Abstract
In this study, we mainly concentrate on quantization-index-modulation (QIM) steganography in low bit-rate speech streams, and contribute to improve its security. Exploiting the characteristics of codebook division diversity in the complementary neighbor vertices algorithm, we first design a key-based codebook division strategy, which follows Kerckhoff’s principle and provides a better security than the previous QIM approach. Further, to resist the state-of-the-art steganalysis, following a general belief that fewer and smaller cover changes are less detectable and more secure, we present an improved QIM steganography, which introduces random position selection to adjust the embedding rate dynamically, and employs matrix encoding strategy to enhance the embedding efficiency. The proposed approach is evaluated with ITU-T G.723.1 as the codec of cover speech and compared with the previous work. The experimental results demonstrate that the proposed approach outperforms the traditional QIM approach on both steganographic transparency and steganalysis resistance. Moreover, it is worth pointing out that our approach can effectively work in conjunction with not only G.723.1 codec but also all other parametric speech coders, and be successfully applied into Voice-over-Internet-Protocol systems.
Similar content being viewed by others
Notes
The parameters of SVM are set as c = 20, g = 20 in each experiment.
References
Lubacz, J., Mazurczyk, W., Szczypiorski, K.: Vice over IP. IEEE Spectr. 47(2), 42–47 (2010)
Tian, H., Jiang, H., Zhou, K., Feng, D.: Adaptive partial-matching steganography for voice over IP using triple M sequences. Comput. Commun. 34(18), 2236–2247 (2011)
Mazurczyk, W.: VoIP steganography and its detection—a survey. CoRR, arXiv.org E-print Archive. http://arxiv.org/ftp/arxiv/papers/1203/1203.4374.pdf (2012). Accessed 20 Aug 2012
Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP Streams. In: Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE, Monterrey, Mexico, November 2008, Part II. LNCS, vol. 5332, pp. 1001–1018 (2008)
Tian, H., Jiang, H., Zhou, K., Feng, D.: Transparency-orientated encoding strategies for voice-over-IP steganography. Comput. J. 55(6), 702–716 (2012)
Bai, L.Y., Huang, Y., Hou, G., Xiao, B.: Covert channels based on jitter field of the RTCP header. In: Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, August 2008, pp. 1388–1391 (2008)
Huang, Y., Yuan, J., Chen, M., Xiao, B.: Key distribution over the Covert communication based on VoIP. Chin. J. Electron. 20(2), 357–360 (2011)
Tian, H., Guo, R., Lu, J., Chen, Y.: Implementing Covert communication over voice conversations with Windows Live Messenger. Adv. Inf. Sci. Serv. Sci. 4(4), 18–26 (2012)
Mazurczyk, W., Szczypiorski, K.: Covert channels in SIP for VoIP signalling. In: Proceedings of the 4th International Conference on Global E-security, London, United Kingdom, June 2008, pp. 65–70 (2008)
Mazurczyk, W., Lubacz, J.: LACK—a VoIP steganographic method. Telecommun. Syst. 45(2–3), 53–163 (2010)
Dittmann, J., Hesse, D., Hillert, R.: Steganography and steganalysis in voice over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia, Contents VII, vol. 5681, Springer, Berlin Heidelberg New York, March 2005, pp. 607–618 (2005)
Wang, C., Wu, Q.: Information hiding in real-time VoIP streams. In: Proceedings of the 9th IEEE International Symposium on Multimedia (ISM), Taichung, Taiwan, December 2007, pp. 255–262 (2007)
Aoki, N.: A semi-lossless steganography technique for G.711 telephony speech. In: Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, October 2010, pp. 534–537 (2010)
Su, Y., Huang, Y., Li, X.: Steganography-oriented noisy resistance model of G.729a. In: Proceedings of the 2006 IMACS Multi-conference on Computational Engineering in Systems Applications, Beijing, China, October 2006, pp. 11–15 (2006)
Liu, L., Li, M., Li, Q., Liang, Y.: Perceptually transparent information hiding in G.729 bitstream. In: Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, August 2008, pp. 406–409 (2008)
Xu, T., Yang, Z.: Simple and effective speech steganography in G.723.1 low-rate codes. In: Proceedings of the 1st International Conference on Wireless Communications and Signal Processing, Nanjing, China, November 2009, pp. 1–4 (2009)
Huang, Y., Xiao, B., Xiao, H.: Implementation of Covert communication based on steganography. In: Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, August 2008, pp. 1512–1515 (2008)
Xu, E., Liu, B., Xu, L., Wei, Z., Zhao, B., Su, J.: Adaptive VoIP steganography for information hiding within network audio streams. In: Proceedings of the 14th International Conference on Network-Based Information Systems, Tirana, Albania, September 2011, pp. 612–617 (2011)
Miao, R., Huang, Y.: An approach of Covert communication based on the adaptive steganography scheme on voice over IP. In: Proceedings of the 46th IEEE International Conference on Communications (ICC), Kyoto, Japan, June 2011, pp. 1–5 (2011)
Liu, J., Zhou, K., Tian, H.: Least-significant-digit steganography in low bit-rate speech. In: Proceedings of the 47th IEEE International Conference on Communications (ICC), Ottawa, Canada, June 2012, pp. 1–5 (2012)
Tian, H., Zhou, K., Feng, D.: Dynamic matrix encoding strategy for voice-over-IP steganography. J. Central South Univ. Technol. 17(6), 1285–1292 (2010)
Chen, O., Wu, W.: Highly robust, secure, and perceptual-quality echo hiding scheme. IEEE Trans. Audio, Speech Lang. 16(3), 629–638 (2008)
Rachoń, J., Piotrowski, Z., Gajewski, P.: Authentication in VoIP telephony with use of the echo hiding method. J. Telecommun. Inf. Technol. 3(1), 17–21 (2011)
Huang, Y., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)
Mazurczyk, W., Szaga, P., Szczypiorski, K.: Using transcoding for hidden communication in IP telephony. CoRR, arXiv.org E-print Archive. http://arxiv.org/ftp/arxiv/papers/1111/1111.1250.pdf (2012). Accessed 20 Aug 2012. (Accepted to appear in Multimedia Tools and Applications)
Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: Proceedings of the 27th IEEE Global Telecommunications Conference (GLOBECOM), New Orleans, LA, USA, December 2008, pp. 1–5 (2008)
Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)
Li, S., Tao, H., Huang, Y.: Detection of QIM steganography in G.723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. Sci. C 13(8), 624–634 (2012)
Böhme, R.: Advanced Statistical Steganalysis. Springer, New York (2010)
Westfeld, A.: F5—a steganographic algorithm. In: Proceedings of the 4th International Workshop on Information Hiding, Pittsburgh, PA, USA, April 2001, pp. 289–302 (2001)
ITU-T G.723.1: Dual Rate Speech Coder for Multimedia Communications Transmitting at 5.3 and 6.3 kbit/s. International Telecommunications Union, Geneva, Switzerland (2006)
Matsumoto, M., Nishimura, T.: Mersenne Twister: a 623-dimensionally equidistributed uniform pseudorandom number generator. ACM Trans. Model. Comput. Simul. 8(1), 3–30 (1998)
ITU-T P.862: Perceptual Evaluation of Speech Quality (PESQ): an Objective Method for End-to-end Speech Quality Assessment of Narrow-band Telephone Networks and Speech Codecs. International Telecommunications Union, Geneva, Switzerland (2001)
ITU-T P.800: Methods for Subjective Determination of Transmission Quality. International Telecommunications Union, Geneva, Switzerland (1996)
ITU-T. P.501: Test Signals for Use in Telephonometry. International Telecommunications Union, Geneva, Switzerland (2007)
DRWI (2010) Xiamen Overview. http://www.chinatravel.com/fujian/xiamen/overview.htm. Accessed 20 Sept 2012
Acknowledgments
This work was supported in part by the Natural Science Foundation of Fujian Province of China under Grant No. 2011J05151, the Fundamental Research Funds for the Central Universities under Grant No. JB-ZR1220, the Scientific Research Foundation of Huaqiao University under Grant No. 11BS210, the Natural Science Foundation of China under Grant No. 61202468, and the Platform Construction Project for Scientific and Technological Innovation of Fujian Province of China under Grant No. 2012H2101. The authors wish to thank anonymous reviewers for their valuable comments and suggestions that improved this paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tian, H., Liu, J. & Li, S. Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimedia Systems 20, 143–154 (2014). https://doi.org/10.1007/s00530-013-0302-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-013-0302-8