over-IP steganography and steganalysis. J. Chongqing Univ. Posts Telecommun. (Nat. Sci. Ed.) 31(3), 407–418 (2019)

    Google Scholar 

  5. Su, Y.M., Huang, Y.F., Li, X.: Steganography-oriented noisy resistance model of G.729a. In: Conference on Computational Engineering in Systems Applications. IEEE (2006)

  6. Liu, L., Li, M., Li, Q., et al.: Perceptually transparent information hiding in G.729 bitstream. In: 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE (2008)

  7. Xu, T., Yang, Z.: Simple and effective speech steganography in G.723.1 low-rate codes. In: 2009 International Conference on Wireless Communications and Signal Processing. IEEE (2009)

  8. Yang, J., Bai, S., Zhu, G., Liu, J.: Information hiding algorithm of G.723.1 high-rate speech flow. Comput. Eng. 37(22), 114–116 (2011)

  9. Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)

    Article  Google Scholar 

  10. Chenghao, L., Sen, B., Yongfeng, H., Yi, Y., Songbin, Li.: An information hiding algorithm based on pitch prediction. Comput. Eng. 39(2), 137–140 (2013)

    Google Scholar 

  11. Shufan, Y., Guangming, T., Yifeng, S., Zhanzhan, G., Liuqing, S.: A triple-layer steganography scheme for low bit-rate speech streams. Multimed. Tools Appl. 74(24), 11763–11782 (2015)

    Article  Google Scholar 

  12. Hamdaqa, M., Tahvildari, L.: ReLACK: a reliable VoIP steganography approach. In: Fifth International Conference on Secure Software Integration and Reliability Improvement. IEEE (2011)

  13. Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP streams. In: On the Move to Meaningful Internet Systems: OTM 2008, vol. 5332, pp. 1001–1018 (2008)

  14. Xue, P.F., Hu, J.S., Liu, H.L., et al.: A new network steganographic method based on the transverse multi-protocol collaboration. J. Inf. Hiding Multimed. Signal Process. 8(2), 445–459 (2017)

    Google Scholar 

  15. Mazurczyk, W., Karas, M., Szczypiorski, K.: SkyDe: a Skype-based steganographic method. Int. J. Comput. Commun. Control 8(3), 432–443 (2013)

    Article  Google Scholar 

  16. El-Atawy, A., Duan, Q., Al-Shaer, E.S.: A novel class of robust covert channels using out-of-order packets. IEEE Trans. Dependable Secure Comput. 14(2), 116–129 (2017)

  17. Yongfeng, H., Shanyu, T.: Covert voice over internet protocol communications based on spatial model. Sci. China Technol. Sci. 059(001), 117–127 (2016)

    Article  Google Scholar 

  18. Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)

    Article  MathSciNet  Google Scholar 

  19. Lin, C., Pan, J.S., Liao, B.Y.: Robust VQ-based digital image watermarking for mobile wireless channel. In: IEEE International Conference on Systems, Man and Cybernetics. IEEE, Taipei, Taiwan (2006)

  20. Wang, F.H., Jain, L.C., Pan, J.S.: VQ-based watermarking scheme with genetic codebook partition. J. Netw. Comput. Appl. 30(1), 4–23 (2007)

    Article  Google Scholar 

  21. Jo, M., Kim, H.: A digital image watermarking scheme based on vector quantisation. IEICE Trans. Inf. Syst. E85-D(6), 1054–1056 (2002)

    Google Scholar 

  22. Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November–4 December 2008. IEEE (2008)

  23. Tian, H., Liu, J., Li, S.: Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimed. Syst. 20, 143–154 (2014)

    Article  Google Scholar 

  24. Liu, P., Li, S., Wang, H.: Steganography integrated into linear predictive coding for low bit-rate speech codec. Multimed. Tools Appl. 76(2), 2837–2859 (2017)

    Article  Google Scholar 

  25. Li, S.-B., Huang, Y.-F., Lu, J.-C.: Detection of QIM steganography in low bit-rate speech codec based on statistical models and SVM. Chin. J. Comput. 036(006), 1168–1176 (2013)

    Article  MathSciNet  Google Scholar 

  26. Yang, Z., Yang, H., Hu, Y., et al.: Real-time steganalysis for stream media based on multi-channel convolutional sliding windows, https://arxiv.org/abs/quant-ph/1902.01286 (2019)

  27. Li, S.B., Tao, H.Z., Huang, Y.F.: Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. Sci. C (Comput. Electron.) 13(8), 624–634 (2012)

    Article  Google Scholar 

  28. Su, Y.M., Huang, Y.F., Li, X.: Steganography-oriented noisy resistance model of G.729a. In: Conference on Computational Engineering in Systems Applications. IEEE (2007)

  29. Liu, L., Li, M., Li, Q., et al.: Perceptually transparent information hiding in G.729 bitstream. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE (2008)

  30. Huaqiao University.: A kind of ip voice steganography method matched based on best similarity degree. CN104269175A (2015)

  31. Mazurczyk, W., Szczypiorski, K.: Covert channels in SIP for VoIP signaling. In: International Conference on Global e-Security. Springer, Berlin, Heidelberg (2008)

  32. Bai, L.Y., Huang, Y., Hou, G., et al.: Covert channels based on jitter field of the RTCP header. In: Iihmsp 08 International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE (2008)

  33. ITU-T.: Dual Rate Speech Coder for Multimedia Communication Transmitting at 5.3 and 6.3 kbit/s, ITU-T Recommendation G.723.1 (1996)

  34. ITU-T.: Perceptual evaluation of speech quality (PESQ): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. ITU-T Recommendation P. 862 (2001)

  35. Lin, Z., Huang, Y., Wang, J.: RNN-SM: fast steganalysis of VoIP streams using recurrent neural network. IEEE Trans. Inf. Forensics Secur. 13(7), 1854–1868 (2018)

  36. Korzhik, V., Fedyanin, I.: Steganographic applications of the nearest-neighbor approach to Kullback–Leibler divergence estimation. In: 2015 Third International Conference on Digital Information, Networking, and Wireless Communications (DINWC), Moscow, Russia (2015)

Download references

Acknowledgements

This work was supported in part by the NSFC-General Technical Research Foundation Joint Fund of China under Grant U1536113.

Funding

This work was supported in part by the NSFC-General Technical Research Foundation Joint Fund of China under Grant U1536113.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kaixi Wang.

Ethics declarations

Conflict of interest

The author(s) declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sun, X., Wang, K. & Li, S. Audio steganography with less modification to the optimal matching CNV-QIM path with the minimal hamming distance expected value to a secret. Multimedia Systems 27, 341–352 (2021). https://doi.org/10.1007/s00530-021-00790-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-021-00790-w

Keywords

Navigation