Abstract
In this paper, a novel AMR adaptive steganographic scheme based on pitch delay of unvoiced speech (PDU-AAS) was proposed. The existing AMR steganographic schemes based on pitch delay destroy the short-time relative stability of pitch delay of voiced speech segments and they are easier to be detected by the existing steganographic schemes. Especially, the pitch delay distribution of AMR voiced and unvoiced speech segments are analyzed in detail, and based on this characteristic that the pitch delay sequence of AMR unvoiced speech do not have short-term relative stability, we proposed an AMR adaptive steganographic scheme which selects the embedded position adaptively in the unvoiced speech segment, which is determined by the distribution characteristic of the adjacent pitch delay, and embeds the secret message by modifying the pitch delay without destroying the short-time stability of the pitch delay. The experiment results shows that the scheme has good concealment and hiding capability. Most important of all, the comparing experiment results show that the scheme has good security to resist the detection of the existing steganalysis algorithms. The principle of the scheme can be applied to the other steganographic schemes based on the pitch delay of the speech codec, such as G723.1, G.729.
Similar content being viewed by others
References
ANSI-C code for the floating-point Adaptive Multi-Rate (AMR) speech codec. http://www.3gpp.org/DynaReport/26104.htm
(2007) The CMU audio databases. http://www.speech.cs.cmu.edu/databases/
(2012) Adobe Audition CS6. http://www.adobe.com/products/audition.html
(2012) Ts 26.090: Mandatory speech codec speech processing functions; adaptive multi-rate (amr) speech codec; transcoding functions v.11.0.0
Das BK, Das A, Bhattacharjee U (2014) Detection of voiced, unvoiced and silence regions of assamese speech by using acoustic features. Int J Comput Trends Technol 14(2):43
Ekudden E, Hagen R, Johansson I, Svedberg J (1999) . In: 1999 IEEE workshop on IEEE speech coding proceedings, pp 117–119
Erçelebi E (2003) Second generation wavelet transform-based pitch period estimation and voiced/unvoiced decision for speech signals. Appl Acoust 64(1):25
Fridrich J, Kodovskỳ J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Sec 7(3):868
Geiser B, Vary P (2008) . In: IEEE international conference on IEEE acoustics, speech and signal processing, 2008. ICASSP 2008. IEEE, pp 4005–4008
He X, Liang Y, Xia M (2009) Steganalysis of speech compressed based on voicing features. J Comput Res Dev 46:173
Hess W, O’Shaughnessy D (1984) Pitch determination of speech signals: algorithms and devices. J Acoust Soc Am 76(4):1277
Huang Y, Liu C, Tang S, Bai S (2012) Steganography integration into a low-bit rate speech codec. IEEE Trans Inf Forensics Sec 7(6):1865
Janicki A (2016) Pitch-based steganography for Speex voice codec, Security and communication networks
Ker AD, Bas P, Böhme R, Cogranne R, Craver S, Filler T, Fridrich J, Pevnỳ T (2013) . In: Proceedings of the first ACM workshop on information hiding and multimedia security. ACM, pp 45–58
Li B, He J, Huang J, Shi YQ (2011) A survey on image steganography and steganalysis. J Inf Hiding Multimed Signal Process 2(2):142
Li S, Sun D, Yang J, Huang Y (2012) A steganalysis method for G.729A compressed speech stream based on codeword distribution characteristics. Acta Electronica Sinica 40(4):842
Li S, Huang Y, Lu J (2013) Detection of QIM steganography in low bit-rate speech codec based on statistical models and svm. Chin J Comput 36(6):1168
Li SB, Jia YZ, Fu JY, Dai QX (2014) Detection of pitch modulation information hiding based on codebook correlation network. Chinese Journal of Computers
Liu C, Bai S, Huang Y, Huang Y, Li S (2013) An information hiding algorithm based on pitch prediction. Comput Eng 39(2):137
Liu P, Li S, Wang H (2017) Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec. Multimed Syst 23(4):485
Miao H, Huang L, Chen Z, Yang W, Al-Hawbani A (2012) A new scheme for covert communication via 3G encoded speech. Comput Electr Eng 38(6):1490
Liu P, Li S, Wang H (2016) Steganography integrated into linear predictive coding for low bit-rate speech codec. Multimedia Tools and Applications, pp 1–23
Miao H, Huang L, Shen Y, Lu X, Chen Z (2014) Steganalysis of compressed speech based on Markov and Entropy. Lect Notes Comput Sci 8389:63
Nishimura A (2009) . In: IIH-MSP’09. Fifth International conference on intelligent information hiding and multimedia signal processing, 2009. IEEE, pp 483–486
Ren Y, Cai T, Tang M, Wang L (2015) AMR steganalysis based on the probability of same pulse position. IEEE Transactions on Information Forensics and Security 10(9):1
Ren Y, Yang J, Wang J, Wang L (2017) Amr steganalysis based on second-order difference of pitch delay. IEEE Transactions on Information Forensics and Security 12(6):1345
Rix AW, Beerends JG, Hollier MP, Hekstra AP (2001) . In: IEEE international conference on acoustics speech, and signal processing, 200, pp 749–752
Shi YQ, Chen C, Chen W (2006) . In: Information hiding. Springer, pp 249–264
Tahilramani NV, Bhatt N (2015) . In: 2015 international conference on electrical, electronics, signals, communication and optimization (EESCO). IEEE, pp 1–4
Tian H, Wu Y, Huang Y, Liu J, Chen Y, Wang T, Cai Y (2015) . In: 2015 10th international conference on availability reliability and security (ARES). IEEE, pp 455–460
Tian H, Wu Y, Chang C, Huang Y, Liu J, Wang T, Chen Y, Cai Y (2016) Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics, Security and communication networks
Wei Z, Zhao B, Liu B, Su J, Xu L, Xu E (2014) A novel steganography approach for voice over IP. J Ambient Intell Humanized Comput 5(4):601
Wu Z, Yang W, Yang Y (2003) ABS-Based speech information hiding approach. Electron Lett 39(22):1617
Xiao B, Huang Y, Tang S (2008) . In: IEEE GLOBECOM 2008, Global telecommunications conference, 2008. IEEE, pp 1–5
Yan S, Tang G, Sun Y (2015) Steganography for low bit-rate speech based on pitch period prediction, Application research of computers
Yan S, Tang G, Chen Y (2015) Incorporating data hiding into G.729 speech codec. Multimedia Tools and Applications, pp 1–20
Yu C, Huang L, Yang W, Chen Z, Miao H (2012) A 3G speech data hiding method based on pitch period. J Chin Comput Syst 33(7):1445
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This work is supported by the Natural Science Foundation of China (NSFC) under the grant NO. U1536114, NO. 61872275, NO.U1536204, and China Scholarship Council.
Rights and permissions
About this article
Cite this article
Ren, Y., Liu, D., Yang, J. et al. An AMR adaptive steganographic scheme based on the pitch delay of unvoiced speech. Multimed Tools Appl 78, 8091–8111 (2019). https://doi.org/10.1007/s11042-018-6600-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6600-6