Advertisement

Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding

  • Weiqi LuoEmail author
  • Yue Zhang
  • Haodong Li
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10431)

Abstract

Most existing audio steganographic methods embed secret messages according to a pseudorandom number generator, thus some auditory sensitive parts in cover audio, such as mute or near-mute segments, will be contaminated, which would lead to poor perceptual quality and may introduce some detectable artifacts for steganalysis. In this paper, we propose a novel adaptive audio steganography in the time domain based on the advanced audio coding (AAC) and the Syndrome-Trellis coding (STC). The proposed method firstly compresses a given wave signal into AAC compressed file with a high bitrate, and then obtains a residual signal by comparing the signal before and after AAC compression. According to the quantity and sign of the residual signal, \(\pm 1\) embedding costs are assigned to the audio samples. Finally, the STC is used to create the stego audio. The extensive results evaluated on 10,000 music and 10,000 speech audio clips have shown that our method can significantly outperform the conventional \(\pm 1\) LSB based steganography in terms of security and audio quality.

Keywords

Adaptive steganography Advanced Audio Coding (AAC) Syndrome-Trellis Codes (STC) 

Notes

Acknowledgments

This work is supported in part by the NSFC (61672551), the Fok Ying-Tong Education Foundation (142003), the special research plan of Guangdong Province (2015TQ01X365), and the Guangzhou science and technology project (201707010167)

References

  1. 1.
    Damodaram, A., Sridevi, R., Narasimham, S.V.L.: Efficient method of audio steganography by modified LSB algorithm and strong encryption key with enhanced security. J. Theor. Appl. Inf. Technol. 5, 768–771 (2009)Google Scholar
  2. 2.
    Shirali-Shahreza, S., Manzuri-Shalmani, M.T.: High capacity error free wavelet domain speech steganography. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1729–1732 (2008)Google Scholar
  3. 3.
    Delforouzi, A., Pooyan, M.: Adaptive digital audio steganography based on integer wavelet transform. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, vol. 2, 283–286 (2007)Google Scholar
  4. 4.
    Rekik, S., Guerchi, D., Selouani, S., Hamam, H.: Speech steganography using wavelet and fourier transforms. EURASIP J. Audio Speech Music Process. 2012(1), 20:1–20:14 (2012)CrossRefGoogle Scholar
  5. 5.
    Ahani, S., Ghaemmaghami, S., Wang, Z.J.: A sparse representation-based wavelet domain speech steganography method. IEEE/ACM Trans. Audio Speech Lang. Process. 23(1), 80–91 (2015)Google Scholar
  6. 6.
    Adams, S.F., Gopalan, K., Wenndt, S.J., Haddad, D.M.: Audio steganography by amplitude or phase modification. In: Proceedings of SPIE - The International Society for Optical Engineering, vol. 5020, pp. 67–76 (2003)Google Scholar
  7. 7.
    Shirali-Shahreza, S., Shirali-Shahreza, M.: Steganography in silence intervals of speech. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 605–607 (2008)Google Scholar
  8. 8.
    Djebbar, F., Ayad, B., Meraim, K.A., Hamam, H.: Comparative study of digital audio steganography techniques. EURASIP J. Audio Speech and Music Process. 2012(1), 25:1–25:16 (2012)CrossRefGoogle Scholar
  9. 9.
    Luo, W., Li, H., Yan, Q., Yang, R., Huang, J.: Improved steganalytic feature and its applications in audio forensics. Technical report, Guangzhou, ER. China (2016)Google Scholar
  10. 10.
    Fridrich, J., Kodovský, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)CrossRefGoogle Scholar
  11. 11.
    Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: IEEE International Workshop on Information Forensics and Security, pp. 234–239 (2012)Google Scholar
  12. 12.
    Filler, T., Fridrich, J.: Gibbs construction in steganography. IEEE Trans. Inf. Forensics Secur. 5(4), 705–720 (2010)CrossRefGoogle Scholar
  13. 13.
    Painter, T., Spanias, A.: Perceptual coding of digital audio. Proc. IEEE 88(4), 451–515 (2000)CrossRefGoogle Scholar
  14. 14.
    Liu, Q., Sung, A.H., Qiao, M.: Temporal derivative-based spectrum and Mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forensics Secur. 4(3), 359–368 (2009)CrossRefGoogle Scholar
  15. 15.
    Liu, Q., Sung, A.H., Qiao, M.: Derivative-based audio steganalysis. ACM Trans. Multimedia Comput. Commun. Appl. 7(3), 18:1–18:19 (2011)CrossRefGoogle Scholar
  16. 16.
    Kodovský, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2012)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Guangdong Key Laboratory of Information Security and TechnologyGuangzhouPeople’s Republic of China
  2. 2.School of Data and Computer ScienceSun Yat-sen UniversityGuangzhouPeople’s Republic of China

Personalised recommendations