Content Dependent Data Hiding on GSM Full Rate Encoded Speech

This paper introduces a steganographic approach to embed data on compressed speech bit stream in order to hide secret data. This method may be used by any kind of encoded bit stream, but this research concentrates on full rate (GSM 6.10) encoded bit stream. This method allows user to adjust embedded data bit-rate or speech quality. Speech quality is determined by Perceptual Evaluation of Speech Quality (PESQ) which is an objective testing. The effect of embedding data to each specific bit of GSM Full Rate coefficients, on speech quality has been investigated and the less important bits are selected to embed secret data. Meanwhile for approaching a higher speech quality, the data embedding positions are based on different speech frame types. In other words the proposed technique is modified to achieve a content dependent algorithm.

[1]  Peter Vary,et al.  Backwards Compatible Wideband Telephony in Mobile Networks: CELP Watermarking and Bandwidth Extension , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[2]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[3]  Sabu Emmanuel,et al.  Real-time adaptive speech watermarking scheme for mobile applications , 2003, Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint.

[4]  Jonathan G. Fiscus,et al.  Darpa Timit Acoustic-Phonetic Continuous Speech Corpus CD-ROM {TIMIT} | NIST , 1993 .

[5]  Methods for objective and subjective assessment of quality Perceptual evaluation of speech quality ( PESQ ) : An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs , 2002 .

[6]  Darko Kirovski,et al.  Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..

[7]  Bertram Schaf Chapter Five – Critical Bands , 1970 .

[8]  Mark F. Bocko,et al.  Data hiding via phase manipulation of audio signals , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[9]  Ioannis Pitas,et al.  Robust audio watermarking in the time domain , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[10]  Mohan S. Kankanhalli,et al.  Quality-aware GSM speech watermarking , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[11]  P. Vary,et al.  Steganographic Wideband Telephony Using Narrowband Speech Codecs , 2007, 2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers.

[12]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[13]  Wang Shuozhong,et al.  Information Hinding Based on GSM Full Rate Speech Coding , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.