Skip to main content
Log in

Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis

  • Published:
Journal of Zhejiang University SCIENCE C Aims and scope Submit manuscript

Abstract

This paper presents a method to detect the quantization index modulation (QIM) steganography in G.723.1 bit stream. We show that the distribution of each quantization index (codeword) in the quantization index sequence has unbalanced and correlated characteristics. We present the designs of statistical models to extract the quantitative feature vectors of these characteristics. Combining the extracted vectors with the support vector machine, we build the classifier for detecting the QIM steganography in G.723.1 bit stream. The experiment shows that the method has far better performance than the existing blind detection method which extracts the feature vector in an uncompressed domain. The recall and precision of our method are all more than 90% even for a compressed bit stream duration as low as 3.6 s.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Avcibas, I., 2006. Audio steganalysis with content-independent distortion measure. IEEE Signal Process. Lett., 13(2):92–95. [doi:10.1109/LSP.2005.862152]

    Article  Google Scholar 

  • Chang, C.C., Lin, C.J., 2001. LIBSVM: a Library for Support Vector Machines. Available from http://www.csie.ntu.edu.tw/~cjlin/libsvm [Accessed on May 9, 2011].

  • Chen, B., Wornell, G.W., 2001. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory, 47(4):1423–1443. [doi:10.1109/18.923725]

    Article  MathSciNet  MATH  Google Scholar 

  • Hafiz, M., 2008. Steganalysis of QIM Steganography Using Irregularity Measure. Proc. 10th ACM Workshop on Multimedia and Security, p.149–158. [doi:10.1145/1411328.1411355]

  • Hafiz, M., 2010. Statistical Modeling of Footprints of QIM Steganography. IEEE Int. Conf. on Multi-media and Expo, p.1487–1492. [doi:10.1109/ICME.2010.5582954]

  • Hafiz, M., Subbalakshmi, K.P., Chandramouli, R., 2008. Nonparametric steganalysis of QIM data hiding using approximate entropy. SPIE, 6819:681914. [doi:10.1117/12.767313]

    Article  Google Scholar 

  • Huang, Y., Xiao, B., 2008. Implementation of Covert Communication Based on Steganography. Proc. 4th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, p.1512–1515. [doi:10.1109/IIH-MSP.2008.174]

  • Huang, Y., Tang, S., Zhang, Y., 2011a. Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis. IET Commun., 5(7): 929–936. [doi:10.1049/iet-com.2010.0348]

    Article  Google Scholar 

  • Huang, Y., Tang, S., Bao, C., Yip, Y.J., 2011b. Steganalysis of compressed speech to detect covert voice over Internet protocol channels. IET Inf. Secur., 5(1):26–32. [doi:10.1049/iet-ifs.2010.0032]

    Article  Google Scholar 

  • ITU-T, 1996a. ITU-T Recommendation G.723.1: Dual Rate Speech Coder for Multimedia Communications Transmitting at 5.3 and 6.3 kbit/s. ITU-T, Geneva.

    Google Scholar 

  • ITU-T, 1996b. ITU-T Recommendation G.723.1-Annex A: Silence Compression Scheme for G.723.1. ITU-T, Geneva.

    Google Scholar 

  • Krätzer, C., Dittmann, J., Vogel, T., Hillert, R., 2006. Design and Evaluation of Steganography for Voice-Over-IP. Proc. IEEE Int. Symp. on Circuits and Systems, p.2397–2400. [doi:10.1109/ISCAS.2006.1693105]

  • Li, X., Yu, H.H., 2000. Transparent and Robust Audio Data Hiding in Cepstrum Domain. IEEE Int. Conf. on Multi-media and Expo, p.397–400. [doi:10.1109/ICME.2000.869624]

  • Liu, Q., Sung, A.H., Qiao, M., 2009. Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forens. Secur., 4(3):359–368. [doi:10.1109/TIFS.2009.2024718]

    Article  Google Scholar 

  • Lu, Z.M., Yan, B., Sun, S.H., 2005. Watermarking combined with CELP speech coding for authentication. IEICE Trans. Inf. Syst., E88-D(2):330–334. [doi:10.1093/ietisy/E88-D.2.330]

    Article  Google Scholar 

  • Mazurczyk, W., Szczypiorski, K., 2008. Steganography of VoIP Streams. Proc. 3rd Int. Symp. on Information Security, p.1001–1018. [doi:10.1007/978-3-540-88873-4-6]

  • Tan, L., Wu, B., Liu, Z., Zhou, M., 2010. An audio information hiding algorithm with high-capacity which based on chaotic and wavelet transform. Acta Electron. Sin., 38(8): 1812–1824 (in Chinese).

    Google Scholar 

  • Thomas, Q.F., 2002. Discrete-Time Speech Signal Processing: Principles and Practice. Prentice Hall PTR, NJ, USA, p.45–60.

    Google Scholar 

  • Tian, H., Zhou, K., Jiang, H., Huang, Y., Liu, J., Feng, D., 2009. An Adaptive Steganography Scheme for Voice Over IP. Proc. IEEE Int. Symp. on Circuits and Systems, p.2921–2925. [doi:10.1109/ISCAS.2009.5118414]

  • Wang, C.T., Chen, T.S., Chao, W.H., 2004. A New Audio Watermarking Based on Modified Discrete Cosine Transform of MPEG/Audio Layer III. Proc. IEEE Int. Conf. on Networking, Sensing and Control, p.265–277. [doi:10.1109/ICNSC.2004.1297081]

  • Wang, F.H., Jain, L.C., Pan, J.S., 2007. VQ-based watermarking scheme with genetic codebook partition. J. Network Comput. Appl., 30(1):4–23. [doi:10.1016/j.jnca.2005.08.002]

    Article  Google Scholar 

  • Wu, Q., Li, W., Yu, X.Y., 2009. Revisit Steganalysis on QIM-Based Data Hiding. Proc. 5th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, p.929–932. [doi:10.1109/IIH-MSP.2009.316]

  • Wu, S., Huang, J., Huang, D., 2005. Efficiently self-synchronized audio watermarking for assured audio data transmission. IEEE Trans. Broadcast., 51(1):69–76. [doi:10.1109/TBC.2004.838265]

    Article  Google Scholar 

  • Xiao, B., Huang, Y., Tang, S., 2008. An Approach to Information Hiding in Low Bit-Rate Speech Stream. Proc. IEEE Global Communications Conf., p.1940–1944. [doi:10.1109/GLOCOM.2008.ECP.375]

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong-feng Huang.

Additional information

Project supported by the National Natural Science Foundation of China (No. 60970148) and the National High-Tech R&D (863) Program of China (No. 2011AA010704)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, Sb., Tao, Hz. & Huang, Yf. Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. - Sci. C 13, 624–634 (2012). https://doi.org/10.1631/jzus.C1100374

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1631/jzus.C1100374

Key words

CLC number

Navigation