1. College of Computer Science and Technology, Huaqiao University, Xiamen, Fujian 361021, China;
2. Department of Electronic Engineering, Tsinghua University, Beijing 100084, China;
3. Network Technology Center, Huaqiao University, Xiamen, Fujian 361021, China
In this paper,we first analyze the unequal impacts of various cover bits on the quality of decoded speech for parameter codecs,and further design a ranking scheme for available cover bits to utilize the cover fully.Moreover,we present an adaptive VoIP steganography based upon the performance ranking of cover bits,which can adaptively choose the optimal steganographic positions to enhance the imperceptibility of covert communications.The proposed methods are evaluated and tested with a large number of speech samples as the cover.The experimental results show that the proposed ranking scheme is sound and feasible,and the presented steganogaphic method also outperforms the existing ones.
[1] Mazurczyk W.VoIP Steganography and its detection:a survey[J].ACM Computing Survey,2013,2(46):20.
[2] Huang Y,Yuan J,Chen M,Xiao B.Key distribution over the covert communication based on VoIP[J].Chinese Journal of Electronics,2011,20(2):357-360
[3] 钟巍,孔祥维,尤新刚,王波.基于态函数的离散分数余弦倒谱变换在取证话音信息隐藏中的应用[J].电子学报,2012,40(3):595-599. Zhong W,Kong X,You X,Wang B.Forensic speech information hiding using fractional cosine-cepstrum transform[J].Acta Electronica Sinica,2012,40(3):595-599.(in Chinese)
[4] 杨婉霞,余晖,胡萍.在压缩语音编码中集成信息隐藏方法研究[J].电子学报,2014,42(7):1305-1310. Yang W,Yu H,Hu P.Research on steganographic method integrated in the compressed speech codec[J].Acta Electronica Sinica,2014,42(7):1305-1310.(in Chinese)
[5] Kratzer C,Dittmann J,Vogel T,et al.Design and evaluation of steganography for voice-over-IP[A].Proceedings of the 19th IEEE International Symposium on Circuits and Systems[C].Kos,Greece:IEEE,2006.2397-2340.
[6] Tian H,Zhou K,Jiang H,et al.An m-sequence based steganography model for voice over IP[A].Proceedings of the 44th IEEE International Conference on Communications[C].Dresden,Germany:IEEE,2009.1-5.
[7] Huang Y,Xiao B,Xiao H.Implementation of covert communication based on steganography[A].Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing[C].Harbin,China:IEEE,2008.1512-1515.
[8] Tian H,Zhou K,Jiang H,et al.Digital Logic based encoding strategies for steganography on Voice-over-IP[A].Proceedings of the 17th ACM Multimedia Conference[C].Beijing,China:ACM,2009.777-780.
[9] Tian H,Jiang H,Zhou K,et al.Adaptive partial-matching steganography for voice over IP using triple M sequences[J].Computer Communications,2011,34(18):2236-2247.
[10] Liu J,Zhou K,Tian H.Least-significant-digit steganography in low bitrate speech[A].Proceedings of the 47th IEEE International Conference on Communications[C].Ottawa,Canada:IEEE,2012.1-5.
[11] Tian H,Zhou K,Feng D.Dynamic matrix encoding strategy for voice-over-IP steganography[J].Journal of Central South University of Technology,2010,17(6):1285-1292.
[12] Tian H,Jiang H,Zhou K,et al.Transparency-orientated encoding strategies for voice-over-IP steganography[J].The Computer Journal,2012,55(6):702-716.
[13] Wu Z J,Cao H J,Li D Z.An approach of steganography in G.729 bitstream based on matrix coding and interleaving[J].Chinese Journal of Electronics,2015,24(1):157-165.
[14] Tian H,Qin J,Huang Y,et al.Optimal matrix embedding for Voice-over-IP steganography[J].Signal Processing,2015,117:33-43.
[15] ITU-T Recommendation P.862.Perceptual evaluation of speech quality (PESQ):an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs[S].2001.
[16] Su Y,Huang Y,et al.Steganography-oriented noisy resistance model of G.729a[A].Proceedings of IMACS Multi-conference on Computational Engineering in Systems Applications[C].Beijing,China:IEEE,2006.11-15.