A new scheme for covert communication via 3G encoded speech☆
Graphical abstract
Secret messages can be hidden into fixed codebook parameters by using ASOPCC-based steganographic search procedure. The procedure aims to search a suboptimal codevector which matches a constraint condition. The selected suboptimal codevector carries the secret messages. So it is also called stego-codevector.
Highlights
► A novel steganography method on 3G encoded speech is proposed. ► Secret messages are encoded by searching suboptimal pulse combination. ► A well balance between speech quality and embedding capacity is got by adjusting embedding factor η. ► Embedding rate (1600–3200 kbps) is superior to related schemes. ► The method generates less abnormal statistics and is difficult to detect.
Introduction
Steganography is a technique of covert communication. It conveys secret messages hidden in digital media in such a way that the existence of the messages is concealed [1], [2]. Many steganographic methods have been proposed by using text, image, audio and video as cover medium. In recent years, with the significant development of 3G mobile technology (e.g., CDMA2000, WCDMA and TD-SCDMA), wireless communication through 3G network has become a part of our daily life. Given the advantages of mobility and instantaneity, covert communication through 3G voice channel might be interesting. 3G voice channel usually adopts one of the speech coding standards: AMR-WB, EVRC-B and VMR-WB. In this paper, we just focus on AMR-WB, which is widely used in WCDMA and TD-SCDMA system.
Steganography and watermarking are two branches of data hiding. They both describe methods to embed data transparently into a carrier signal. Watermarking is mainly used for copyright protection, copy protection and content authentication. Therefore robustness against attacks is a crucial issue. Steganography aims to establish a covert information channel in end-to-end connections. It pays more attention to hide the fact of transmitting secret message from third people. In this case, embedding capacity, transparency (in terms of perceptual quality) and statistical undetection become important factors.
Lots of steganographic methods on speech signals have been developed so far. Conventional schemes are mostly performed on signal domain or transformed domain. They can be classified into six approaches: least significant bit (LSB) [3], phase coding (PE) [4], spread spectrum (SS) [5], cepstrum domain (CD) [6], echo data hiding (EH) [7] and tone insertion (TI) [8], [9]. However, these approaches are no longer usable for 3G encoded speech, because that speech coding and decoding process will disturb messages embedded in stego signals. In order to convey information through 3G voice channel, steganographic data should be embedded into compressed or encoded signals. The manipulation is then performed either during coding process or after that. The former usually is combined with coding algorithms and changes the codec, by which, some coding parameters are modified to carry secret information. In contrast to that, the latter works on content of the compressed bitstream directly, for example, overwriting least significant bits. Naturally, the two methods would be appropriate to transmission systems using audio compression.
In this paper, based on the former idea, a new steganographic scheme on 3G encoded speech is proposed for covert communication. The scheme relies on an adaptive suboptimal-pulse-combination constrained (ASOPCC) method, searching a suboptimal codevector, whose pulse combination meets certain constraint. ASOPCC is integrated with AMR-WB codec, causing algebraic codebook parameters of encoded signals to be altered, creating a steganographic effect and achieving the purpose of secret communication. Then, considering that AMR-WB has nine encoding modes, we introduce an embedding factor η to control embedding rate in different modes. In fact, the prime criteria for steganography are perfect transparency and high embedding capacity. Transparency is a measure of distortion due to message embedding, in terms of speech quality here. As is well known, there is a trade-off between the two criteria, for that the pursuit of high capacity is bound to decrease transparency. In our research, we attempt to make a worthy trade-off to enhance the balance between speech quality and embedding rate. Several experiments are done to investigate how speech quality is sensitive to embedding strength, whereby different values are assigned to η in different modes. Finally, it turns out that, by properly setting η, ASOPCC not only leads to high embedding rate, but also gains quite good speech quality, as well as lowers the possibility of detection. We give some recommended values for η in different coding modes in the present paper. Meanwhile, our method also allows users to determine η to customize embedding rate and speech quality according to their own needs. That is to say, the proposed method is both adaptively self-adjustable and user-customizable. The proposed covert communication system is illustrated in Fig. 1.
The remainder of this paper is organized as follows. Section 2 introduces an overview of the background, including related works in steganography for mobile voice channel and AMR-WB coding standard. In Section 3, we focuses on description of the ASOPCC method, followed by Section 4, which gives the experiments, test results and analysis. Finally, conclusions are presented in Section 5.
Section snippets
Related works in steganography for mobile voice channel
Not a significant amount of steganography method is available on mobile voice channel. This can be attributed to the existence of compression encoder in modern mobile communication systems, e.g. GSM and 3G, and most traditional steganography methods are not robust to speech coding. Moreover, owning to the fact that 3G is an emerging technology in many countries, steganography for 3G voice channel has not been developed so far. Related works in GSM system are briefly referred as follows [10],
A steganographic scheme on AMR-WB encoded speech
In our proposal, the steganographic scheme is combined with AMR-WB coding process. More specifically, using ASOPCC-based method to search algebraic codebook so that algebraic codebook parameters are modified to embed data.
For explaining the scheme more clearly, this section first introduces the algebraic codebook structure (refer Section 3.1) and standard codebook search (refer Section 3.2), then describes the ASOPCC-based codebook search procedure (refer Section 3.3).
Experimental results
To demonstrate the performance of the proposed method, several experimental results are given in this section. Operation complexity evaluation, imperceptibility test, and anti-detection test are performed. The experiments were realized by using the 3GPP/ITU AMR-WB Speech Coder Fixed-point C simulation [22]. The audio databases we use include the Digital Test Sequences [23] supplied by 3GPP and the CMU Audio Databases [24]. Before embedding, we first check test speech data to make sure all of
Conclusions
In this paper, we introduced a novel ASOPCC based method for covert communication via 3G encoded speech. The method searches an alternative suboptimal codevector under certain constraints. So hidden data are embedded into algebraic codebook parameters. Different from those methods that directly modify encoded bitstream (e.g., overwriting the bits of less important parameters), ASOPCC generates less abnormal statistics. In addition, by using an embedding factor η, the method allows adjusting
Acknowledgements
This work is supported by the National Natural Science Foundation of China (No. 60903217), the Natural Science Foundation of Jiangsu Province of China (No. BK2010255) and the Scientific and Technical Plan of Suzhou (No. SYG201010).
The authors would like to thank the anonymous reviewers for their helpful comments and suggestions.
Haibo Miao is currently a Ph.D. student in School of Computer Science and Technology at University of Science and Technology of China (USTC). His research interests mainly include information security, information hiding and covert channel.
References (35)
- et al.
Information hiding – a survey
Proc IEEE Spec Issue Prot Multimedia Content
(1999) - et al.
Cyber warfare, steganography vs. steganalysis
Commun ACM
(2004) - Moskowitz Scott A, Cooperman M. Steganographic method and device. USA Patent;...
- et al.
Techniques for data hiding
IBM Syst J
(1996) - Lee C, Moallemi K, Warren R. Method and apparatus for transporting auxiliary data in audio signals. USA Patent;...
- et al.
Digital audio watermarking in the cepstrum domain
IEEE Trans Consum Electron
(2000) - et al.
Echo hiding. Information hiding: 1st international workshop
Proc Lect Notes Comput Sci
(1996) - Gopalan K, Wenndt S, Noga A, Haddad D, Adams S. Covert Speech communication via cover speech by tone insertion. In:...
- Gopalan K, Wenndt S. Audio Steganography for covert data transmission by imperceptible tone insertion. In: Proceedings...
- Licai Hu, Shuozhong Wang. Information hiding based on GSM full rate speech coding. In: Proceedings of WiCOM, Wuhan;...
Watermarking combined with CELP speech coding for authentication
IEICE Trans Inform Syst
Cited by (49)
Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning
2023, Computers and Electrical EngineeringMFPD-LSTM: A steganalysis method based on multiple features of pitch delay using RNN-LSTM
2023, Journal of Information Security and ApplicationsMonitoring the security of audio biomedical signals communications in wearable IoT healthcare
2023, Digital Communications and NetworksSteganalysis of adaptive multi-rate speech streams with distributed representations of codewords
2022, Journal of Information Security and ApplicationsCitation Excerpt :Due to the widespread deployment, AMR has become an important research branch in VoIP-based steganography and steganalysis. Based on Algebraic Code Excited Linear Prediction (ACELP), AMR speech streams possess three embedding domains for information hiding, including Linear Predictive Coefficient (LPC) [11–14], Adaptive Codebook (ACB) [15–19], and Fixed Codebook (FCB) [20–23]. Based on Analysis-by-Synthesis (ABS) method, linear predictive coding [24] is one of the critical components of the AMR speech codec and related steganography methods are among the focuses.
Speech Steganography Based on Dynamic Search of Fractional Pitch Delay
2023, Tien Tzu Hsueh Pao/Acta Electronica SinicaSeparable Convolution Network With Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis
2023, IEEE Transactions on Information Forensics and Security
Haibo Miao is currently a Ph.D. student in School of Computer Science and Technology at University of Science and Technology of China (USTC). His research interests mainly include information security, information hiding and covert channel.
Liusheng Huang received his M.S. degree in computer science from University of Science and Technology of China (USTC) in 1988. He is currently a professor and Ph.D. supervisor of School of Computer Science and Technology at USTC. His research interests are in the areas of wireless sensor networks, information security, distributed computing and high performance algorithms.
Zhili Chen received his Ph.D. degree in computer science from University of Science and Technology of China (USTC) in 2009. He is currently a postdoctoral research fellow of School of Computer Science and Technology at USTC. His research interests include information hiding, linguistic steganography and authorship analysis.
Wei Yang received his Ph.D. degree in computer science from University of Science and Technology of China (USTC) in 2007. He is currently a postdoctoral research fellow of School of Computer Science and Technology at USTC. His research interests include information theory, quantum information and cryptology.
Ammar Al-hawbani is currently a Ph.D. student in School of Computer Science and Technology at University of Science and Technology of China (USTC). His research interests mainly include information security and coverage and connectivity of wireless sensor network.
- ☆
Reviews processed and approved for publication by Editor-in-Chief Dr. Manu Malek.