G.711-Based Adaptive Speech Information Hiding Approach

  • Zhijun Wu
  • Wei Yang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4113)


This paper presents an adaptive LSB (Least Significant Bit) algorithm to embed dynamic secret speech information data bits into public speech of G.711-PCM (Pulse Code Modulation) for the purpose of secure communication according to energy distribution, with high efficiency in steganography and good quality in output speech. It is superior to available classical algorithms, LSB. Experiments show that the proposed approach is capable of embedding up to 20 Kbps information data of secret speech into G.711 speech at an average embedded error rate of 10− 5. It meets the requirements of information hiding, and satisfies the secure communication speech quality constraints with an excellent speech quality and complicating speakers’ recognition.


Average Energy Secure Communication Code Word Information Hiding Secret Information 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding—A Survey. IEEE Trans. Proc. Thy. 87, 1062–1078 (1999)Google Scholar
  2. 2.
    Voloshynovskiy, S., Deguillaume, F., Kovall, O., Pun, T.: Information-Theoretic Data-Hiding for Public Network Security, Services Control and Secure Communications. In: Proc. of TELSIKS 2003, Serbia and Montenegro, NIS, pp. 3–17 (2003)Google Scholar
  3. 3.
    Moulin, P., O’Sullivan, J.A.: Information-theoretic analysis of watermarking. In: ICASSP 2000 Proc. of 2000 IEEE International Conference on Acoustics, Speech, and Signal, Istanbul, Turkey, vol. 6, pp. 3630–3633 (2000)Google Scholar
  4. 4.
    Chen, L., Zhang, X.: Speech Hiding Algorithm Based on Speech Parameter Model. Chinese Journal of Computers 26, 954–981 (2003)Google Scholar
  5. 5.
    Chen, L., Zhang, X.: Study of Information Hiding in Security Speech Communication. Journal of PLA University of Science and Technology 3, 1–5 (2002)MATHGoogle Scholar
  6. 6.
    Gibson, J.D., Kokes, M.G.: Data embedding for secure communications. In: Proceedings MILCOM 2002, vol. 1, pp. 406–410 (2002)Google Scholar
  7. 7.
    Moulin, P., Joseph, A.: O’Sullivan: Information-theoretic analysis of information hiding. IEEE Trans. on Information Theory 49, 563–593 (2003)MATHCrossRefGoogle Scholar
  8. 8.
    Wu, Z., Hu, Y., Niu, X., et al.: Information Hiding Technique Based Speech Secure Communication over PSTN. The Chinese Journal of Electronics 15, 108–112 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Zhijun Wu
    • 1
    • 2
  • Wei Yang
    • 2
  1. 1.Department of Communication EngineeringCivil Aviation University of ChinaTianjinChina
  2. 2.Network Research CenterTsinghua UniversityBeijingChina

Personalised recommendations