Advanced Search
Volume 40 Issue 6
May  2018
Turn off MathJax
Article Contents
WU Zhijun, GUO Anxin, SHEN Dandan. An Hiding Algorithm of Nonzero Pulses Position Information Based on G.729 Speech Coding[J]. Journal of Electronics & Information Technology, 2018, 40(6): 1438-1445. doi: 10.11999/JEIT170879
Citation: WU Zhijun, GUO Anxin, SHEN Dandan. An Hiding Algorithm of Nonzero Pulses Position Information Based on G.729 Speech Coding[J]. Journal of Electronics & Information Technology, 2018, 40(6): 1438-1445. doi: 10.11999/JEIT170879

An Hiding Algorithm of Nonzero Pulses Position Information Based on G.729 Speech Coding

doi: 10.11999/JEIT170879
Funds:

The National Natural Science Foundation of China and the China Civil Aviation Authority Joint Fund Project (U1533107), The Key Project of Tianjin Natural Science Foundation (17JCZDJC30900)

  • Received Date: 2017-09-18
  • Rev Recd Date: 2018-03-15
  • Publish Date: 2018-06-19
  • VoIP (Voice over Internet Protocol) is based on voice stream, which has the advantages of large data transmission and wide application. But the VoIP system is confronted with the security threats of data security and privacy disclosure. Thus, according to nonergodicity and redundancy of the fixed codebook search, an information hiding algorithm based on fixed codebook search process is proposed. This information hiding algorithm is carried out by a functional relationship between the nonzero pulse positions and secret information. The idea of least significant pulse replacement is used in the search process and a distortion minimization criterion is proposed to control the distortion of speech quality caused by the embedding of secret information. The experimental results show that the hiding capacity of the proposed algorithm is up to 400 bit/s and the average PESQ score is 3.45 which indicate that the algorithm has good imperceptibility.
  • loading
  • ZHOU Wenbo, ZHANG Weiming, and YU Nenghai. A new rule for cost reassignment in adaptive steganography[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(11): 2654-2667. doi: 10.1109/TIFS.2017.2718480.
    REN Yanzhen, YANG Jing, WANG Jinwei, et al. AMR steganalysis based on second-order difference of pitch delay[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(6): 1345-1357. doi: 10.1109/TIFS.2016.2636087.
    TIAN Hui, SUN Jun, CHANG Chinchen, et al. Hiding information into voice-over-IP streams using adaptive bitrate modulation[J]. IEEE Communications Letters, 2017, 21(4): 749-752. doi: 10.1109/LCOMM.2017.2659718.
    WU Zhijun, GAO Wei, and YANG Wei. LPC parameters substitution for speech information hiding[J]. The Journal of China Universities of Posts and Telecommunications, 2009, 16(6): 103-112. doi: 10.1016/S1005-8885(08)60295-2.
    WU Zhijun, CAO Haijuan, and LI Douzhe. An approach of steganography in G.729 bitstream based on matrix coding and interleaving[J]. Chinese Journal of Electronics, 2015, 24(1): 157-165. doi: 10.1049/cje.2015.01.026.
    PENG Xueshun, HUANG Yongfeng, and LI Fufang. A steganography scheme in a low-bit rate speech codec based on 3D-sudoku matrix[C]. 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN), Beijing, China, 2016: 13-18.
    XIAO Bo, HUANG Yongfeng, and TANG Shanyu. An approach to information hiding in low bit-rate speech stream[C]. 2008 IEEE Global Telecommunications Conference, New Orleans, USA, 2008: 1-5.
    HUANG Yongfeng, TANG Shanyu, and YUAN Jian. Steganography in inactive frames of VoIP streams encoded by source codec[J]. IEEE Transactions on Information Forensics Security, 2011, 6(2): 296-306. doi: 10.1109/TIFS.2011. 2108649.
    缪海波. 基于流媒体的网络隐信道研究[D]. [博士论文], 中国科学技术大学, 2014: 46-53.
    MIAO Haibo. Research on covert channel based on streaming midea[D]. [Ph.D. dissertation], University of Science and Technology of China, 2014: 46-53.
    LIU Lihua, LI Mingyu, LI Qiong, et al. Perceptually transparent information hiding in G.729 bitstream[C]. 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008: 406-409.
    李松斌, 孙东红, 袁键, 等. 一种基于码字分布特性的G.729A压缩语音流隐写分析方法[J]. 电子学报, 2012, 40(4): 842-846. doi: 10.3969/j.issn.0372-2112.2012.04.036.
    LI Songbin, SUN Donghong, YUAN Jian, et al. A steganalysis method for G.729A compressed speech stream based on codeword distribution characteristics[J]. Acta Electronica Sinica, 2013, 40(4): 842-846. doi: 10.3969/j.issn. 0372-2112.2012.04.036.
    杨婉霞, 余晖, 胡萍. 在压缩语音编码中集成信息隐藏方法研究[J]. 电子学报, 2014, 42(7): 1305-1310. doi: 10.3969/j.issn. 0372-2112.2014.07.010.
    YANG Wanxia, YU Hui, and HU Ping. Research on steganographic method integrated in the compressed speech codec[J]. Acta Electronica Sinica, 2014, 42(7): 1305-1310. doi: 10.3969/j.issn.0372-2112.2014.07.010.
    白剑, 曹鹏. 语音信息隐藏容量研究[J]. 北京邮电大学学报, 2016, 39(S1): 76-80. doi: 10.13190/j.jbupt.2016.s.018.
    BAI Jian and CAO Peng. Capacity estimation research for speech information hiding[J]. Journal of Beijing University of Posts and Telecommunications, 2016, 39(S1): 76-80. doi: 10.13190/j.jbupt.2016.s.018.
    丁琦, 平西建. 基于脉冲位置参数统计特征的压缩域语音隐写分析[J]. 计算机科学, 2011, 38(1): 217-220.
    DING Qi and PING Xijian. Steganalysis of compressed speech based on statistics of pulse position parameters[J]. Computer Science, 2011, 38(1): 217-220.
    DJEBBAR F and AYAD B. A new steganalysis method to detect information hiding in speech[C]. 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 2017: 1879-1884.
    吴秋玲, 吴蒙. 基于小波变换的语音信息隐藏新方法[J]. 电子与信息学报, 2016, 38(4): 834-840. doi: 10.11999/JEIT 150856.
    WU Qiuling and WU Meng. Novel audio information hiding algorithm based on wavelet transform[J]. Journal of Electronics Information Technology, 2016, 38(4): 834-840. doi: 10.11999/JEIT150856.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1327) PDF downloads(111) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return