A Fast and Low-Distortion Capacity Adaptive Synchronized Acoustic-to-Acoustic Steganography Scheme

Part of the Intelligent Systems Reference Library book series (ISRL, volume 40)

Summary

Data transmissions in public communications systems are not secure because of the chance of their being intercepted, and tampered with by eavesdroppers. The security of acoustic data is an important issue. Particularly, a real-time acoustic steganography is required in a public broadcasting or mobile communication system. This chapter proposes a new steganography scheme with capacity variability and synchronization for secure transmission of acoustic data. In this scheme, the sender records acoustic digital WAV data, converts it into adapted PCM properties, and divides data stream into size-fixed frames. Then it embeds synchronous secret data into fix-sized cover frames, interleaves and transmits the secret data to generate stego data. The receiver extracts the secret data in real-time. A short execution time ensures synchronization, which in turn ensures scalability of privacy protection in live broadcasts. The embedding capacity is chosen as a key depending on the imperceptibly of the scrambling bits of the cover data. A socket model is used to transmit the stego data. Objective (signal to noise ratio) measurements and subjective evaluations demonstrate the effectiveness of the scheme.

Keywords

Cover Data Secret Message Mean Opinion Score Information Hiding Secret Data 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Johnson, N.F., Duric, Z., Jajodia, S.: Information Hiding Steganography and Watermarking-Attacks and Countermeasures. Kluwer Academic Publishers (2001)Google Scholar
  2. 2.
    Segawa, N., Murayama, Y., Miyazaki, Y.M.: Information hiding with a handwritten message in vector-drawing codes. In: Proc. 35th Hawaii Int’l Conf. System Sciences, pp. 4027–4033 (2002)Google Scholar
  3. 3.
    Matsuoka, H.: Acoustic data hiding method using sub-band phase shifting. Technical report of IEICE EA 106, 7–11 (2006)Google Scholar
  4. 4.
    Pan, J.S., Huang, H.C., Jain, L.C.: Intelligent Watermarking Techniques. World Scientific Publishing Company, Singapore (2004)MATHCrossRefGoogle Scholar
  5. 5.
    Pan, J.S., Huang, H.C., Jain, L.C., Fang, W.C.: Intelligent Multimedia Data Hiding-New Directions. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  6. 6.
    Cao, G., Zhao, Y., Ni, R.R.: Edge-based blur metric for tamper detection. Journal of Information Hiding and Multimedia Signal Processing 1, 20–27 (2010)Google Scholar
  7. 7.
    Wang, H., Liang, J., Kuo, C.C.J.: Overview of robust video streaming with network coding. Journal of Information Hiding and Multimedia Signal Processing 1, 36–50 (2010)Google Scholar
  8. 8.
    Huang, H.C., Chen, Y.H., Abraham, A.: Optimized watermarking using swarm-based bacterial foraging. Journal of Information Hiding and Multimedia Signal Processing 1, 51–58 (2010)Google Scholar
  9. 9.
    Huang, X.P., Kawashima, R., Segawa, N., Abe, Y.: The real-time steganography based on audio-to-audio data bit stream. Technical report of IEICE 106, 15–22 (2006)Google Scholar
  10. 10.
    Huang, X.P., Kawashima, R., Segawa, N., Abe, Y.: Design and implementation of synchronized audio-to-audio steganography scheme. In: Proc. Int’l Conf. Intelligent Information Hiding and Multimedia Signal Processing, pp. 331–334 (2008)Google Scholar
  11. 11.
    Wu, M., Liu, B.: Multimedia Data Hiding. Springer, New York (2003)MATHGoogle Scholar
  12. 12.
    Katzenbeisser, S., Petitcolas, F.A. (eds.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House London (2000)Google Scholar
  13. 13.
    Chakrabartty, S., Deng, Y., Cauwenberghs, G.: Robust speech feature extraction by growth transformation in reproducing kernel hilbert space. IEEE Trans. Audio, Speech, and Language Processing 15, 473–480 (2007)CrossRefGoogle Scholar
  14. 14.
    Boney, L., Tewfik, A.H., Hamdy, K.H.: Digital watermarks for audio signals. In: Proc. Int’l Conf. Multimedia Computing and Systems, pp. 473–480 (1996)Google Scholar
  15. 15.
    Ito, A., Makino, S.: Designing Side Information of Multiple Description Coding. Journal of Information Hiding and Multimedia Signal Processing 1, 10–19 (2010)Google Scholar
  16. 16.
    Kusatsu, I., Niimi, M., Noda, H., Kawaguchi, E.: A large capacity steganography using acoustic dummy data. Technical Report of IEICE EA98-69-78, 27–32 (1998)Google Scholar
  17. 17.
    Pal, S.K., Saxena, P.K., Muttoo, S.K.: The future of audio steganography. In: Proc. Pacific Rim Workshop on Digital Steganography, pp. 136–145 (2002)Google Scholar
  18. 18.
    Cox, I., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Pub. (2002)Google Scholar
  19. 19.
    Wang, S., Yang, B., Niu, X.: A secure steganography method based on genetic algorithm. Journal of Information Hiding and Multimedia Signal Processing 1, 28–35 (2010)Google Scholar
  20. 20.
    Wang, Z.H., Kieu, T.D., Chang, C.C., Li, M.C.: A novel information concealing method based on exploiting modification direction. Journal of Information Hiding and Multimedia Signal Processing 1, 1–9 (2010)Google Scholar
  21. 21.
    Stinson, D.R.: Cryptography-Theory and Practice. CRC Press (1995)Google Scholar
  22. 22.
    Oliver, G.: Understanding and managing delay in the global voice network. PMC-Sierra Webinar (2003), http://www.pmc-sierra.com/webinars/dec2003.html
  23. 23.
    Goto, M., Hashiguchi, H., Nishimura, T., Oka, R.: RWC music database: Music genre database and musical instrument sound database. In: Proc. 4th Int’l. Conf. Music Information Retrieval, pp. 229–230 (2003)Google Scholar
  24. 24.
    Kobayasi, T., Itahashi, S., Hayamizu, S., Takezawa, T.: ASJ continuous speech corpus for research. The Journal of the Acoustical Society of Japan 48, 888–893 (1992)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.School of Multidisciplinary SciencesThe Graduate University for Advanced Studies (SOKENDAI)Chiyoda-kuJapan
  2. 2.Software Information Science FacultyIwate Prefectural UniversityTakizawaJapan
  3. 3.National Institute of InformaticsChiyoda-kuJapan

Personalised recommendations