Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Chen, Qing, Zhang, Wei and Huang, Yongfeng (2016) Universal steganography model for low bit-rate speech codec. Security and Communication Networks, 9 (8). pp. 747-754. ISSN 1939-0114
Preview |
PDF
R2_Universal Steganography Model.pdf - Accepted Version Download (330kB) | Preview |
Abstract
Low bit-rate speech codec offers so many advantages over other codecs that it has become increasingly popular in audio communications such as mobile and VoIP (Voice over Internet Protocol) communications, and thus researching steganography in low bit-rate speech codec is of important significance. In this study, we proposed a universal VoIP steganography model for low bit-rate speech codec that uses the PESQ deterioration rate and the decoding error to automatically choose a data embedding algorithm for each VoIP bitstream, which enables ones to achieve covert communications using a low bit-rate speech codec efficiently and securely. Since no or little attention has been paid to steganography in iSAC (Internet Speech Audio Codec), it was chosen as the test codec to verify the effectiveness, security, and practicability of the proposed steganography model. The experimental results show that, with the proposed steganography model, it achieved the average PESQ deterioration rate of 4.04% (less than 5%, indicating strong imperceptibility) and a high data hiding capacity up to 12 bits/frame (400 bits/second, three times larger than other methods), and the proposed steganography model could effectively resist the latest steganalysis.
Item Type: | Article |
---|---|
Identifier: | 10.1002/sec.1183 |
Additional Information: | © 2015 John Wiley & Sons, Ltd. This is the accepted version of the following article: Tang, S., Chen, Q., Zhang, W., and Huang, Y. (2016) Universal steganography model for low bit-rate speech codec. Security Comm. Networks, 9: 747–754., which has been published in final form at https://doi.org/10.1002/sec.1183. |
Subjects: | Computing > Information security > Cyber security Computing > Information security |
Depositing User: | Shanyu Tang |
Date Deposited: | 25 Sep 2017 22:57 |
Last Modified: | 06 Feb 2024 15:54 |
URI: | https://repository.uwl.ac.uk/id/eprint/3930 |
Downloads
Downloads per month over past year
Actions (login required)
View Item |