Skip to main content

2018 | OriginalPaper | Buchkapitel

A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding

verfasst von : Zhongliang Yang, Xueshun Peng, Yongfeng Huang

Erschienen in: Security and Privacy in Communication Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Using low-rate compressed speech coding for large-capacity steganography is always a big challenge due to its low redundant information. To overcome this challenge, we propose a method of embedding and extracting steganography in low-rate speech coding using three-dimensional Sudoku matrix. Analysis shows that this method can enhance the concealment of steganographic information and improve the steganography capacity of low-rate speech coding. The experimental results showed that using the current typical low speech coding standard G.723.1 achieved a steganographic capacity of 200 bit/s and a reduction of less than 10% in the sensory evaluation value of the speech quality of the coded speech.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Janicki, A.: Novel method of hiding information in IP telephony using pitch approximation. In: 2015 10th International Conference on Availability, Reliability and Security (ARES). IEEE (2015) Janicki, A.: Novel method of hiding information in IP telephony using pitch approximation. In: 2015 10th International Conference on Availability, Reliability and Security (ARES). IEEE (2015)
2.
Zurück zum Zitat Mazurczyk, W., Szaga, P., Szczypiorski, K.: Using transcoding for hidden communication in IP telephony. Multimed. Tools App. 70(3), 2139–2165 (2014)CrossRef Mazurczyk, W., Szaga, P., Szczypiorski, K.: Using transcoding for hidden communication in IP telephony. Multimed. Tools App. 70(3), 2139–2165 (2014)CrossRef
3.
Zurück zum Zitat Yang, Z., Huang, Y.F., Tao, H.Z., Yang, W.X.: Protocol of steganography in streaming media on VoIP network based on variable length coding. In: National Conference on Information Technology and Computer Science (CITCS 2012), Lanzhou, China (2012) Yang, Z., Huang, Y.F., Tao, H.Z., Yang, W.X.: Protocol of steganography in streaming media on VoIP network based on variable length coding. In: National Conference on Information Technology and Computer Science (CITCS 2012), Lanzhou, China (2012)
4.
Zurück zum Zitat Yuan, J., Huang, Y.F., Li, X.: A quantitation method to the imperceptibility of hiding-vector in multi-dimensional hiding space. Chin. J. Electron. 4(22), 826–832 (2013) Yuan, J., Huang, Y.F., Li, X.: A quantitation method to the imperceptibility of hiding-vector in multi-dimensional hiding space. Chin. J. Electron. 4(22), 826–832 (2013)
5.
Zurück zum Zitat Huang, Y.F., Tang, S.Y., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)CrossRef Huang, Y.F., Tang, S.Y., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)CrossRef
6.
Zurück zum Zitat Zhou, K., Liu, J., Tian, H., Li, C.: State-based steganography in low bit rate speech. In: Proceedings of 20th ACM Multimedia Conference (ACM-MM2012), Nara, Japan, 29 Oct–2 Nov 2012, pp. 1109–1112 (2012) Zhou, K., Liu, J., Tian, H., Li, C.: State-based steganography in low bit rate speech. In: Proceedings of 20th ACM Multimedia Conference (ACM-MM2012), Nara, Japan, 29 Oct–2 Nov 2012, pp. 1109–1112 (2012)
7.
Zurück zum Zitat Chang, C.C., Chou, Y.C., Kieu, T.D.: An information hiding scheme using sudoku. In: Proceedings of 3rd International Conference on Innovative Computing Information and Control (ICICIC), Dalian, China, p. 17, June 2008 Chang, C.C., Chou, Y.C., Kieu, T.D.: An information hiding scheme using sudoku. In: Proceedings of 3rd International Conference on Innovative Computing Information and Control (ICICIC), Dalian, China, p. 17, June 2008
8.
Zurück zum Zitat Chang, C.C., Chen, Y.H., Wang, Z.H., Li, M.C.: A data embedding scheme based on a magic matrix and wet paper codes. In: Proceedings of 2009 International Conference on Computational Intelligence and Natural Computing (CINC), Wuhan, China, pp. 303–306, June 2009 Chang, C.C., Chen, Y.H., Wang, Z.H., Li, M.C.: A data embedding scheme based on a magic matrix and wet paper codes. In: Proceedings of 2009 International Conference on Computational Intelligence and Natural Computing (CINC), Wuhan, China, pp. 303–306, June 2009
9.
Zurück zum Zitat Liu, L.H., Li, M.Y., Liang, Y.: Perceptually transparent information hiding in G.729 bitstream. In: Proceedings of IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), Harbin, China, pp. 406–409 (2008) Liu, L.H., Li, M.Y., Liang, Y.: Perceptually transparent information hiding in G.729 bitstream. In: Proceedings of IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), Harbin, China, pp. 406–409 (2008)
10.
Zurück zum Zitat You, P., Ji, X., Lu, P.: Performance analysis of using G.723.1’s high-rate codes to hiding information in packed communication system. Comput. Sci. 35(5), 194–197 (2008) You, P., Ji, X., Lu, P.: Performance analysis of using G.723.1’s high-rate codes to hiding information in packed communication system. Comput. Sci. 35(5), 194–197 (2008)
11.
Zurück zum Zitat Malhotra, N.A., Tahilramani, N.: Steganography approach of weighted speech analysis with and without vector quantization using variation in weight factor. Int. J. Curr. Eng. Technol. 4(3), 1334–1336 (2014) Malhotra, N.A., Tahilramani, N.: Steganography approach of weighted speech analysis with and without vector quantization using variation in weight factor. Int. J. Curr. Eng. Technol. 4(3), 1334–1336 (2014)
12.
Zurück zum Zitat Chen, B., Wornell, G.W.: Quantization Index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)MathSciNetCrossRef Chen, B., Wornell, G.W.: Quantization Index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)MathSciNetCrossRef
13.
Zurück zum Zitat Huang, Y.F., Liu, J., Tang, S.Y., Sen, B.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)CrossRef Huang, Y.F., Liu, J., Tang, S.Y., Sen, B.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)CrossRef
14.
Zurück zum Zitat Tian, H., Liu, J., Li, S.: Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimed. Syst. 20(2), 143–154 (2014)CrossRef Tian, H., Liu, J., Li, S.: Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimed. Syst. 20(2), 143–154 (2014)CrossRef
15.
Zurück zum Zitat Zhi, J., Hai, J., Dou, Z.: An approach of steganography in G.729 bitstream based on matrix coding and interleaving. Chin. J. Electron. 24(1), 57–165 (2015) Zhi, J., Hai, J., Dou, Z.: An approach of steganography in G.729 bitstream based on matrix coding and interleaving. Chin. J. Electron. 24(1), 57–165 (2015)
16.
Zurück zum Zitat Bilal, I., Kumar, R., Roj, M.S., Mishra, P.K.: Recent advancement in audio steganography. In: International Conference on Parallel Distributed and Grid Computing, vol. 11, pp. 1945–1953. IEEE (2015) Bilal, I., Kumar, R., Roj, M.S., Mishra, P.K.: Recent advancement in audio steganography. In: International Conference on Parallel Distributed and Grid Computing, vol. 11, pp. 1945–1953. IEEE (2015)
17.
Zurück zum Zitat Sarada, P., BalaSwamy, C.: Improving image data hiding capacity scheme using sudoku puzzle in color images. Int. J. Eng. Res. App. (IJERA) 2(3), 2741–2744 (2012) Sarada, P., BalaSwamy, C.: Improving image data hiding capacity scheme using sudoku puzzle in color images. Int. J. Eng. Res. App. (IJERA) 2(3), 2741–2744 (2012)
18.
Zurück zum Zitat Maji, A.K., Pal, R.K., Roy, S.: A novel steganographic scheme using sudoku. In: Proceedings of IEEE International Conference on Electrical Information and Communication Technology (EICT), Khulna, pp. 1–6, February 2014 Maji, A.K., Pal, R.K., Roy, S.: A novel steganographic scheme using sudoku. In: Proceedings of IEEE International Conference on Electrical Information and Communication Technology (EICT), Khulna, pp. 1–6, February 2014
19.
Zurück zum Zitat Valandar, M.Y., Ayubi, P., Barani, M.J.: High secure digital image steganography based on 3D chaotic map. In: Information and Knowledge Technology. IEEE (2015) Valandar, M.Y., Ayubi, P., Barani, M.J.: High secure digital image steganography based on 3D chaotic map. In: Information and Knowledge Technology. IEEE (2015)
20.
Zurück zum Zitat Peng, X.S., Huang, Y.F., Li, F.F.: A steganography scheme in a low-bit rate speech codec based on 3D-sudoku matrix. In: 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN 2016), Beijing (2016) Peng, X.S., Huang, Y.F., Li, F.F.: A steganography scheme in a low-bit rate speech codec based on 3D-sudoku matrix. In: 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN 2016), Beijing (2016)
Metadaten
Titel
A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding
verfasst von
Zhongliang Yang
Xueshun Peng
Yongfeng Huang
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-78813-5_40

Premium Partner