Skip to main content
Log in

An AMR adaptive steganography algorithm based on minimizing distortion

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

To improve the concealment and statistics security, the paper proposed an AMR (Adaptive Multi-Rate) FCB (Fixed CodeBook) Adaptive steganography scheme (AFA), which is based on the search principle of AMR FCB and the correlation of non-zero pulse positions. The key contribution of the scheme is the design of the cost function and the additive distortion function. The optimal probability of pulse and the pulse correlation in the same track were introduced to cost function to improve the statistics security of the proposed algorithm. The hit function b(n) which is used to search for optimal pulse position was added to additive distortion function to improve the concealment of the algorithm. The experiment results show that the proposed scheme has better hearing concealment and security performance to resist the detecting of the existing steganalysis algorithms than the other steganography schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Bilal I, Kumar R, Roj MS, Mishra PK (2014) Recent advancement in audio steganography. In: International conference on parallel, distributed and grid computing (PDGC). IEEE, pp 402–405

  2. Burns E M, Viemeister NF (1981) Played-again sam: further observations on the pitch of amplitude-modulated noise. J Acoust Soc Amer 70(6):1655–1660

    Article  Google Scholar 

  3. Chi Y, Huang L-S, Yang W, Chen Z-L, Miao H-B (2012) A 3 G speech data hiding method based on pitch period. J Chin Comput Syst 33(7):1445–1449

    Google Scholar 

  4. Denemark T, Boroumand M, Fridrich J (2016) Steganalysis features for content-adaptive jpeg steganography. IEEE Trans Inf Forens Secur 11(8):1736–1746

    Article  Google Scholar 

  5. Ding Q, Ping X (2010) Steganalysis of compressed speech based on histogram features. In: 2010 6th International conference on wireless communications networking and mobile computing (WiCOM). IEEE, pp 1–4

  6. Fabien A P, Petitcolas R, Anderson J, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062–1078

    Article  Google Scholar 

  7. Filler T, Judas J, Fridrich J (2010) Minimizing embedding impact in steganography using trellis-coded quantization. In: IS&T/SPIE electronic imaging. International Society for Optics and Photonics, pp 754105–754105

  8. Geiser B, Vary P (2008) High rate data hiding in acelp speech codecs. In: 2008 IEEE international conference on acoustics, speech and signal processing. IEEE, pp 4005–4008

  9. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 234–239

  10. Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on information hiding and multimedia security. ACM, pp 59–68

  11. Li S-B, Sun D-H, Yuan J, Huang Y-F (2012) A steganalysis method for G. 1729A compressed speech stream based on codeword distribution characteristics. Acta Electron Sinica 4:035

    Google Scholar 

  12. Li S-B, Tao H-Z, Huang Y-F (2012) Detection of quantization index modulation steganography in G. 1723.1 bit stream based on quantization index sequence analysis. J Zhejiang Univ Sci C 13(8):624–634

    Article  Google Scholar 

  13. Liu P, Li S, Wang H (2015) Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec. Multimed Syst 1–13

  14. Liu P, Li S, Wang H (2016) Steganography integrated into linear predictive coding for low bit-rate speech codec. Multimed Tools Appl 1–23

  15. Liu C-H, Bai S, Huang Y-F, Yang Y, Li S-B (2013) An information hiding algorithm based on pitch prediction. Jisuanji Gongcheng/ Comput Eng 39:2

    Google Scholar 

  16. Miao R, Huang Y (2011) An approach of covert communication based on the adaptive steganography scheme on voice over ip. In: 2011 IEEE international conference on communications (ICC). IEEE, pp 1–5

  17. Miao H, Huang L, Chen Z, Yang W, Al-Hawbani A (2012) A new scheme for covert communication via 3g encoded speech. Comput Electric Eng 38(6):1490–1501

    Article  Google Scholar 

  18. Miao H, Huang L, Shen Y, Lu X, Chen Z (2013) Steganalysis of compressed speech based on markov and entropy. In: International workshop on digital watermarking. Springer, pp 63–76

  19. Nishimura A (2009) Data hiding in pitch delay data of the adaptive multi-rate narrow-band speech codec. In: Fifth international conference on intelligent information hiding and multimedia signal processing 2009. IIH-MSP’09. IEEE, pp 483–486

  20. Paulin C, Selouani S-A, Hervet É (2016) Audio steganalysis using deep belief networks. Int J Speech Technol 19(3):585–591

    Article  Google Scholar 

  21. Pevnỳ T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: International workshop on information hiding. Springer, pp 161–177

  22. Ren Y, Cai T, Tang M, Wang L (2015) Amr steganalysis based on the probability of same pulse position. IEEE Trans Inf Forens Secur 10(9):1801–1811

    Article  Google Scholar 

  23. Rix A W, Beerends J G, Hollier M P, Hekstra A P (2001) Perceptual evaluation of speech quality (pesq)-a new method for speech quality assessment of telephone networks and codecs. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing, 2001 (ICASSP01), vol 2. IEEE, pp 749–752

  24. Sadek M M, Khalifa A S, Mostafa GMM (2015) Video steganography: a comprehensive review. Multimed Tools Appl 74(17):7063–7094

    Article  Google Scholar 

  25. Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forens Secur 11(2):221–234

    Article  Google Scholar 

  26. Speech Codec Speech Processing Functions. Adaptive multi-ratełwideband (amr-wb) speech codec. Error Concealment of Erroneous of Lost Frames(Release 6). 3GPP TS, 26:V6, (2008)

  27. Wang C, Wu Q (2007) Information hiding in real-time voip streams. In: ISM 9th IEEE international symposium on multimedia 2007. IEEE, pp 255–262

  28. Wang K, Zhao H, Wang H (2014) Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Trans Inf Forens Secur 9(5):741–751

    Article  Google Scholar 

  29. Whitaker JM, Ker AD (2015) Steganalysis of overlapping images. In: SPIE/IS&T electronic imaging. International Society for Optics and Photonics, pp 94090X–94090X

  30. Wilson A, Ker A D (2016) Avoiding detection on twitter: embedding strategies for linguistic steganography. Electron Imag 2016(8):1–9

    Article  Google Scholar 

  31. Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw 7(8):1283–1291

    Article  Google Scholar 

  32. Xiao B, Huang Y, Tang S (2008) An approach to information hiding in low bit-rate speech stream. In: IEEE GLOBECOM 2008-2008 IEEE global telecommunications conference. IEEE, pp 1–5

  33. Zhang W, Zhang Z, Zhang L, Li H, Yu N (2016) Decomposing joint distortion for adaptive steganography. IEEE Trans Circ Syst Vid Technol

  34. (2007). CMU audio databases [OnLine]. Available: http://www.speech.cs.cmu.edu/databases/

  35. (2010). Mandatory speech codec speech processing functions, Adaptive Multi-Rate (AMR) speech codec test sequences [OnLine]. Available: http://www.3gpp.org/DynaReport/26074.htm

  36. (2012). Adobe Audition CS6 [OnLine]. Available: http://www.adobe.com/products/audition.html

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (NSFC) under the grant NO.U1536114, NO.U1536204, NO.61373169, and China Scholarship Council.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanzhen Ren.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ren, Y., Wu, H. & Wang, L. An AMR adaptive steganography algorithm based on minimizing distortion. Multimed Tools Appl 77, 12095–12110 (2018). https://doi.org/10.1007/s11042-017-4860-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4860-1

Keywords

Navigation