Skip to main content
Log in

An AMR adaptive steganographic scheme based on the pitch delay of unvoiced speech

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a novel AMR adaptive steganographic scheme based on pitch delay of unvoiced speech (PDU-AAS) was proposed. The existing AMR steganographic schemes based on pitch delay destroy the short-time relative stability of pitch delay of voiced speech segments and they are easier to be detected by the existing steganographic schemes. Especially, the pitch delay distribution of AMR voiced and unvoiced speech segments are analyzed in detail, and based on this characteristic that the pitch delay sequence of AMR unvoiced speech do not have short-term relative stability, we proposed an AMR adaptive steganographic scheme which selects the embedded position adaptively in the unvoiced speech segment, which is determined by the distribution characteristic of the adjacent pitch delay, and embeds the secret message by modifying the pitch delay without destroying the short-time stability of the pitch delay. The experiment results shows that the scheme has good concealment and hiding capability. Most important of all, the comparing experiment results show that the scheme has good security to resist the detection of the existing steganalysis algorithms. The principle of the scheme can be applied to the other steganographic schemes based on the pitch delay of the speech codec, such as G723.1, G.729.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. ANSI-C code for the floating-point Adaptive Multi-Rate (AMR) speech codec. http://www.3gpp.org/DynaReport/26104.htm

  2. (2007) The CMU audio databases. http://www.speech.cs.cmu.edu/databases/

  3. (2012) Adobe Audition CS6. http://www.adobe.com/products/audition.html

  4. (2012) Ts 26.090: Mandatory speech codec speech processing functions; adaptive multi-rate (amr) speech codec; transcoding functions v.11.0.0

  5. Das BK, Das A, Bhattacharjee U (2014) Detection of voiced, unvoiced and silence regions of assamese speech by using acoustic features. Int J Comput Trends Technol 14(2):43

    Article  Google Scholar 

  6. Ekudden E, Hagen R, Johansson I, Svedberg J (1999) . In: 1999 IEEE workshop on IEEE speech coding proceedings, pp 117–119

  7. Erçelebi E (2003) Second generation wavelet transform-based pitch period estimation and voiced/unvoiced decision for speech signals. Appl Acoust 64(1):25

    Article  Google Scholar 

  8. Fridrich J, Kodovskỳ J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Sec 7(3):868

    Article  Google Scholar 

  9. Geiser B, Vary P (2008) . In: IEEE international conference on IEEE acoustics, speech and signal processing, 2008. ICASSP 2008. IEEE, pp 4005–4008

  10. He X, Liang Y, Xia M (2009) Steganalysis of speech compressed based on voicing features. J Comput Res Dev 46:173

    Google Scholar 

  11. Hess W, O’Shaughnessy D (1984) Pitch determination of speech signals: algorithms and devices. J Acoust Soc Am 76(4):1277

    Article  Google Scholar 

  12. Huang Y, Liu C, Tang S, Bai S (2012) Steganography integration into a low-bit rate speech codec. IEEE Trans Inf Forensics Sec 7(6):1865

    Article  Google Scholar 

  13. Janicki A (2016) Pitch-based steganography for Speex voice codec, Security and communication networks

  14. Ker AD, Bas P, Böhme R, Cogranne R, Craver S, Filler T, Fridrich J, Pevnỳ T (2013) . In: Proceedings of the first ACM workshop on information hiding and multimedia security. ACM, pp 45–58

  15. Li B, He J, Huang J, Shi YQ (2011) A survey on image steganography and steganalysis. J Inf Hiding Multimed Signal Process 2(2):142

    Google Scholar 

  16. Li S, Sun D, Yang J, Huang Y (2012) A steganalysis method for G.729A compressed speech stream based on codeword distribution characteristics. Acta Electronica Sinica 40(4):842

    Google Scholar 

  17. Li S, Huang Y, Lu J (2013) Detection of QIM steganography in low bit-rate speech codec based on statistical models and svm. Chin J Comput 36(6):1168

    Article  MathSciNet  Google Scholar 

  18. Li SB, Jia YZ, Fu JY, Dai QX (2014) Detection of pitch modulation information hiding based on codebook correlation network. Chinese Journal of Computers

  19. Liu C, Bai S, Huang Y, Huang Y, Li S (2013) An information hiding algorithm based on pitch prediction. Comput Eng 39(2):137

    Article  Google Scholar 

  20. Liu P, Li S, Wang H (2017) Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec. Multimed Syst 23(4):485

    Article  Google Scholar 

  21. Miao H, Huang L, Chen Z, Yang W, Al-Hawbani A (2012) A new scheme for covert communication via 3G encoded speech. Comput Electr Eng 38(6):1490

    Article  Google Scholar 

  22. Liu P, Li S, Wang H (2016) Steganography integrated into linear predictive coding for low bit-rate speech codec. Multimedia Tools and Applications, pp 1–23

  23. Miao H, Huang L, Shen Y, Lu X, Chen Z (2014) Steganalysis of compressed speech based on Markov and Entropy. Lect Notes Comput Sci 8389:63

    Article  Google Scholar 

  24. Nishimura A (2009) . In: IIH-MSP’09. Fifth International conference on intelligent information hiding and multimedia signal processing, 2009. IEEE, pp 483–486

  25. Ren Y, Cai T, Tang M, Wang L (2015) AMR steganalysis based on the probability of same pulse position. IEEE Transactions on Information Forensics and Security 10(9):1

    Article  Google Scholar 

  26. Ren Y, Yang J, Wang J, Wang L (2017) Amr steganalysis based on second-order difference of pitch delay. IEEE Transactions on Information Forensics and Security 12(6):1345

    Article  Google Scholar 

  27. Rix AW, Beerends JG, Hollier MP, Hekstra AP (2001) . In: IEEE international conference on acoustics speech, and signal processing, 200, pp 749–752

  28. Shi YQ, Chen C, Chen W (2006) . In: Information hiding. Springer, pp 249–264

  29. Tahilramani NV, Bhatt N (2015) . In: 2015 international conference on electrical, electronics, signals, communication and optimization (EESCO). IEEE, pp 1–4

  30. Tian H, Wu Y, Huang Y, Liu J, Chen Y, Wang T, Cai Y (2015) . In: 2015 10th international conference on availability reliability and security (ARES). IEEE, pp 455–460

  31. Tian H, Wu Y, Chang C, Huang Y, Liu J, Wang T, Chen Y, Cai Y (2016) Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics, Security and communication networks

  32. Wei Z, Zhao B, Liu B, Su J, Xu L, Xu E (2014) A novel steganography approach for voice over IP. J Ambient Intell Humanized Comput 5(4):601

    Article  Google Scholar 

  33. Wu Z, Yang W, Yang Y (2003) ABS-Based speech information hiding approach. Electron Lett 39(22):1617

    Article  Google Scholar 

  34. Xiao B, Huang Y, Tang S (2008) . In: IEEE GLOBECOM 2008, Global telecommunications conference, 2008. IEEE, pp 1–5

  35. Yan S, Tang G, Sun Y (2015) Steganography for low bit-rate speech based on pitch period prediction, Application research of computers

  36. Yan S, Tang G, Chen Y (2015) Incorporating data hiding into G.729 speech codec. Multimedia Tools and Applications, pp 1–20

  37. Yu C, Huang L, Yang W, Chen Z, Miao H (2012) A 3G speech data hiding method based on pitch period. J Chin Comput Syst 33(7):1445

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanzhen Ren.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This work is supported by the Natural Science Foundation of China (NSFC) under the grant NO. U1536114, NO. 61872275, NO.U1536204, and China Scholarship Council.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ren, Y., Liu, D., Yang, J. et al. An AMR adaptive steganographic scheme based on the pitch delay of unvoiced speech. Multimed Tools Appl 78, 8091–8111 (2019). https://doi.org/10.1007/s11042-018-6600-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6600-6

Keywords

Navigation