WU Zhijun, CAO Haijuan, LI Douzhe. An Approach of Steganography in G.729 Bitstream Based on Matrix Coding and Interleaving[J]. Chinese Journal of Electronics, 2015, 24(1): 157-165.
Citation: WU Zhijun, CAO Haijuan, LI Douzhe. An Approach of Steganography in G.729 Bitstream Based on Matrix Coding and Interleaving[J]. Chinese Journal of Electronics, 2015, 24(1): 157-165.

An Approach of Steganography in G.729 Bitstream Based on Matrix Coding and Interleaving

Funds:  This work is supported by the National Natural Science Foundation of China (No.61170328, No.U1333116), Key Project of Tianjin Natural Science Foundation (No.12JCZDJC20900), Civil Aviation Science and Technology Innovation Fund (No.MHRD20130217), Fundamental Research Funds for the Central Universities of CAUC (No.3122013P007, No.3122013D007, No.3122013D003), and Research Laboratory Construction Funds of CAUC in 2014-2016.
  • Received Date: 2013-06-01
  • Rev Recd Date: 2014-06-01
  • Publish Date: 2015-01-10
  • This paper proposes an approach of secure communication through the Internet based on the technology of speech information hiding. In this approach, the algorithm of embedding a 2.4Kbps low-bit-rate Mix-excitation linear prediction (MELP) speech into G.729 coding speech is presented by adapting the techniques of covering code and the interleaving. The parameters in G.729 source codec are analyzed in the Capability of noise tolerance (CNT) and selected to carry secret speech data because these parameters have less impact on the quality of being reconstructed speech. Experiment results show that the proposed steganography algorithm not only gained a high data embedding rate up to 2.4Kbps but also achieved better imperceptibility, which indicates that the algorithm can be used for high data embedding capacity hiding and can achieve good effect.
  • loading
  • Rui MIAO and Yongfeng HUANG, "An approach of covert communication based on the adaptive steganography scheme on voice over IP", Proceedings in IEEE International Conference on Communications, pp.1-5, 2011.
    Hui TIAN, "Study on cover communication based on streaming media", PhD thesis, Huazhong University of Science and Technology, 2010. (in Chinese)
    S. Zander, G. Armitage and P. Branch, "Covert channels and countermeasures in computer network protocol", IEEE Communication Magazine, 45(12): 136-142, 2007.
    S.H. Sellke, C. Wang, S. Bagchi and N. Shroff, "TCP/IP timing channels: Theory to implementation", Proceedings of the 28th IEEE International Conference on Computer Communications, Rio de Janeiro, Brazil, pp.2204-2212, 2009.
    W. Mazurczyk and J. Lubacz, "LACK-A VoIP Steganographic Method", Springer’s Telecommunication Systems Journal, Vol.45, No.2-3, pp.153-163, 2010.
    W. Mazurczyk and J. Lubacz, "Steganography of VoIP streams", Proceedings of the 3rd International Symposium on Information Security, Monterrey, Mexico, Vol.abs/0805.2, pp.1001-1018, 2008.
    Hatada Mitsuhiro, Sakai Toshiyuki, Komatsu Naohisa and Yamazaki Yasushil, "A study on digital watermarking based on process of speech production", Information Processing Society of Japan, Special Interest Group notes, No.43, 37-42, 2002.
    Zhijun WU and Wei YANG, "Speech Information Hiding in G.729", Chinese Journal of Electronics, Vol.15, No.3, pp.545- 549, 2006.
    Yamin SU, Yongfeng HUANG and Xing LI, "Steganographyoriented noisy resistance model of G.729a", IMACS Multiconference on Computational Engineering in Systems Applications, Beijing, China, pp.11-15, 2006.
    N. Aoki, "A technique of lossless steganography for G.711 telephony speech", Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, WashingtonDC, USA: IEEE Computer Society, pp.608-611, 2008.
    B. Xiao, Y. Huang, S. Tang, "An approach to information hiding in low bit-rate speech stream", Proceedings of the 2008 IEEE Global Telecommunications Conference, New Orleans, LA, USA, pp.1-5, 2008.
    Yimin CHENG, Zhichuan GUO, Chunhui XIE, Yuming XIE, "Covert communication method based on GSM for low-bit-rate speech", Journal of Circuits and Systems, Vol.13, No.2, pp.83- 88, 2008.
    Hui TIAN, Ke ZHOU, Hong JIANG and Dan FENG, "Adaptive partial-matching steganography for voice over IP using triple M sequence", Computer Communications, Vol.34, No.18, pp.2236-2247, 2011.
    Hui Tian, Ke Zhou and Dan Feng, "Dynamic matrix encoding strategy for voice-over-IP steganography", Journal of Central South University of Technology, Vol.17, No.6, pp.1285-1292, 2010.
    Pao-Chi Chang, Hsin-Min Yu, "Dither-like data hiding in multistage vector quantization of MELP and G.729 speech coding", Signals, Systems and Computers, 2002. Conference Record of the Thirty-Sixth Asilomar Conference on Vol.2, pp.1199-1203, 2002.
    Yongfeng HUANG, Shanyu TANG and Jian YUAN, "Steganography in inactive frame of VoIP streams encoded by source codec", IEEE Transaction on Information Forensics and Security, Vol.6, No.2, pp.296-306, 2011.
    Y. Huang, S. Tang, C. Bao and Y.J. Yip, "Steganalysis of compressed speech to detect covert voice over internet protocol channels", IET Information Security, Vol1.5, Iss.1, pp.26-32, 2011.
    ITU-T Recommendation G.729 (01/07): 1997, G.729: Coding of speech at 8 kbit/s using conjugate-structure algebraic-codeexcited linear prediction (CS-ACELP).
    Hae Y Yang, Kyunng H Lee and Sang H Lee, "Method and apparatus for partially encrypting speech packets", United States Patent Publication, Pub. No. US 2009/0041231 A1, 2009.
    FadiAlmasalha, AshfaqKhokhar, Afshan Amin and Shahab- Baqai, "Scalable security of streaming multimedia contents", The 2nd IEEE workshop on Wireless and Internet Services, Zurich, Switzerland, pp.977-981, 2009.
    A. Westfeld, "F5-A steganographic algorithm", Proceedings of the 4th International Workshop on Information Hding, Vol.3137 of Lecture Notes in Computer Science, pp.289-302, 2001.
    J. Fridrich and D. Soukal, "Matrix embedding for large payloads", IEEE Transactions on Information Security and Forensics, Vol.1, No.3, pp.390-395, 2006.
    M. Khatirinejad and P. Lisonek, "Linear codes for high payload steganography", Discrete Applied Mathematics, Vol.157, No.5, pp.971-981, 2009.
    Qi Ding and Xijian Ping, "Steganalysis of compressed speech based on statistics of pulse position parameters", Computer Science, Vol.38, No.1, pp.217-220, 2011.
    ITU P.862: 2005, ITU recommendation for calculating telephone call quality using the Perceptual evaluation of speech quality (PESQ) method.
    Lihua Liu, Mingyu Li, Qiong Li and Yan liang, "Perceptually transparent information hiding in G.729 bitstream", Proc. 2008 4th Int. Conf. Intelligent Inf. Hiding Multimedia Signal Process. (IIH-MSP), Harbin, pp.406-409, 2008.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (202) PDF downloads(1082) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return