A High-Capacity Covering Code for Voice-Over-IP Steganography

A High-Capacity Covering Code for Voice-Over-IP Steganography

Hui Tian, Jie Qin, Yongfeng Huang, Xu An Wang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai
Copyright: © 2015 |Volume: 10 |Issue: 3 |Pages: 18
ISSN: 1554-1045|EISSN: 1554-1053|EISBN13: 9781466676251|DOI: 10.4018/IJITWE.2015070104
Cite Article Cite Article

MLA

Tian, Hui, et al. "A High-Capacity Covering Code for Voice-Over-IP Steganography." IJITWE vol.10, no.3 2015: pp.46-63. http://doi.org/10.4018/IJITWE.2015070104

APA

Tian, H., Qin, J., Huang, Y., Wang, X. A., Liu, J., Chen, Y., Wang, T., & Cai, Y. (2015). A High-Capacity Covering Code for Voice-Over-IP Steganography. International Journal of Information Technology and Web Engineering (IJITWE), 10(3), 46-63. http://doi.org/10.4018/IJITWE.2015070104

Chicago

Tian, Hui, et al. "A High-Capacity Covering Code for Voice-Over-IP Steganography," International Journal of Information Technology and Web Engineering (IJITWE) 10, no.3: 46-63. http://doi.org/10.4018/IJITWE.2015070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Although steganographic transparency and embedding capacity are considered to be two conflicting objectives in the design of steganographic systems, it is possible and necessary to strike a good balance between them in Voice-over-IP steganography. In this paper, to improve steganographic transparency while maintaining relatively large embedding capacity, the authors present a (2n-1, 2n) covering code, which can hide 2n-1 bits of secret messages into 2n bits of cover messages with not more than n-bit changed. Specifically, each (2n-1)-bit secret message is first transformed into two 2n-bit candidate codewords. In embedding process, the cover message is replaced with the optimal codeword more similar with it. In this way, the embedding distortion can be largely reduced. The proposed method is evaluated by comparing with existing ones with a large number of ITU-T G.729a encoded speech samples. The experimental results show that the authors' scheme can provide good performance on both steganographic transparency and embedding capacity, and achieve better balance between the two objectives than the existing ones.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.