Improving security of quantization-index-modulation steganography in low bit-rate speech streams

In this study, we mainly concentrate on quantization-index-modulation (QIM) steganography in low bit-rate speech streams, and contribute to improve its security. Exploiting the characteristics of codebook division diversity in the complementary neighbor vertices algorithm, we first design a key-based codebook division strategy, which follows Kerckhoff’s principle and provides a better security than the previous QIM approach. Further, to resist the state-of-the-art steganalysis, following a general belief that fewer and smaller cover changes are less detectable and more secure, we present an improved QIM steganography, which introduces random position selection to adjust the embedding rate dynamically, and employs matrix encoding strategy to enhance the embedding efficiency. The proposed approach is evaluated with ITU-T G.723.1 as the codec of cover speech and compared with the previous work. The experimental results demonstrate that the proposed approach outperforms the traditional QIM approach on both steganographic transparency and steganalysis resistance. Moreover, it is worth pointing out that our approach can effectively work in conjunction with not only G.723.1 codec but also all other parametric speech coders, and be successfully applied into Voice-over-Internet-Protocol systems.

[1]  Quincy Wu,et al.  Information Hiding in Real-Time VoIP Streams , 2007, Ninth IEEE International Symposium on Multimedia (ISM 2007).

[2]  Piotr Gajewski,et al.  Authentication in VoIP Telephony with Use of the Echo Hiding Method , 2011 .

[3]  Yongfeng Huang,et al.  Implementation of Covert Communication Based on Steganography , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[4]  Hong Jiang,et al.  Adaptive partial-matching steganography for voice over IP using triple M sequences , 2011, Comput. Commun..

[5]  Wojciech Mazurczyk,et al.  Using transcoding for hidden communication in IP telephony , 2011, Multimedia Tools and Applications.

[6]  Takuji Nishimura,et al.  Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.

[7]  Ke Zhou,et al.  Dynamic matrix encoding strategy for voice-over-IP steganography , 2010 .

[8]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[9]  Hong Jiang,et al.  Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography , 2012, Comput. J..

[10]  Yong-feng Huang,et al.  Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis , 2012, Journal of Zhejiang University SCIENCE C.

[11]  Ke Zhou,et al.  Least-significant-digit steganography in low bitrate speech , 2012, 2012 IEEE International Conference on Communications (ICC).

[12]  Tingting Xu,et al.  Simple and effective speech steganography in G.723.1 low-rate codes , 2009, 2009 International Conference on Wireless Communications & Signal Processing.

[13]  METHODS FOR SUBJECTIVE DETERMINATION OF TRANSMISSION QUALITY Summary , 2022 .

[14]  Wojciech Mazurczyk,et al.  Covert Channels in SIP for VoIP signalling , 2008, ArXiv.

[15]  Yonghong Chen,et al.  Implementing Covert Communication over Voice Conversations with Windows Live Messenger , 2012 .

[16]  Wojciech Mazurczyk,et al.  Steganography of VoIP Streams , 2008, OTM Conferences.

[17]  Yan Liang,et al.  Perceptually Transparent Information Hiding in G.729 Bitstream , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[18]  Jinshu Su,et al.  Adaptive VoIP Steganography for Information Hiding within Network Audio Streams , 2011, 2011 14th International Conference on Network-Based Information Systems.

[19]  Methods for objective and subjective assessment of quality Perceptual evaluation of speech quality ( PESQ ) : An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs , 2002 .

[20]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[21]  J. Lubacz,et al.  Vice over IP , 2010, IEEE Spectrum.

[22]  Rainer Bhme Advanced Statistical Steganalysis , 2010 .

[23]  Yongfeng Huang,et al.  An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP , 2011, 2011 IEEE International Conference on Communications (ICC).

[24]  Xing Li,et al.  Steganography-Oriented Noisy Resistance Model of G.729a , 2006, The Proceedings of the Multiconference on "Computational Engineering in Systems Applications".

[25]  Shanyu Tang,et al.  An Approach to Information Hiding in Low Bit-Rate Speech Stream , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[26]  Rainer Böhme,et al.  Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.

[27]  Wojciech Mazurczyk,et al.  LACK—a VoIP steganographic method , 2008, Telecommun. Syst..

[28]  Yongfeng Huang,et al.  Covert Channels Based on Jitter Field of the RTCP Header , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[29]  Wojciech Mazurczyk,et al.  VoIP steganography and its Detection—A survey , 2012, ACM Comput. Surv..

[30]  Oscal T.-C. Chen,et al.  Highly Robust, Secure, and Perceptual-Quality Echo Hiding Scheme , 2008, IEEE Transactions on Audio, Speech, and Language Processing.

[31]  Yongfeng Huang,et al.  Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec , 2011, IEEE Transactions on Information Forensics and Security.

[32]  Jana Dittmann,et al.  Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set , 2005, IS&T/SPIE Electronic Imaging.

[33]  Naofumi Aoki A Semi-lossless Steganography Technique for G.711 Telephony Speech , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.