Universal steganography model for low bit-rate speech codec

Low bit-rate speech codec offers so many advantages over other codecs that it has become increasingly popular in audio communications such as mobile and Voice over Internet Protocol (VoIP) communications, and thus, researching steganography in low bit-rate speech codec is of important significance. In this study, we proposed a universal VoIP steganography model for low bit-rate speech codec that uses the PESQ deterioration rate and the decoding error to automatically choose a data-embedding algorithm for each VoIP bitstream, which enables ones to achieve covert communications using a low bit-rate speech codec efficiently and securely. Because no or little attention has been paid to steganography in Internet Speech Audio Codec, it was chosen as the test codec to verify the effectiveness, security, and practicability of the proposed steganography model. The experimental results show that, with the proposed steganography model, it achieved the average PESQ deterioration rate of 4.04% (less than 5%, indicating strong imperceptibility) and a high data-hiding capacity up to 12 bits/frame (400 bits/s, three times larger than other methods), and the proposed steganography model could effectively resist the latest steganalysis. Copyright © 2015 John Wiley & Sons, Ltd.

[1]  Sebastian Zander,et al.  A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.

[2]  Yan Liang,et al.  Perceptually Transparent Information Hiding in G.729 Bitstream , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[3]  Wojciech Mazurczyk,et al.  Covert Channel for Improving VoIP Security , 2007, Advances in Information Processing and Protection.

[4]  Shanyu Tang,et al.  An Approach to Information Hiding in Low Bit-Rate Speech Stream , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[5]  S. Badura,et al.  Transform domain steganography in DVD video and audio content , 2007, 2007 IEEE International Workshop on Imaging Systems and Techniques.

[6]  Yan Diqun,et al.  Quantization Step Parity-based Steganography for MP3 Audio , 2009 .

[7]  Yongfeng Huang,et al.  Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec , 2011, IEEE Transactions on Information Forensics and Security.

[8]  Jana Dittmann,et al.  Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set , 2005, IS&T/SPIE Electronic Imaging.

[9]  Jin Liu,et al.  A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[10]  Jin Liu,et al.  Improving security of quantization-index-modulation steganography in low bit-rate speech streams , 2013, Multimedia Systems.

[11]  Qingzhong Liu,et al.  Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.

[12]  Y. Zhang,et al.  Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis , 2011, IET Commun..

[13]  Jana Dittmann,et al.  Design and evaluation of steganography for voice-over-IP , 2006, 2006 IEEE International Symposium on Circuits and Systems.

[14]  Ke Zhou,et al.  Least-significant-digit steganography in low bitrate speech , 2012, 2012 IEEE International Conference on Communications (ICC).

[15]  Quincy Wu,et al.  Information Hiding in Real-Time VoIP Streams , 2007, Ninth IEEE International Symposium on Multimedia (ISM 2007).

[16]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[17]  Sen Bai,et al.  Steganography Integration Into a Low-Bit Rate Speech Codec , 2012, IEEE Transactions on Information Forensics and Security.

[18]  Yongfeng Huang,et al.  Steganalysis of compressed speech to detect covert voice over Internet protocol channels , 2011, IET Inf. Secur..