Skip to main content

Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10431))

Abstract

Most existing audio steganographic methods embed secret messages according to a pseudorandom number generator, thus some auditory sensitive parts in cover audio, such as mute or near-mute segments, will be contaminated, which would lead to poor perceptual quality and may introduce some detectable artifacts for steganalysis. In this paper, we propose a novel adaptive audio steganography in the time domain based on the advanced audio coding (AAC) and the Syndrome-Trellis coding (STC). The proposed method firstly compresses a given wave signal into AAC compressed file with a high bitrate, and then obtains a residual signal by comparing the signal before and after AAC compression. According to the quantity and sign of the residual signal, \(\pm 1\) embedding costs are assigned to the audio samples. Finally, the STC is used to create the stego audio. The extensive results evaluated on 10,000 music and 10,000 speech audio clips have shown that our method can significantly outperform the conventional \(\pm 1\) LSB based steganography in terms of security and audio quality.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    The STC tool is available at: http://dde.binghamton.edu/download/syndrome.

  2. 2.

    Nero AAC Codec is available at: http://nero-aac-codec.en.lo4d.com.

References

  1. Damodaram, A., Sridevi, R., Narasimham, S.V.L.: Efficient method of audio steganography by modified LSB algorithm and strong encryption key with enhanced security. J. Theor. Appl. Inf. Technol. 5, 768–771 (2009)

    Google Scholar 

  2. Shirali-Shahreza, S., Manzuri-Shalmani, M.T.: High capacity error free wavelet domain speech steganography. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1729–1732 (2008)

    Google Scholar 

  3. Delforouzi, A., Pooyan, M.: Adaptive digital audio steganography based on integer wavelet transform. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, vol. 2, 283–286 (2007)

    Google Scholar 

  4. Rekik, S., Guerchi, D., Selouani, S., Hamam, H.: Speech steganography using wavelet and fourier transforms. EURASIP J. Audio Speech Music Process. 2012(1), 20:1–20:14 (2012)

    Article  Google Scholar 

  5. Ahani, S., Ghaemmaghami, S., Wang, Z.J.: A sparse representation-based wavelet domain speech steganography method. IEEE/ACM Trans. Audio Speech Lang. Process. 23(1), 80–91 (2015)

    Google Scholar 

  6. Adams, S.F., Gopalan, K., Wenndt, S.J., Haddad, D.M.: Audio steganography by amplitude or phase modification. In: Proceedings of SPIE - The International Society for Optical Engineering, vol. 5020, pp. 67–76 (2003)

    Google Scholar 

  7. Shirali-Shahreza, S., Shirali-Shahreza, M.: Steganography in silence intervals of speech. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 605–607 (2008)

    Google Scholar 

  8. Djebbar, F., Ayad, B., Meraim, K.A., Hamam, H.: Comparative study of digital audio steganography techniques. EURASIP J. Audio Speech and Music Process. 2012(1), 25:1–25:16 (2012)

    Article  Google Scholar 

  9. Luo, W., Li, H., Yan, Q., Yang, R., Huang, J.: Improved steganalytic feature and its applications in audio forensics. Technical report, Guangzhou, ER. China (2016)

    Google Scholar 

  10. Fridrich, J., Kodovský, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)

    Article  Google Scholar 

  11. Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: IEEE International Workshop on Information Forensics and Security, pp. 234–239 (2012)

    Google Scholar 

  12. Filler, T., Fridrich, J.: Gibbs construction in steganography. IEEE Trans. Inf. Forensics Secur. 5(4), 705–720 (2010)

    Article  Google Scholar 

  13. Painter, T., Spanias, A.: Perceptual coding of digital audio. Proc. IEEE 88(4), 451–515 (2000)

    Article  Google Scholar 

  14. Liu, Q., Sung, A.H., Qiao, M.: Temporal derivative-based spectrum and Mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forensics Secur. 4(3), 359–368 (2009)

    Article  Google Scholar 

  15. Liu, Q., Sung, A.H., Qiao, M.: Derivative-based audio steganalysis. ACM Trans. Multimedia Comput. Commun. Appl. 7(3), 18:1–18:19 (2011)

    Article  Google Scholar 

  16. Kodovský, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2012)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported in part by the NSFC (61672551), the Fok Ying-Tong Education Foundation (142003), the special research plan of Guangdong Province (2015TQ01X365), and the Guangzhou science and technology project (201707010167)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weiqi Luo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Luo, W., Zhang, Y., Li, H. (2017). Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding. In: Kraetzer, C., Shi, YQ., Dittmann, J., Kim, H. (eds) Digital Forensics and Watermarking. IWDW 2017. Lecture Notes in Computer Science(), vol 10431. Springer, Cham. https://doi.org/10.1007/978-3-319-64185-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64185-0_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64184-3

  • Online ISBN: 978-3-319-64185-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics