Skip to main content
Log in

A DCT–SVD-Based Speech Steganography in Voiced Frames

  • Published:
Circuits, Systems, and Signal Processing Aims and scope Submit manuscript

Abstract

A novel speech steganography method is presented in this paper by cascading discrete cosine transform and singular value decomposition. The significance of the proposed method is that it utilizes the voiced part of the speech signal, making it highly imperceptible and robust. Imperceptibility of the proposed method is quantified by both signal-to-noise ratio and subjective listening tests. Our experimental results of bit error rate demonstrate that the proposed audio steganography method is robust against MP3 compression, AWGN, re-sampling and re-quantization attack with high data payload. The undetectability of proposed method is verified using a powerful steganalysis tool, and the results are compared with a well-known steganographic technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. F.E. Abd El-Samie, An efficient singular value decomposition algorithm for digital audio watermarking. Int. J. Speech Technol. 12(1), 27–45 (2009). https://doi.org/10.1007/s10772-009-9056-2

    Article  Google Scholar 

  2. S. Ahani, S. Ghaemmaghami, Z.J. Wang, A sparse representation-based wavelet domain speech steganography method. IEEE/ACM Trans. Audio Speech Lang. Process. 23(1), 80–91 (2015). https://doi.org/10.1109/TASLP.2014.2372313

    Article  Google Scholar 

  3. M. Alhussein, G. Muhammad, Watermarking of Parkinson disease speech in cloud-based healthcare framework. Int. J. Distrib. Sens. Netw. 2015, 2:2–2:2 (2016). https://doi.org/10.1155/2015/264575

    Article  Google Scholar 

  4. A.H. Ali, An imperceptible and robust audio watermarking algorithm. EURASIP J. Audio Speech Music Process. 2014(1), 37 (2014). https://doi.org/10.1186/s13636-014-0037-2

    Article  Google Scholar 

  5. R.J. Anderson, F.A.P. Petitcolas, On the limits of steganography. IEEE J. Sel. Areas Commun. 16(4), 474–481 (1998). https://doi.org/10.1109/49.668971

    Article  Google Scholar 

  6. W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding. IBM Syst. J. 35(3.4), 313–336 (1996). https://doi.org/10.1147/sj.353.0313

    Article  Google Scholar 

  7. V. K. Bhat, I. Sengupta, A. Das, An adaptive audio watermarking based on the singular value decomposition in the wavelet domain. Digit. Signal Proc. 20(6), 1547–1558 (2010). https://doi.org/10.1016/j.dsp.2010.02.006

    Article  Google Scholar 

  8. V. K. Bhat, I. Sengupta, A. Das, A new audio watermarking scheme based on singular value decomposition and quantization. Circuits Syst. Signal Process. 30(5), 915–927 (2011). https://doi.org/10.1007/s00034-010-9255-8

    Article  Google Scholar 

  9. K. Bhowal, D. Bhattacharyya, A. Jyoti Pal, T.H. Kim, A GA based audio steganography with enhanced security. Telecommun. Syst. 52(4), 2197–2204 (2013). https://doi.org/10.1007/s11235-011-9542-0

    Article  Google Scholar 

  10. C.C. Chang, C.J. Lin, LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2, 27:1–27:27 (2011). Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm

    Article  Google Scholar 

  11. N. Cvejic, T. Seppanen, Increasing the capacity of LSB-based audio steganography, in 2002 IEEE Workshop on Multimedia Signal Processing, pp. 336–338 (2002). https://doi.org/10.1109/MMSP.2002.1203314

  12. A. Delforouzi, M. Pooyan, Adaptive digital audio steganography based on integer wavelet transform. Circuits Syst. Signal Process. 27(2), 247–259 (2008). https://doi.org/10.1007/s00034-008-9019-x

    Article  MathSciNet  Google Scholar 

  13. F. Djebbar, B. Ayad, K.A. Meraim, H. Hamam, Comparative study of digital audio steganography techniques. EURASIP J. Speech Music Process. 2012(1), 25 (2012). https://doi.org/10.1186/1687-4722-2012-25

    Article  Google Scholar 

  14. Y. Erfani, S. Siahpoush, Robust audio watermarking using improved TS echo hiding. Digit. Signal Process. 19(5), 809–814 (2009). https://doi.org/10.1016/j.dsp.2009.04.003

    Article  Google Scholar 

  15. M. Fallahpour, D. Megas, Robust audio watermarking based on Fibonacci numbers, in 2014 10th International Conference on Mobile Ad-hoc and Sensor Networks, pp. 343–349 (2014). https://doi.org/10.1109/MSN.2014.58

  16. M. Fallahpour, D. Megias, Audio watermarking based on Fibonacci numbers. IEEE/ACM Trans. Audio Speech Lang. Process. 23(8), 1273–1282 (2015). https://doi.org/10.1109/TASLP.2015.2430818

    Article  Google Scholar 

  17. L. Gang, A.N. Akansu, M. Ramkumar, Mp3 resistant oblivious steganography, in 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No. 01CH37221), vol. 3, pp. 1365–1368 (2001). https://doi.org/10.1109/ICASSP.2001.941182

  18. K. Gopalan, Audio steganography by cepstrum modification, in IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. (ICASSP ’05), 2005, vol. 5, pp. v/481–v/484 (2005). https://doi.org/10.1109/ICASSP.2005.1416345

  19. K. Gopalan, Q. Shi, Audio steganography using bit modification—a tradeoff on perceptibility and data robustness for large payload audio embedding, in 2010 Proceedings of 19th International Conference on Computer Communications and Networks, pp. 1–6. IEEE (2010). https://doi.org/10.1109/ICCCN.2010.5560097

  20. K. Gopalan, S. Wenndt, Audio steganography for covert data transmission by imperceptible tone insertion, in Proceedings of the IASTED International Conference on Communication Systems and Applications (CSA 2004), Banff, Canada (2004)

  21. K. Gopalan, S. Wenndt, A. Noga, D. Haddad, S. Adams, Covert speech communication via cover speech by tone insertion, in 2003 IEEE Aerospace Conference Proceedings (Cat. No. 03TH8652), vol. 4, pp. 4_1647–4_1653 (2003). https://doi.org/10.1109/AERO.2003.1235095

  22. M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, I. Witten, The WEKA data mining software: an update. SIGKDD Explor. Newsl. 11, 10–18 (2009). https://doi.org/10.1145/1656274.1656278

    Article  Google Scholar 

  23. S. Hetzl, P. Mutzel, A Graph—Theoretic Approach to Steganography (Springer, Berlin, 2005), pp. 119–128. https://doi.org/10.1007/11552055_12

    Book  Google Scholar 

  24. H.T. Hu, L.Y. Hsu, A DWT-based rational dither modulation scheme for effective blind audio watermarking. Circuits Syst. Signal Process. 35(2), 553–572 (2016). https://doi.org/10.1007/s00034-015-0074-9

    Article  Google Scholar 

  25. Y. Hu, P.C. Loizou, Subjective comparison and evaluation of speech enhancement algorithms. Speech Commun. 49(7), 588–601 (2007)

    Article  Google Scholar 

  26. Y. Hu, P.C. Loizou, Evaluation of objective quality measures for speech enhancement. IEEE Trans. Speech Audio Process. 16(1), 229–238 (2008). https://doi.org/10.1109/TASL.2007.911054

    Article  Google Scholar 

  27. H.T. Hu, S.J. Lin, L.Y. Hsu, Effective blind speech watermarking via adaptive mean modulation and package synchronization in DWT domain. EURASIP J. Audio Speech Music Process. 2017(1), 10 (2017)

    Article  Google Scholar 

  28. M.J. Hwang, J. Lee, M. Lee, H.G. Kang, SVD-based adaptive QIM watermarking on stereo audio signals. IEEE Trans. Multimed. 20(1), 45–54 (2018). https://doi.org/10.1109/TMM.2017.2721642

    Article  Google Scholar 

  29. A. Kanhe, G. Aghila, DCT based audio steganography in voiced and un-voiced, in Proceedings of the International Conference on Informatics and Analytics, ICIA-16, pp. 1–6. ACM (2016). https://doi.org/10.1145/2980258.2980360

  30. A. Kanhe, G. Aghila, C.S. Kiran, C. Ramesh, G. Jadav, M. Raj, Robust audio steganography based on advanced encryption standards in temporal domain, in 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1449–1453 (2015). https://doi.org/10.1109/ICACCI.2015.7275816

  31. V. Korzhik, G. Morales-Luna, I. Fedyianin, Audio watermarking based on echo hiding with zero error probability. Int. J. Comput. Sci. Appl. Technomath. Res. Found. 10(1), 1–10 (2013)

    Google Scholar 

  32. X. Li, H.H. Yu, Transparent and robust audio data hiding in cepstrum domain, in 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No. 00TH8532), vol. 1, pp. 397–400 (2000). https://doi.org/10.1109/ICME.2000.869624

  33. Y. Liu, K. Chiang, C. Corbett, R. Archibald, B. Mukherjee, D. Ghosal, A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance (Springer, Berlin, 2008), pp. 487–501. https://doi.org/10.1007/978-3-540-85886-7_33

    Book  Google Scholar 

  34. Y. Ma J. Hu, P.C. Loizou, Objective measures for predicting speech intelligibility in noisy conditions based on new band-importance functions. J. Acoust. Soc. Am. 125(5), 3387–3405 (2009)

    Article  Google Scholar 

  35. W.K. McDowell, W.B. Mikhael, A.P. Berg, Efficiency of the KLT on voiced and unvoiced speech as a function of segment size, in 2012 Proceedings of IEEE Southeastcon, pp. 1–5 (2012). https://doi.org/10.1109/SECon.2012.6197063

  36. P. Moulin, J.A. O’Sullivan, Information-theoretic analysis of information hiding. IEEE Trans. Inf. Theory 49(3), 563–593 (2003). https://doi.org/10.1109/TIT.2002.808134

    Article  MathSciNet  MATH  Google Scholar 

  37. G. Muhammad, S.M.M. Rahman, A. Alelaiwi, A. Alamri, Smart health solution integrating iot and cloud: a case study of voice pathology monitoring. IEEE Commun. Mag. 55(1), 69–73 (2017). https://doi.org/10.1109/MCOM.2017.1600425CM

    Article  Google Scholar 

  38. H. Ozer, B. Sankur, N. Memon, An SVD-based audio watermarking technique, in Proceedings of the 7th Workshop on Multimedia and Security ACM, New York, NY, USA, pp. 51–56 (2005). https://doi.org/10.1145/1073170.1073180

  39. L. Rabiner, B.H. Juang, Fundamentals of Speech Recognition (Prentice-Hall Inc, Upper Saddle River, 1993)

    Google Scholar 

  40. S. Rekik, D. Guerchi, S.A. Selouani, H. Hamam, Speech steganography using wavelet and Fourier transforms. EURASIP J. Audio Speech Music Process. 2012(1), 1–14 (2012). https://doi.org/10.1186/1687-4722-2012-20

    Article  Google Scholar 

  41. P. Shah, P. Choudhari, S. Sivaraman, Adaptive wavelet packet based audio steganography using data history, in 2008 IEEE Region 10 and the Third international Conference on Industrial and Information Systems, pp. 1–5 (2008). https://doi.org/10.1109/ICIINFS.2008.4798397

  42. M. Steinebach, F.A.P. Petitcolas, F. Raynal, J. Dittmann, C. Fontaine, S. Seibel, N. Fates, L.C. Ferri, Stirmark benchmark: audio watermarking attacks, in Proceedings International Conference on Information Technology: Coding and Computing, pp. 49–54 (2001)

  43. A. Sverdlov, S. Dexter, A.M. Eskicioglu, Robust DCT–SVD domain image watermarking for copyright protection: embedding data in all frequencies, in 2005 13th European Signal Processing Conference, pp. 1–4. IEEE (2005)

  44. M.D. Swanson, M. Kobayashi, A.H. Tewfik, Multimedia data-embedding and watermarking technologies. Proc. IEEE 86(6), 1064–1087 (1998). https://doi.org/10.1109/5.687830

    Article  Google Scholar 

  45. X.Y. Wang, H. Zhao, A novel synchronization invariant audio watermarking scheme based on DWT and DCT. IEEE Trans. Signal Process. 54(12), 4835–4840 (2006). https://doi.org/10.1109/TSP.2006.881258

    Article  MATH  Google Scholar 

  46. Y. Xiang, I. Natgunanathan, Y. Rong, S. Guo, Spread spectrum-based high embedding capacity watermarking method for audio signals. IEEE Trans. Audio Speech Lang. Process. 23(12), 2228–2237 (2015). https://doi.org/10.1109/TASLP.2015.2476755

    Article  Google Scholar 

  47. Z. Xu, C. Ao, B. Huang, Channel capacity analysis of the multiple orthogonal sequence spread spectrum watermarking in audio signals. IEEE Signal Process. Lett. 23(1), 20–24 (2016). https://doi.org/10.1109/LSP.2015.2497460

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aniruddha Kanhe.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kanhe, A., Aghila, G. A DCT–SVD-Based Speech Steganography in Voiced Frames. Circuits Syst Signal Process 37, 5049–5068 (2018). https://doi.org/10.1007/s00034-018-0805-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00034-018-0805-9

Keywords

Navigation