Least-significant-digit steganography in low bitrate speech

作者: Jin Liu , Ke Zhou , Hui Tian

DOI: 10.1109/ICC.2012.6363997

关键词:

摘要: For steganography over speech frames, least-significant-bit (LSB) approach has been one of the most important alternatives. However, its embedded capacity is quite limited, due to low redundancy characteristic bitrate speech. Thus, we suggest a novel least significant digit (LSD) method in this paper, which makes full use frame bits hide secret messages and provides larger embedding than LSB method. The LSD exploits multiple adjacent states parameters, are produced by modifications (e.g. +1, −1, +2, −2) encoded as LSDs using multi-ary numeration system. Beyond providing considerable capacity, further extends key space for key-based steganography, can enhance security covert communication. implemented evaluated with G.723.1 codec speeches. experiment results show that, compared previous method, increases around 30% induces less distortion given same capacity.

参考文章(12)
Weiming Zhang, Xinpeng Zhang, Shuozhong Wang, Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes information hiding. pp. 60- 71 ,(2008) , 10.1007/978-3-540-88961-8_5
Rongyue Zhang, Vasiliy Sachnev, Hyoung Joong Kim, Fast BCH Syndrome Coding for Steganography information hiding. pp. 48- 58 ,(2009) , 10.1007/978-3-642-04431-1_4
Wojciech Mazurczyk, Krzysztof Szczypiorski, Steganography of VoIP Streams OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems. pp. 1001- 1018 ,(2008) , 10.1007/978-3-540-88873-4_6
Akinori Ito, Yoiti Suzuki, None, Information Hiding for G.711 Speech Based on Substitution of Least Significant Bits and Estimation of Tolerable Distortion IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. ,vol. 93, pp. 1279- 1286 ,(2010) , 10.1587/TRANSFUN.E93.A.1279
Miroslav Goljan, Jessica Fridrich, Taras Holotyak, New blind steganalysis and its implications conference on security steganography and watermarking of multimedia contents. ,vol. 6072, pp. 607201- ,(2006) , 10.1117/12.643254
Bo Xiao, Yongfeng Huang, Shanyu Tang, An Approach to Information Hiding in Low Bit-Rate Speech Stream global communications conference. pp. 1- 5 ,(2008) , 10.1109/GLOCOM.2008.ECP.375
Y. Huang, S. Tang, C. Bao, Y.J. Yip, Steganalysis of compressed speech to detect covert voice over Internet protocol channels Iet Information Security. ,vol. 5, pp. 26- 32 ,(2011) , 10.1049/IET-IFS.2010.0032
Lihua Liu, Mingyu Li, Qiong Li, Yan Liang, Perceptually Transparent Information Hiding in G.729 Bitstream intelligent information hiding and multimedia signal processing. pp. 406- 409 ,(2008) , 10.1109/IIH-MSP.2008.297
Xinpeng Zhang, Shuozhong Wang, None, Efficient Steganographic Embedding by Exploiting Modification Direction IEEE Communications Letters. ,vol. 10, pp. 781- 783 ,(2006) , 10.1109/LCOMM.2006.060863
Yong Feng Huang, Shanyu Tang, Jian Yuan, None, Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec IEEE Transactions on Information Forensics and Security. ,vol. 6, pp. 296- 306 ,(2011) , 10.1109/TIFS.2011.2108649