Abstract:VoIP (Voice over Internet Protocol) is based on voice stream, which has the advantages of large data transmission and wide application. But the VoIP system is confronted with the security threats of data security and privacy disclosure. Thus, according to nonergodicity and redundancy of the fixed codebook search, an information hiding algorithm based on fixed codebook search process is proposed. This information hiding algorithm is carried out by a functional relationship between the nonzero pulse positions and secret information. The idea of least significant pulse replacement is used in the search process and a distortion minimization criterion is proposed to control the distortion of speech quality caused by the embedding of secret information. The experimental results show that the hiding capacity of the proposed algorithm is up to 400 bit/s and the average PESQ score is 3.45 which indicate that the algorithm has good imperceptibility.
吴志军,郭安心,沈丹丹. 基于G.729语音编码非零脉冲位置信息的隐藏算法[J]. 电子与信息学报, 2018, 40(6): 1438-1445.
WU Zhijun, GUO Anxin, SHEN Dandan. An Hiding Algorithm of Nonzero Pulses Position Information Based on G.729 Speech Coding. JEIT, 2018, 40(6): 1438-1445.
ZHOU Wenbo, ZHANG Weiming, and YU Nenghai. A new rule for cost reassignment in adaptive steganography[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(11): 2654-2667. doi: 10.1109/TIFS.2017.2718480.
[2]
REN Yanzhen, YANG Jing, WANG Jinwei, et al. AMR steganalysis based on second-order difference of pitch delay[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(6): 1345-1357. doi: 10.1109/TIFS.2016.2636087.
[3]
TIAN Hui, SUN Jun, CHANG Chinchen, et al. Hiding information into voice-over-IP streams using adaptive bitrate modulation[J]. IEEE Communications Letters, 2017, 21(4): 749-752. doi: 10.1109/LCOMM.2017.2659718.
[4]
WU Zhijun, GAO Wei, and YANG Wei. LPC parameters substitution for speech information hiding[J]. The Journal of China Universities of Posts and Telecommunications, 2009, 16(6): 103-112. doi: 10.1016/S1005-8885(08)60295-2.
[5]
WU Zhijun, CAO Haijuan, and LI Douzhe. An approach of steganography in G.729 bitstream based on matrix coding and interleaving[J]. Chinese Journal of Electronics, 2015, 24(1): 157-165. doi: 10.1049/cje.2015.01.026.
[6]
PENG Xueshun, HUANG Yongfeng, and LI Fufang. A steganography scheme in a low-bit rate speech codec based on 3D-sudoku matrix[C]. 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN), Beijing, China, 2016: 13-18.
[7]
XIAO Bo, HUANG Yongfeng, and TANG Shanyu. An approach to information hiding in low bit-rate speech stream[C]. 2008 IEEE Global Telecommunications Conference, New Orleans, USA, 2008: 1-5.
[8]
HUANG Yongfeng, TANG Shanyu, and YUAN Jian. Steganography in inactive frames of VoIP streams encoded by source codec[J]. IEEE Transactions on Information Forensics & Security, 2011, 6(2): 296-306. doi: 10.1109/TIFS.2011. 2108649.
MIAO Haibo. Research on covert channel based on streaming midea[D]. [Ph.D. dissertation], University of Science and Technology of China, 2014: 46-53.
[10]
LIU Lihua, LI Mingyu, LI Qiong, et al. Perceptually transparent information hiding in G.729 bitstream[C]. 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008: 406-409.
LI Songbin, SUN Donghong, YUAN Jian, et al. A steganalysis method for G.729A compressed speech stream based on codeword distribution characteristics[J]. Acta Electronica Sinica, 2013, 40(4): 842-846. doi: 10.3969/j.issn. 0372-2112.2012.04.036.
YANG Wanxia, YU Hui, and HU Ping. Research on steganographic method integrated in the compressed speech codec[J]. Acta Electronica Sinica, 2014, 42(7): 1305-1310. doi: 10.3969/j.issn.0372-2112.2014.07.010.
BAI Jian and CAO Peng. Capacity estimation research for speech information hiding[J]. Journal of Beijing University of Posts and Telecommunications, 2016, 39(S1): 76-80. doi: 10.13190/j.jbupt.2016.s.018.
DING Qi and PING Xijian. Steganalysis of compressed speech based on statistics of pulse position parameters[J]. Computer Science, 2011, 38(1): 217-220.
[15]
DJEBBAR F and AYAD B. A new steganalysis method to detect information hiding in speech[C]. 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 2017: 1879-1884.
WU Qiuling and WU Meng. Novel audio information hiding algorithm based on wavelet transform[J]. Journal of Electronics & Information Technology, 2016, 38(4): 834-840. doi: 10.11999/JEIT150856.