A novel steganographic method for algebraic-code-excited-linear-prediction speech streams based on fractional pitch delay search

被引:17
作者
Liu, Xiaokang [1 ]
Tian, Hui [1 ]
Huang, Yongfeng [2 ]
Lu, Jing [3 ]
机构
[1] Natl Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
[2] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
[3] Natl Huaqiao Univ, Dept Informat Syst & Management, Xiamen 361021, Peoples R China
基金
中国国家自然科学基金;
关键词
Speech steganography; Algebraic code-excited linear prediction; Pitch period prediction; VOICE;
D O I
10.1007/s11042-018-6867-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although a large number of steganography algorithms based on algebraic-code-excited-linear-prediction have been proposed, their performance, such as embedding capacity, embedding transparency and capability for resisting detection, can be further enhanced. Therefore, we are motivated to present a new steganographic scheme based on pitch delay search, which can achieve better performance by embedding secret information into the fractional pitch delay parameters while keeping the integer pitch delay parameters unchanged. Specifically, we treat all fractional pitch delays as replaceable cover bits to achieve maximum embedding capacity. Further, the steganographic process is encrypted and guided by m sequences for flexibility and security. The proposed method is evaluated with a large number of adaptive multi-rate speech samples and compared with the existing works. Experimental results show that the proposed method can provide larger embedding capacity than the existing works while achieving excellent embedding transparency. Moreover, we evaluate the performance of the proposed method for resisting the state-of-the-art steganalysis methods. The experimental results demonstrate that the proposed method is highly secure, since the state-of-the-art steganalysis methods cannot detect it efficiently.
引用
收藏
页码:8447 / 8461
页数:15
相关论文
共 31 条
[1]  
[Anonymous], MULTIMEDIA TOOLS APP
[2]  
[Anonymous], 2018, MAT SCI TECHNOL
[3]  
[Anonymous], 2009, 2009 INT C WIR COMM
[4]  
Aoki N., 2010, Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2010), P534, DOI 10.1109/IIHMSP.2010.136
[5]  
Bailey K, 2006, MULTIMED TOOLS APPL, V30, P55, DOI 10.1007/s11042-006-0008-4
[6]   LSB based non blind predictive edge adaptive image steganography [J].
Chakraborty, Soumendu ;
Jalal, Anand Singh ;
Bhatnagar, Charul .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) :7973-7987
[7]  
Chang PC, 2002, CONF REC ASILOMAR C, P1199
[8]  
Dittmann J, 2005, STEGANOGRAPHY STEGAN, P607
[9]  
Erchi Xu, 2011, Proceedings of the 2011 14th International Conference on Network-Based Information Systems (NBiS 2011), P612, DOI 10.1109/NBiS.2011.103
[10]   Implementation of covert communication based on steganography [J].
Huang Yongfeng ;
Xiao Bo ;
Xiao Honghua .
2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, :1512-1515