由于AMR(adaptive multimedia rate)语音在无线通信及移动互联网中的广泛应用,基于AMR压缩域的隐写算法已经逐渐出现.现有隐写算法具有明显的统计分布特性,因此其无法抵抗后继出现的多种隐写分析算法的检测.为了提高隐蔽性和统计安全性,本文提出了一种针对AMR固定码本(FCB,fixed codebook)的自适应隐写算法(简称为AFAS算法).基于AMR固定码本最优搜索原理和非零脉冲位置相关性,设计了嵌入代价函数和加性失真函数,并结合STC编码(syndrome-trellis codes)实现了AFAS算法.在12.2kb/s编码模式下,AFAS算法隐写后载密语音质量的PESQ(perceptual evaluation of speech quality)值较现有算法提高约8%;在抗隐写分析的能力方面,其平均检测错误率(TER)较现有隐写算法提高约10%.对比实验结果表明,AFAS算法较现有算法具有更好的听觉隐蔽性和统计安全性
References
[1]
XIA Z,WANG X,SUN X,et al.Steganalysis of least significant bit matching using multi-order differences[J].Security and Communication Networks,2014,7(8):1283-1291.DOI:10.1002/sec.864.
[2]
BESSETTE B,SALAMI R,LEFEBVRE R,et al.The adaptive multi-rate wideband speech codec(AMRWB)[J].IEEE Transactions on Speech and Audio Processing,2002,10(8):620-636.DOI:10.1109/tsa.2002.804299.
[3]
XIAO B,HUANG Y,TANG S.An approach to information hiding in low bit-rate speech stream[C]//IEEE Global Telecommunications Conference.New York:IEEE Press,2008:1-5.DOI:10.1109/glocom.2008.ecp.375.
[4]
刘程浩,柏森,黄永峰,等.一种基于基音预测的信息隐藏算法[J].计算机工程,2013,39(2):137-140.DOI:10.3969/j.issn.1000-3428.2013.02.027.LIU C H,BAI S,HUANG Y F,et al.An information hiding algorithm based on pitch prediction[J].Computer Engineering,2013,39(2):137-140.DOI:10.3969/j.issn.1000-3428.2013.02.027(Ch).
[5]
李松斌,孙东红,袁键,等.一种基于码字分布特性G.729A压缩语音流隐写分析方法[J].电子学报,2012,40(4):842-846.DOI:10.3969/j.issn.0372-2112.2012.04.036.LI S B,SUN D H,YUAN J,et al.A steganalysis method for G.729Acompressed speech stream based on codeword distribution characteristics[J].Acta Electronica Sinica,2012,40(4):842-846.DOI:10.3969/j.issn.0372-2112.2012.04.036(Ch).
[6]
ZHANG W,ZHANG Z,ZHANG L,et al.Decomposing Joint Distortion for Adaptive Steganography[DB/OL].[2016-04-01].http://staff.ustc.edu.cn/~zhangwm/Paper/2016_13.pdf.
[7]
HOLUB V,FRIDRICH J.Designing steganographic distortion using directional filters[C]//Information Forensics and Security(WIFS).New York:IEEE Press,2012:234-239.DOI:10.1109/WIFS.2012.6412655.
[8]
HOLUB V,FRIDRICH J.Digital image steganography using universal distortion[C]//Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security.New York:ACM,2013:59-68.DOI:10.1145/2482513.2482514.
[9]
GEISER B,VARY P.High Rate Data Hiding in ACELP Speech Codecs[C/OL].[2016-06-05].http://ieeexplore.ieee.org/document/4518532/.
[10]
DING Q,PING X J.Steganalysis of compressed speech based on histogram features[C]//Wireless Communications Networking and Mobile Computing(WiCOM)of the 6th IEEE.New York:IEEE Press.2010:1-4.DOI:10.1109/WICOM.2010.5600125.
[11]
MIAO H B,HUANG L S,SHEN Y,et al.Steganalysis of compressed speech based on Markov and entropy[C]//International Workshop on Digital Watermarking.Berlin Heidelberg:Springer-verlag,2013:63-76.DOI:10.1007/978-3-662-43886-2_5.
[12]
REN Y Z,CAI T T,TANG M,et al.AMR steganalysis based on the probability of same pulse position[J].IEEE Transactions on Information Forensics and Security,2015,10(9):1801-1811.DOI:10.1109/TIFS.2015.2421322.
[13]
PEVNY T,FILLER T,BAS P.Using high-dimensional image models to perform highly undetectable steganography[C]//International Workshop on Information Hiding(LNCS 6387).Berlin Heidelberg:Springer,2010:161-177.DOI:10.1007/978-3-642-16435-4_13.
[14]
LIU P,LI S B,WANG H Q.Steganography in vector quantization process of linear predictive coding for low-bitrate speech codec[J/OL].[2016-05-23].https://link.springer.com/article/10.1007/s00530-015-0500-7.
[15]
NISHIMURA A.Data hiding in pitch delay data of the adaptive multi-rate narrow-band speech codec[C]//Intelligent Information Hiding and Multimedia Signal Processing of the 5th IEEE.New York:IEEE,2009:483-486.DOI:10.1109/IIH-MSP.2009.83.
[16]
余迟,黄刘生,杨威,等.一种针对基音周期的3G信息隐藏方法[J].小型微型计算机系统,2012,33(7):1445-1449.DOI:10.3969/j.issn.1000-1220.2012.07.011.YU C,HUANG L S,YANG W,et al.A 3Gspeech data hiding method based on pitch period[J].Journal of Chinese Computer Systems,2012,33(7):1445-1449.DOI:10.3969/j.issn.1000-1220.2012.07.011(Ch).
[17]
BURNS E M,VIEMEISTER N F.Played-again SAM:Further observations on the pitch of amplitudemodulated noise[J].The Journal of the Acoustical Society of America,1981,70(6):1655-1660.DOI:10.1121/1.387220.
[18]
WANG C Y,WU Q.Information Hiding in RealTime VoIP Streams[C/OL].[2016-5-30].http://jozjan.s.cnl.sk/dwl/voip/Remote%20Publications/Information%20 Hiding%20in%20Real-Time%20VoIP%20Streams.pdf.
[19]
AHITAKER J M,KER A D.Steganalysis of Overlapping Images[C/OL].[2016-05-05].http://www.cs.ox.ac.uk/andrew.ker/docs/ADK64B.pdf.
[20]
WANG K,ZHAO H,WANG H X.Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value[J].IEEE Transactions on Information Forensics and Security,2014,9(5):741-751.DOI:10.1109/tifs.2014.2308633.
[21]
PAULIN C,SELOUANI S A,HERVET E.Audio steganalysis using deep belief networks[J].International Journal of Speech Technology,2016,19(3):585-591.DOI:10.1007/s10772-016-9352-6.
[22]
MIAO H,HUANG L,CHEN Z,et al.A new scheme for covert communication via 3G encoded speech[J].Computers&Electrical Engineering,2012,38(6):1490-1501.DOI:10.1016/j.compeleceng.2012.05.003.
[23]
RIX A W,BEERENDS J G,HOLLIER M P,et al.Perceptual evaluation of speech quality(PESQ)—A new method for speech quality assessment of telephone networks and codecs[C]//Acoustics,Speech,and Signal Processing of IEEE International Conference.New York:IEEE Press,2001,2:749-752.DOI:10.1109/ICASSP.2001.941023.
[24]
PETITCOLAS F A P,ROSS J,ANDERSON R J,et al.Information Hiding Survey—A Survey[J/OL].[2016-03-10].http://gray-world.net/it/papers/petitcolas99information.pdf.
[25]
SEDIGHI V,COGRANNE R,FRIDRICH J.Content-adaptive steganography by minimizing statistical detectability[J].IEEE Transactions on Information Forensics and Security,2016,11(2):221-234.DOI:10.1109/TIFS.2015.2486744.
[26]
WILSON A,KER A D.Avoiding Detection on Twitter:Embedding Strategies for Linguistic Steganography[J/OL].[2016-03-13].http://www.cs.ox.ac.uk/andrew.ker/docs/ADK68B.pdf.
[27]
SADEK M M,KHALIFA A S,MOSTAFA G M.Video steganography:A comprehensive review[J].Multimedia Tools and Applications,2015,74(17):7063-7094.DOI:10.1007/s11042-014-1952-z.
[28]
BILAL I,KUMAR R,ROJ M S,et al.Recent advancement in audio steganography[C]//Distributed and Grid Computing(PDGC).New York:IEEE Press,2014:402-405.DOI:10.1109/pdgc.2014.7030779.
[29]
DENEMARK T,BOROUMAND M,FRIDRICH J.Steganalysis features for content-adaptive JPEG steganography[J].IEEE Transactions on Information Forensics and Security,2016,11(8):1736-1746.DOI:10.1109/tifs.2016.2555281.
[30]
LIU P,LI S B,WANG H Q.Steganography integrated into linear predictive coding for low bit-rate speech codec[J].Multimedia Tools and Applications,2017,76(2):2837-2859.DOI:10.1007/s11042-016-3257-x.
[31]
FILLER T,JUDAS J,FRIDRICH J.Minimizing Embedding Impact in Steganography Using Trellis-Coded Quantization[C/OL].[2016-05-20].http://pdfs.semanticscholar.org/9c2d/eded0418cbc0dadc0964be40bb681f02daeb.pdf.