Audio steganography by cepstrum modification

A method of embedding information in the cepstral domain of a cover audio signal is described for audio steganography applications. The proposed technique combines the commonly employed psychoacoustical masking property of the human auditory system with the decorrelation property of the speech cepstrum, and achieves imperceptible embedding, large payload, and accurate data retrieval. Results of embedding using a clean and a noisy hot utterance show the embedded information is robust to additive noise and bandpass filtering.

[1]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[2]  N. Cvejic,et al.  Audio watermarking using m-sequences and temporal masking , 2001, Proceedings of the 2001 IEEE Workshop on the Applications of Signal Processing to Audio and Acoustics (Cat. No.01TH8575).

[3]  Ching-Tang Hsieh,et al.  Blind cepstrum domain audio watermarking based on time energy features , 2002, 2002 14th International Conference on Digital Signal Processing Proceedings. DSP 2002 (Cat. No.02TH8628).

[4]  Kaliappan Gopalan Cepstral domain modification of audio signals for data embedding: preliminary results , 2004, IS&T/SPIE Electronic Imaging.

[5]  Kaliappan Gopalan Audio steganography using bit modification , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[6]  Yo-Sung Ho,et al.  Digital audio watermarking in the cepstrum domain , 2000, IEEE Trans. Consumer Electron..

[7]  Kaliappan Gopalan,et al.  Covert speech communication via cover speech by tone insertion , 2003, 2003 IEEE Aerospace Conference Proceedings (Cat. No.03TH8652).

[8]  Xin Li,et al.  Transparent and robust audio data hiding in cepstrum domain , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[9]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[10]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.