Universal steganography model for low bit-rate speech codec

Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Chen, Qing, Zhang, Wei and Huang, Yongfeng (2016) Universal steganography model for low bit-rate speech codec. Security and Communication Networks, 9 (8). pp. 747-754. ISSN 1939-0114

[thumbnail of R2_Universal Steganography Model.pdf]
R2_Universal Steganography Model.pdf - Accepted Version

Download (330kB) | Preview


Low bit-rate speech codec offers so many advantages over other codecs that it has become increasingly popular in audio communications such as mobile and VoIP (Voice over Internet Protocol) communications, and thus researching steganography in low bit-rate speech codec is of important significance. In this study, we proposed a universal VoIP steganography model for low bit-rate speech codec that uses the PESQ deterioration rate and the decoding error to automatically choose a data embedding algorithm for each VoIP bitstream, which enables ones to achieve covert communications using a low bit-rate speech codec efficiently and securely. Since no or little attention has been paid to steganography in iSAC (Internet Speech Audio Codec), it was chosen as the test codec to verify the effectiveness, security, and practicability of the proposed steganography model. The experimental results show that, with the proposed steganography model, it achieved the average PESQ deterioration rate of 4.04% (less than 5%, indicating strong imperceptibility) and a high data hiding capacity up to 12 bits/frame (400 bits/second, three times larger than other methods), and the proposed steganography model could effectively resist the latest steganalysis.

Item Type: Article
Identifier: 10.1002/sec.1183
Additional Information: © 2015 John Wiley & Sons, Ltd. This is the accepted version of the following article: Tang, S., Chen, Q., Zhang, W., and Huang, Y. (2016) Universal steganography model for low bit-rate speech codec. Security Comm. Networks, 9: 747–754., which has been published in final form at https://doi.org/10.1002/sec.1183.
Subjects: Computing > Information security > Cyber security
Computing > Information security
Depositing User: Shanyu Tang
Date Deposited: 25 Sep 2017 22:57
Last Modified: 06 Feb 2024 15:54
URI: https://repository.uwl.ac.uk/id/eprint/3930


Downloads per month over past year

Actions (login required)

View Item View Item