Abstract
To improve the concealment and statistics security, the paper proposed an AMR (Adaptive Multi-Rate) FCB (Fixed CodeBook) Adaptive steganography scheme (AFA), which is based on the search principle of AMR FCB and the correlation of non-zero pulse positions. The key contribution of the scheme is the design of the cost function and the additive distortion function. The optimal probability of pulse and the pulse correlation in the same track were introduced to cost function to improve the statistics security of the proposed algorithm. The hit function b(n) which is used to search for optimal pulse position was added to additive distortion function to improve the concealment of the algorithm. The experiment results show that the proposed scheme has better hearing concealment and security performance to resist the detecting of the existing steganalysis algorithms than the other steganography schemes.
Similar content being viewed by others
References
Bilal I, Kumar R, Roj MS, Mishra PK (2014) Recent advancement in audio steganography. In: International conference on parallel, distributed and grid computing (PDGC). IEEE, pp 402–405
Burns E M, Viemeister NF (1981) Played-again sam: further observations on the pitch of amplitude-modulated noise. J Acoust Soc Amer 70(6):1655–1660
Chi Y, Huang L-S, Yang W, Chen Z-L, Miao H-B (2012) A 3 G speech data hiding method based on pitch period. J Chin Comput Syst 33(7):1445–1449
Denemark T, Boroumand M, Fridrich J (2016) Steganalysis features for content-adaptive jpeg steganography. IEEE Trans Inf Forens Secur 11(8):1736–1746
Ding Q, Ping X (2010) Steganalysis of compressed speech based on histogram features. In: 2010 6th International conference on wireless communications networking and mobile computing (WiCOM). IEEE, pp 1–4
Fabien A P, Petitcolas R, Anderson J, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062–1078
Filler T, Judas J, Fridrich J (2010) Minimizing embedding impact in steganography using trellis-coded quantization. In: IS&T/SPIE electronic imaging. International Society for Optics and Photonics, pp 754105–754105
Geiser B, Vary P (2008) High rate data hiding in acelp speech codecs. In: 2008 IEEE international conference on acoustics, speech and signal processing. IEEE, pp 4005–4008
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 234–239
Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on information hiding and multimedia security. ACM, pp 59–68
Li S-B, Sun D-H, Yuan J, Huang Y-F (2012) A steganalysis method for G. 1729A compressed speech stream based on codeword distribution characteristics. Acta Electron Sinica 4:035
Li S-B, Tao H-Z, Huang Y-F (2012) Detection of quantization index modulation steganography in G. 1723.1 bit stream based on quantization index sequence analysis. J Zhejiang Univ Sci C 13(8):624–634
Liu P, Li S, Wang H (2015) Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec. Multimed Syst 1–13
Liu P, Li S, Wang H (2016) Steganography integrated into linear predictive coding for low bit-rate speech codec. Multimed Tools Appl 1–23
Liu C-H, Bai S, Huang Y-F, Yang Y, Li S-B (2013) An information hiding algorithm based on pitch prediction. Jisuanji Gongcheng/ Comput Eng 39:2
Miao R, Huang Y (2011) An approach of covert communication based on the adaptive steganography scheme on voice over ip. In: 2011 IEEE international conference on communications (ICC). IEEE, pp 1–5
Miao H, Huang L, Chen Z, Yang W, Al-Hawbani A (2012) A new scheme for covert communication via 3g encoded speech. Comput Electric Eng 38(6):1490–1501
Miao H, Huang L, Shen Y, Lu X, Chen Z (2013) Steganalysis of compressed speech based on markov and entropy. In: International workshop on digital watermarking. Springer, pp 63–76
Nishimura A (2009) Data hiding in pitch delay data of the adaptive multi-rate narrow-band speech codec. In: Fifth international conference on intelligent information hiding and multimedia signal processing 2009. IIH-MSP’09. IEEE, pp 483–486
Paulin C, Selouani S-A, Hervet É (2016) Audio steganalysis using deep belief networks. Int J Speech Technol 19(3):585–591
Pevnỳ T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: International workshop on information hiding. Springer, pp 161–177
Ren Y, Cai T, Tang M, Wang L (2015) Amr steganalysis based on the probability of same pulse position. IEEE Trans Inf Forens Secur 10(9):1801–1811
Rix A W, Beerends J G, Hollier M P, Hekstra A P (2001) Perceptual evaluation of speech quality (pesq)-a new method for speech quality assessment of telephone networks and codecs. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing, 2001 (ICASSP01), vol 2. IEEE, pp 749–752
Sadek M M, Khalifa A S, Mostafa GMM (2015) Video steganography: a comprehensive review. Multimed Tools Appl 74(17):7063–7094
Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forens Secur 11(2):221–234
Speech Codec Speech Processing Functions. Adaptive multi-ratełwideband (amr-wb) speech codec. Error Concealment of Erroneous of Lost Frames(Release 6). 3GPP TS, 26:V6, (2008)
Wang C, Wu Q (2007) Information hiding in real-time voip streams. In: ISM 9th IEEE international symposium on multimedia 2007. IEEE, pp 255–262
Wang K, Zhao H, Wang H (2014) Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Trans Inf Forens Secur 9(5):741–751
Whitaker JM, Ker AD (2015) Steganalysis of overlapping images. In: SPIE/IS&T electronic imaging. International Society for Optics and Photonics, pp 94090X–94090X
Wilson A, Ker A D (2016) Avoiding detection on twitter: embedding strategies for linguistic steganography. Electron Imag 2016(8):1–9
Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw 7(8):1283–1291
Xiao B, Huang Y, Tang S (2008) An approach to information hiding in low bit-rate speech stream. In: IEEE GLOBECOM 2008-2008 IEEE global telecommunications conference. IEEE, pp 1–5
Zhang W, Zhang Z, Zhang L, Li H, Yu N (2016) Decomposing joint distortion for adaptive steganography. IEEE Trans Circ Syst Vid Technol
(2007). CMU audio databases [OnLine]. Available: http://www.speech.cs.cmu.edu/databases/
(2010). Mandatory speech codec speech processing functions, Adaptive Multi-Rate (AMR) speech codec test sequences [OnLine]. Available: http://www.3gpp.org/DynaReport/26074.htm
(2012). Adobe Audition CS6 [OnLine]. Available: http://www.adobe.com/products/audition.html
Acknowledgements
This work is supported by the National Natural Science Foundation of China (NSFC) under the grant NO.U1536114, NO.U1536204, NO.61373169, and China Scholarship Council.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ren, Y., Wu, H. & Wang, L. An AMR adaptive steganography algorithm based on minimizing distortion. Multimed Tools Appl 77, 12095–12110 (2018). https://doi.org/10.1007/s11042-017-4860-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4860-1