Citation: | Zhijun WU, Changliang LI, Rong LI. Speech Information Hiding Method Based on Random Position Selection and Matrix Coding[J]. Journal of Electronics & Information Technology, 2020, 42(2): 355-363. doi: 10.11999/JEIT181163 |
For the low-rate speech encoding problem, an information hidden algorithm based on the G.723.1 coding standard is proposed. In the pitch prediction coding process, by controlling the search range of the closed-loop pitch period (adaptive codebook), combined with the Random Position Selection (RPS) method and the Matrix Coding Method (MCM), the secret information is embedded, which is implemented in the speech coding process. The adoption of the RPS method reduces the correlation between the carrier code-words, and the adoption of the MCM method reduces the rate of change of the carrier. The experimental results show that the average PESQ (Perceptual Evaluation of Speech Quality) deterioration rate under the algorithm is 1.63%, and the concealment is good.
PETITCOLAS F A P, ANDERSON R J, and KUHN M G. Information hiding - a survey[J]. The IEEE, 1999, 87(7): 1062–1078. doi: 10.1109/5.771065
|
丁琦, 平西建. 基于脉冲位置参数统计特征的压缩域语音隐写分析[J]. 计算机科学, 2011, 38(1): 217–220. doi: 10.3969/j.issn.1002-137X.2011.01.051
DING Qi and PING Xijian. Steganalysis of compressed speech based on statistics of pulse position parameters[J]. Computer Science, 2011, 38(1): 217–220. doi: 10.3969/j.issn.1002-137X.2011.01.051
|
DITTMANN J, HESSE D, and HILLERT R. Steganography and steganalysis in voice-over IP scenarios: Operational aspects and first experiences with a new steganalysis tool set[J]. SPIE, 2005, 5681: 607–618.
|
TIAN Hui, SUN Jun, CHANG C C, et al. Detecting bitrate modulation-based covert voice-over-IP communication[J]. IEEE Communications Letters, 2018, 22(6): 1196–1199. doi: 10.1109/LCOMM.2018.2822804
|
TIAN Hui, SUN Jun, CHANG C C, et al. Hiding information into voice-over-IP streams using adaptive bitrate modulation[J]. IEEE Communications Letters, 2017, 21(4): 749–752. doi: 10.1109/LCOMM.2017.2659718
|
XIAO Bo, HUANG Yongfeng, and TANG Shanyu. An approach to information hiding in low bit-rate speech stream[C]. 2008 IEEE Global Telecommunications Conference, New Orleans, USA, 2008: 1–5.
|
TIAN Hui, LIU Jin, and LI Songbin. Improving security of quantization-index-modulation steganography in low bit-rate speech streams[J]. Multimedia Systems, 2014, 20(2): 143–154. doi: 10.1007/s00530-013-0302-8
|
CHIANG Y K, TSAI P, and HUANG Fenglong. Codebook partition based steganography without member restriction[J]. Fundamenta Informaticae, 2008, 82(1/2): 15–27.
|
LI Songbin, JIA Yizhen, and KUO C C J. Steganalysis of QIM steganography in low-bit-rate speech signals[J]. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 2017, 25(5): 1011–1022. doi: 10.1109/TASLP.2017.2676356
|
HUANG Yongfeng, LIU Chenghao, TANG Shanyu, et al. Steganography integration into a low-bit rate speech codec[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(6): 1865–1875. doi: 10.1109/TIFS.2012.2218599
|
LIU C, BAI S, and HUANG Y. An information hiding algorithm in G. 729a based on pith prediction[C]. The 10th National Academic Conference on Information Hiding and Multimedia Information Security, Beijing, China, 2012: 15–18.
|
LIN Zinan, HUANG Yongfeng, and WANG Jilong. RNN-SM: Fast steganalysis of VoIP streams using recurrent neural network[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7): 1854–1868. doi: 10.1109/TIFS.2018.2806741
|
YANG Wanxia, TANG Shanyu, LI Miaoqi, et al. Steganalysis of low embedding rates LSB speech based on histogram moments in frequency domain[J]. Chinese Journal of Electronics, 2107, 26(6): 1254–1260. doi: 10.1049/cje.2017.09.026
|
WU Zhijun, Gao Wei, and YANG Wei. LPC parameters substitution for speech information hiding[J]. The Journal of China Universities of Posts and Telecommunications, 2009, 16(6): 103–112. doi: 10.1016/S1005-8885(08)60295-2
|
HUANG Yongfeng, TANG Shanyu, and YUAN Jian. Steganography in inactive frames of VoIP streams encoded by source codec[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(2): 296–307. doi: 10.1109/TIFS.2011.2108649
|
李松斌, 贾已真, 付江云, 等. 基于码书关联网络的基音调制信息隐藏检测[J]. 计算机学报, 2014, 37(10): 2107–2117. doi: 10.3724/SP.J.1016.2014.02107
LI Songbin, JIA Yizhen, FU Jiangyun, et al. Detection of pitch modulation information hiding based on codebook correlation network[J]. Chinese Journal of Computers, 2014, 37(10): 2107–2117. doi: 10.3724/SP.J.1016.2014.02107
|
TIAN Hui, JIANG Hong, ZHOU Ke, et al. Transparency-orientated encoding strategies for voice-over-IP steganography[J]. The Computer Journal, 2012, 55(6): 702–716. doi: 10.1093/comjnl/bxr111
|
WESTFELD A. F5-A steganographic algorithm: High capacity despite better steganalysis[C]. The 4th International Workshop on Information Hiding, Pittsburgh, USA, 2001: 289–302.
|
ITU-T. ITU-T P.862 Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs[S]. Geneva, Switzerland: International Telecommunications Union, 2001.
|