skip to main content
10.1145/2393347.2396395acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
poster

State-based steganography in low bit rate speech

Published: 29 October 2012 Publication History

Abstract

Common least significant bit (LSB) relevant steganography methods in speech frames often base on bits evaluation by certain speech quality evaluation criterion and together with some coding and embedding strategies to enhance imperceptibility and efficiency. However, some embedding capabilities and security strategy are neglected. This paper proposes a state-based steganography method which fully investigates speech frame features in order to expand embedding capabilities and enhance steganography security. In the proposed method, embedding capabilities are measured by available numbers of states relative to current frame parameters rather than information bits. And secret information embedding procedure is performed by the chosen states mapped operations. This is a basic fine-grained steganography solution which is useful for other algorithms based on it. The experimental results have demonstrated that statebased method outperforms traditional LSB substitution in overall performance and introduces limited latency, which meets the realtime requirement in covert communications.

References

[1]
W. Fraczek, W. Mazurczyk, and K. Szczypiorski. Hiding information in a stream control transmission protocol. Computer Communications, 35(2):159--169, Jan. 2012.
[2]
Y. Huang, S. Tang, and J. Yuan. Steganography in inactive frames of voip streams encoded by source codec. IEEE Transactions on Information Forensics and Security, 6(2):296--306, June 2011.
[3]
J. Lubacz, W. Mazurczyk, and K. Szczypiorski. Vice over ip. IEEE Spectrum, 47(2):42--47, Feb. 2010.
[4]
W. Mazurczyk and J. Lubacz. Lack-a voip steganographic method. Telecommunication Systems, 45(2):153--163, Oct. 2010.
[5]
W. Mazurczyk, J. Lubacz, and K. Szczypiorski. Hiding data in voip. In Proceedings of the 26th army science conference, pages 1--4, 2008.
[6]
W. Mazurczyk, P. Szaga, and K. Szczypiorski. Using transcoding for hidden communication in ip telephony. Arxiv preprint, abs/1111.1250, 2011.
[7]
ITU-T Recommendation G.723.1. Dual rate speech coder for multimedia communications transmitting at 5.3 and 6.3 kbit/s, May 2006.
[8]
ITU-T Recommendation P.862. Perceptual evaluation of speech quality (pesq): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs, Feb. 2001.
[9]
A. Shahbazi, A. H. Rezaie, and R. Shahbazi. Melpe coded speech hiding on enhanced full rate compressed domain. In Proceedings of the 4th Asia International Conference on Mathematical Modelling and Computer Simulation, pages 267--270, May 2010.
[10]
H. Tian, K. Zhou, H. Jiang, and D. Feng. Digital logic based encoding strategies for steganography on voice-over-ip. In Proceedings of the 2009 ACM Multimedia Conference, with Co-located Workshops and Symposiums, pages 777--780, Oct. 2009.
[11]
H. Tian, K. Zhou, and J. Lu. A voip-based covert communication scheme using compounded pseudorandom sequence. International Journal of Advancements in Computing Technology, 4(1):223--230, 2012.
[12]
C. Wang and Q. Wu. Information hiding in real-time voip streams. In Proceedings of the 9th IEEE International Symposium on Multimedia, pages 255--262, Taichung, Taiwan, 2007.
[13]
C. Wang, W. Zhang, J. Liu, and N. Yu. Fast matrix embedding by matrix extending. IEEE Transactions on Information Forensics and Security, 7(1):346--350, 2012.
[14]
B. Xiao, Y. Huang, and S. Tang. An approach to information hiding in low bit-rate speech stream. In Proceedings of 2008 IEEE Global Telecommunications Conference, pages 1940--1944, New Orleans, LA, United states, 2008.
[15]
H. Zhao, Y. Shi, and N. Ansari. Steganography in streaming multimedia over networks. Transactions on Data Hiding and Multimedia Security VII, 7110:96--114, 2012.

Cited By

View all
  • (2019)A reliable and efficient micro-protocol for data transmission over an RTP-based covert channelMultimedia Systems10.1007/s00530-019-00636-6Online publication date: 6-Nov-2019
  • (2018)An efficient and secure VoIP communication system with chaotic mapping and message digestMultimedia Systems10.1007/s00530-017-0565-624:3(355-363)Online publication date: 1-Jun-2018
  • (2018)A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech CodingSecurity and Privacy in Communication Networks10.1007/978-3-319-78813-5_40(752-762)Online publication date: 11-Apr-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MM '12: Proceedings of the 20th ACM international conference on Multimedia
October 2012
1584 pages
ISBN:9781450310895
DOI:10.1145/2393347
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 October 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. least significant bit
  2. low bit rate speech
  3. state-based
  4. steganography

Qualifiers

  • Poster

Conference

MM '12
Sponsor:
MM '12: ACM Multimedia Conference
October 29 - November 2, 2012
Nara, Japan

Acceptance Rates

Overall Acceptance Rate 2,145 of 8,556 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2019)A reliable and efficient micro-protocol for data transmission over an RTP-based covert channelMultimedia Systems10.1007/s00530-019-00636-6Online publication date: 6-Nov-2019
  • (2018)An efficient and secure VoIP communication system with chaotic mapping and message digestMultimedia Systems10.1007/s00530-017-0565-624:3(355-363)Online publication date: 1-Jun-2018
  • (2018)A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech CodingSecurity and Privacy in Communication Networks10.1007/978-3-319-78813-5_40(752-762)Online publication date: 11-Apr-2018
  • (2016)Covert Voice over Internet Protocol Communications with Packet Loss Based on Fractal InterpolationACM Transactions on Multimedia Computing, Communications, and Applications10.1145/296105312:4(1-20)Online publication date: 24-Aug-2016
  • (2016)An Approach to Text Steganography Based on Search in Internet2016 International Computer Symposium (ICS)10.1109/ICS.2016.0052(227-232)Online publication date: Dec-2016
  • (2016)A steganography scheme in a low-bit rate speech codec based on 3D-sudoku matrix2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)10.1109/ICCSN.2016.7586638(13-18)Online publication date: Jun-2016
  • (2015)Neighbor-index-division steganography based on QIM method for G.723.1 speech streamsJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-015-0315-67:1(139-147)Online publication date: 16-Sep-2015
  • (2014)Frame-bitrate-change based steganography for voice-over-IPJournal of Central South University10.1007/s11771-014-2459-521:12(4544-4552)Online publication date: 24-Dec-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media