Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 7080673, 11 pages
https://doi.org/10.1155/2018/7080673
Research Article

A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition

1School of Computer Science and Engineering, South China University of Technology, Guangzhou 510006, China
2School of Economics and Commerce, South China University of Technology, Guangzhou 510006, China

Correspondence should be addressed to Junhui He; nc.ude.tucs@hjeh

Received 28 September 2017; Accepted 26 December 2017; Published 13 February 2018

Academic Editor: Rémi Cogranne

Copyright © 2018 Junhui He et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3-4, pp. 313–335, 1996. View at Publisher · View at Google Scholar · View at Scopus
  2. D. Gruhl, A. Lu, and W. Bender, “Echo hiding,” in Information Hiding, R. Anderson, Ed., vol. 1174 of Lecture Notes in Computer Science, pp. 295–315, Springer Berlin Heidelberg, Berlin, Germany, 1996. View at Publisher · View at Google Scholar
  3. K. Gopalan, “Audio steganography using bit modification,” in Proceedings of the 2003 International Conference on Multimedia and Expo, ICME 2003, pp. I629–I632, USA, July 2003. View at Publisher · View at Google Scholar · View at Scopus
  4. K. Gopalan, S. Wenndt, S. Adams, and D. Haddad, “Audio steganography by amplitude or phase modification,” in Proceedings of the Security and Watermarking of Multimedia Contents V, pp. 67–76, USA, January 2003. View at Publisher · View at Google Scholar · View at Scopus
  5. D. Kirovski and H. S. Malvar, “Spread-spectrum watermarking of audio signals,” IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 1020–1033, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  6. L. Liu, M. Li, Q. Li, and Y. Liang, “Perceptually transparent information hiding in G.729 bitstream,” in Proceedings of the 2008 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing, IIH-MSP 2008, pp. 406–409, China, August 2008. View at Publisher · View at Google Scholar · View at Scopus
  7. T. Xu and Z. Yang, “Simple and effective speech steganography in G.723.1 low-rate codes,” in Proceedings of the 2009 International Conference on Wireless Communications and Signal Processing, WCSP 2009, China, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. A. Shahbazi, A. H. Rezaie, and R. Shahbazi, “MELPe coded speech hiding on enhanced full rate compressed domain,” in Proceedings of the Asia Modelling Symposium 2010: 4th International Conference on Mathematical Modelling and Computer Simulation, AMS2010, pp. 267–270, Malaysia, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. A. Nishimura, “Data hiding in pitch delay data of the adaptive multi-rate narrow-band speech codec,” in Proceedings of the IIH-MSP 2009-2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 483–486, Japan, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. B. Xiao, Y. Huang, and S. Tang, “An approach to information hiding in low bit-rate speech stream,” in Proceedings of the 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008, pp. 1940–1944, USA, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 47, no. 4, pp. 1423–1443, 2001. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. Y. F. Huang, S. Tang, and J. Yuan, “Steganography in inactive frames of VoIP streams encoded by source codec,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 296–306, 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. Y. Huang, C. Liu, S. Tang, and S. Bai, “Steganography integration into a low-bit rate speech codec,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1865–1875, 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. H. Miao, L. Huang, Z. Chen, W. Yang, and A. Al-Hawbani, “A new scheme for covert communication via 3G encoded speech,” Computers and Electrical Engineering, vol. 38, no. 6, pp. 1490–1501, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. H. Tian, J. Liu, and S. Li, “Improving security of quantization-index-modulation steganography in low bit-rate speech streams,” Multimedia Systems, vol. 20, no. 2, pp. 143–154, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. J. Liu, H. Tian, J. Lu, and Y. Chen, “Neighbor-index-division steganography based on QIM method for G.723.1 speech streams,” Journal of Ambient Intelligence and Humanized Computing, vol. 7, no. 1, pp. 139–147, 2016. View at Publisher · View at Google Scholar · View at Scopus
  17. Q. Liu, A. H. Sung, and M. Qiao, “Derivative-based audio steganalysis,” ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), vol. 7, no. 3, article no. 18, 2011. View at Publisher · View at Google Scholar · View at Scopus
  18. S. Li, Y. Jia, and C.-C. J. Kuo, “Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals,” IEEE/ACM Transactions on Audio Speech and Language Processing, vol. 25, no. 5, pp. 1011–1022, 2017. View at Publisher · View at Google Scholar · View at Scopus
  19. ITU-T, Wideband Coding of Speech at around 16 Kbps Using Adaptive Multi-rate Wideband (AMR-WB), International Telecommunication Union Std. G.722.2, 2002.
  20. Perceptual Evaluation of Speech Quality (PESQ): An Objective Method for End-to-end Speech Quality Assessment of Narrow-band Telephone Net-works and Speech Codecs, International Telecommunication Union Std. P.862, 2001.
  21. Wideband Extension to Recommendation P.862 for the Assessment of Wideband Telephone Networks and Speech Codecs, International Telecommunication Union Std. P.862.2, 2007.
  22. C. Chang and C. Lin, “LIBSVM: a Library for support vector machines,” ACM Transactions on Intelligent Systems and Technology, vol. 2, no. 3, article 27, 2011. View at Publisher · View at Google Scholar · View at Scopus