Steganography integration into a low-bit rate speech codec

Huang, Yongfeng, Liu, Chenghao, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Bai, Sen (2012) Steganography integration into a low-bit rate speech codec. IEEE Transactions on Information Forensics and Security, 7 (6). pp. 1865-1875. ISSN 1556-6013

[thumbnail of Steganography Integration into a low-bit rate speech codec.pdf]
Preview
PDF
Steganography Integration into a low-bit rate speech codec.pdf - Accepted Version

Download (391kB) | Preview

Abstract

Low bit-rate speech codecs have been widely used in audio communications like VoIP and mobile communications, so that steganography in low bit-rate audio streams would have broad applications in practice. In this paper, the authors propose a new algorithm for steganography in low bit-rate VoIP audio streams by integrating information hiding into the process of speech encoding. The proposed algorithm performs data embedding while pitch period prediction is conducted during low bit-rate speech encoding, thus maintaining synchronization between information hiding and speech encoding. The steganography algorithm can achieve high quality of speech and prevent detection of steganalysis, but also has great compatibility with a standard low bit-rate speech codec without causing further delay by data embedding and extraction. Testing shows, with the proposed algorithm, the data embedding rate of the secret message can attain 4 bits / frame (133.3 bits / second).

Item Type: Article
Identifier: 10.1109/TIFS.2012.2218599
Additional Information: © 2012 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Keywords: G.723.1, information hiding, low bit-rate speech codec, pitch period prediction, VoIP.
Subjects: Computing > Information security > Cyber security
Computing > Information security
Depositing User: Shanyu Tang
Date Deposited: 26 Sep 2017 10:48
Last Modified: 06 Feb 2024 15:54
URI: https://repository.uwl.ac.uk/id/eprint/3932

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu