Skip to main content
Log in

Improving security of quantization-index-modulation steganography in low bit-rate speech streams

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

In this study, we mainly concentrate on quantization-index-modulation (QIM) steganography in low bit-rate speech streams, and contribute to improve its security. Exploiting the characteristics of codebook division diversity in the complementary neighbor vertices algorithm, we first design a key-based codebook division strategy, which follows Kerckhoff’s principle and provides a better security than the previous QIM approach. Further, to resist the state-of-the-art steganalysis, following a general belief that fewer and smaller cover changes are less detectable and more secure, we present an improved QIM steganography, which introduces random position selection to adjust the embedding rate dynamically, and employs matrix encoding strategy to enhance the embedding efficiency. The proposed approach is evaluated with ITU-T G.723.1 as the codec of cover speech and compared with the previous work. The experimental results demonstrate that the proposed approach outperforms the traditional QIM approach on both steganographic transparency and steganalysis resistance. Moreover, it is worth pointing out that our approach can effectively work in conjunction with not only G.723.1 codec but also all other parametric speech coders, and be successfully applied into Voice-over-Internet-Protocol systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. The parameters of SVM are set as c = 20, g = 20 in each experiment.

References

  1. Lubacz, J., Mazurczyk, W., Szczypiorski, K.: Vice over IP. IEEE Spectr. 47(2), 42–47 (2010)

    Article  Google Scholar 

  2. Tian, H., Jiang, H., Zhou, K., Feng, D.: Adaptive partial-matching steganography for voice over IP using triple M sequences. Comput. Commun. 34(18), 2236–2247 (2011)

    Article  Google Scholar 

  3. Mazurczyk, W.: VoIP steganography and its detection—a survey. CoRR, arXiv.org E-print Archive. http://arxiv.org/ftp/arxiv/papers/1203/1203.4374.pdf (2012). Accessed 20 Aug 2012

  4. Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP Streams. In: Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE, Monterrey, Mexico, November 2008, Part II. LNCS, vol. 5332, pp. 1001–1018 (2008)

  5. Tian, H., Jiang, H., Zhou, K., Feng, D.: Transparency-orientated encoding strategies for voice-over-IP steganography. Comput. J. 55(6), 702–716 (2012)

    Article  Google Scholar 

  6. Bai, L.Y., Huang, Y., Hou, G., Xiao, B.: Covert channels based on jitter field of the RTCP header. In: Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, August 2008, pp. 1388–1391 (2008)

  7. Huang, Y., Yuan, J., Chen, M., Xiao, B.: Key distribution over the Covert communication based on VoIP. Chin. J. Electron. 20(2), 357–360 (2011)

    Google Scholar 

  8. Tian, H., Guo, R., Lu, J., Chen, Y.: Implementing Covert communication over voice conversations with Windows Live Messenger. Adv. Inf. Sci. Serv. Sci. 4(4), 18–26 (2012)

    Google Scholar 

  9. Mazurczyk, W., Szczypiorski, K.: Covert channels in SIP for VoIP signalling. In: Proceedings of the 4th International Conference on Global E-security, London, United Kingdom, June 2008, pp. 65–70 (2008)

  10. Mazurczyk, W., Lubacz, J.: LACK—a VoIP steganographic method. Telecommun. Syst. 45(2–3), 53–163 (2010)

    Google Scholar 

  11. Dittmann, J., Hesse, D., Hillert, R.: Steganography and steganalysis in voice over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia, Contents VII, vol. 5681, Springer, Berlin Heidelberg New York, March 2005, pp. 607–618 (2005)

  12. Wang, C., Wu, Q.: Information hiding in real-time VoIP streams. In: Proceedings of the 9th IEEE International Symposium on Multimedia (ISM), Taichung, Taiwan, December 2007, pp. 255–262 (2007)

  13. Aoki, N.: A semi-lossless steganography technique for G.711 telephony speech. In: Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, October 2010, pp. 534–537 (2010)

  14. Su, Y., Huang, Y., Li, X.: Steganography-oriented noisy resistance model of G.729a. In: Proceedings of the 2006 IMACS Multi-conference on Computational Engineering in Systems Applications, Beijing, China, October 2006, pp. 11–15 (2006)

  15. Liu, L., Li, M., Li, Q., Liang, Y.: Perceptually transparent information hiding in G.729 bitstream. In: Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, August 2008, pp. 406–409 (2008)

  16. Xu, T., Yang, Z.: Simple and effective speech steganography in G.723.1 low-rate codes. In: Proceedings of the 1st International Conference on Wireless Communications and Signal Processing, Nanjing, China, November 2009, pp. 1–4 (2009)

  17. Huang, Y., Xiao, B., Xiao, H.: Implementation of Covert communication based on steganography. In: Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, August 2008, pp. 1512–1515 (2008)

  18. Xu, E., Liu, B., Xu, L., Wei, Z., Zhao, B., Su, J.: Adaptive VoIP steganography for information hiding within network audio streams. In: Proceedings of the 14th International Conference on Network-Based Information Systems, Tirana, Albania, September 2011, pp. 612–617 (2011)

  19. Miao, R., Huang, Y.: An approach of Covert communication based on the adaptive steganography scheme on voice over IP. In: Proceedings of the 46th IEEE International Conference on Communications (ICC), Kyoto, Japan, June 2011, pp. 1–5 (2011)

  20. Liu, J., Zhou, K., Tian, H.: Least-significant-digit steganography in low bit-rate speech. In: Proceedings of the 47th IEEE International Conference on Communications (ICC), Ottawa, Canada, June 2012, pp. 1–5 (2012)

  21. Tian, H., Zhou, K., Feng, D.: Dynamic matrix encoding strategy for voice-over-IP steganography. J. Central South Univ. Technol. 17(6), 1285–1292 (2010)

    Article  Google Scholar 

  22. Chen, O., Wu, W.: Highly robust, secure, and perceptual-quality echo hiding scheme. IEEE Trans. Audio, Speech Lang. 16(3), 629–638 (2008)

    Article  Google Scholar 

  23. Rachoń, J., Piotrowski, Z., Gajewski, P.: Authentication in VoIP telephony with use of the echo hiding method. J. Telecommun. Inf. Technol. 3(1), 17–21 (2011)

    Google Scholar 

  24. Huang, Y., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)

    Article  Google Scholar 

  25. Mazurczyk, W., Szaga, P., Szczypiorski, K.: Using transcoding for hidden communication in IP telephony. CoRR, arXiv.org E-print Archive. http://arxiv.org/ftp/arxiv/papers/1111/1111.1250.pdf (2012). Accessed 20 Aug 2012. (Accepted to appear in Multimedia Tools and Applications)

  26. Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: Proceedings of the 27th IEEE Global Telecommunications Conference (GLOBECOM), New Orleans, LA, USA, December 2008, pp. 1–5 (2008)

  27. Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  28. Li, S., Tao, H., Huang, Y.: Detection of QIM steganography in G.723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. Sci. C 13(8), 624–634 (2012)

    Article  Google Scholar 

  29. Böhme, R.: Advanced Statistical Steganalysis. Springer, New York (2010)

    Book  MATH  Google Scholar 

  30. Westfeld, A.: F5—a steganographic algorithm. In: Proceedings of the 4th International Workshop on Information Hiding, Pittsburgh, PA, USA, April 2001, pp. 289–302 (2001)

  31. ITU-T G.723.1: Dual Rate Speech Coder for Multimedia Communications Transmitting at 5.3 and 6.3 kbit/s. International Telecommunications Union, Geneva, Switzerland (2006)

  32. Matsumoto, M., Nishimura, T.: Mersenne Twister: a 623-dimensionally equidistributed uniform pseudorandom number generator. ACM Trans. Model. Comput. Simul. 8(1), 3–30 (1998)

    Article  MATH  Google Scholar 

  33. ITU-T P.862: Perceptual Evaluation of Speech Quality (PESQ): an Objective Method for End-to-end Speech Quality Assessment of Narrow-band Telephone Networks and Speech Codecs. International Telecommunications Union, Geneva, Switzerland (2001)

  34. ITU-T P.800: Methods for Subjective Determination of Transmission Quality. International Telecommunications Union, Geneva, Switzerland (1996)

  35. ITU-T. P.501: Test Signals for Use in Telephonometry. International Telecommunications Union, Geneva, Switzerland (2007)

  36. DRWI (2010) Xiamen Overview. http://www.chinatravel.com/fujian/xiamen/overview.htm. Accessed 20 Sept 2012

Download references

Acknowledgments

This work was supported in part by the Natural Science Foundation of Fujian Province of China under Grant No. 2011J05151, the Fundamental Research Funds for the Central Universities under Grant No. JB-ZR1220, the Scientific Research Foundation of Huaqiao University under Grant No. 11BS210, the Natural Science Foundation of China under Grant No. 61202468, and the Platform Construction Project for Scientific and Technological Innovation of Fujian Province of China under Grant No. 2012H2101. The authors wish to thank anonymous reviewers for their valuable comments and suggestions that improved this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Tian.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tian, H., Liu, J. & Li, S. Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimedia Systems 20, 143–154 (2014). https://doi.org/10.1007/s00530-013-0302-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-013-0302-8

Keywords

Navigation