Fourier magnitude-based steganography for hiding 2.4 kbpsMELP secret speech

In this paper, a novel steganographic technique based on hiding a secret speech, coded with a 2.4 kbps Mixed Excitation Linear Prediction (MELP) speech coder, in another (cover) speech bitstream, also coded with the MELP coder, is presented. First, the secret speech is embedded in the Fourier magnitude (FM) MELP parameter using an LSB method. Second, a necessary parameter for message extraction, the amount of embedded bits (AEB), is also transmitted in the stego speech using some of the fields of MELP frame. In addition, we provide a mechanism for re-synchronization in case of packet loss. The performance of the method is shown experimentally against a Support Vector Machine (steganalyzer). The accuracy of such steganalyzer is around 50%, i.e. equivalent to random guessing. Finally, we also provide transparency results for the stego speech. Although transparency is not usually a requirement in steganographic applications, the proposed method may also be used for other data hiding applications that require good fidelity.

[1]  John S. Collura,et al.  MELP: the new Federal Standard at 2400 bps , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[2]  Steven J. Murdoch,et al.  Embedding Covert Channels into TCP/IP , 2005, Information Hiding.

[3]  Yongfeng Huang,et al.  Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec , 2011, IEEE Transactions on Information Forensics and Security.

[4]  Fatiha Djebbar,et al.  Comparative study of digital audio steganography techniques , 2012, EURASIP J. Audio Speech Music. Process..

[5]  Jin Liu,et al.  Improving security of quantization-index-modulation steganography in low bit-rate speech streams , 2013, Multimedia Systems.

[6]  C. Ern Information hiding techniques for steganography and digital watermarking , 2018 .

[7]  Jin Liu,et al.  Neighbor-index-division steganography based on QIM method for G.723.1 speech streams , 2015, Journal of Ambient Intelligence and Humanized Computing.

[8]  Sen Bai,et al.  Steganography Integration Into a Low-Bit Rate Speech Codec , 2012, IEEE Transactions on Information Forensics and Security.

[9]  Wojciech Mazurczyk,et al.  Using transcoding for hidden communication in IP telephony , 2011, Multimedia Tools and Applications.

[10]  Methods for objective and subjective assessment of quality Perceptual evaluation of speech quality ( PESQ ) : An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs , 2002 .

[11]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[12]  Wojciech Mazurczyk,et al.  LACK—a VoIP steganographic method , 2008, Telecommun. Syst..

[13]  Artur Janicki Pitch-based steganography for Speex voice codec , 2016, Secur. Commun. Networks.

[14]  Siwei Lyu,et al.  Steganalysis of recorded speech , 2005, IS&T/SPIE Electronic Imaging.

[15]  Wojciech Mazurczyk,et al.  VoIP steganography and its Detection—A survey , 2012, ACM Comput. Surv..

[16]  K. Thenmozhi,et al.  Inbuilt Image Encryption and Steganography Security Solutions for Wireless Systems: A Survey , 2017 .

[17]  Piotr Gajewski,et al.  Authentication in VoIP Telephony with Use of the Echo Hiding Method , 2011 .

[18]  Ke Zhou,et al.  Least-significant-digit steganography in low bitrate speech , 2012, 2012 IEEE International Conference on Communications (ICC).