Speech Information Hiding Algorithm Based on Complete Binary Tree Dynamic Codebook Grouping

被引:1
|
作者
Wu Zhijun [1 ]
Li Changliang [1 ]
Sha Yongpeng [1 ]
机构
[1] Civil Aviat Univ China, Sch Elect Informat & Automat, Tianjin 300300, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Speech codecs; communication system security; streaming media and network security; STEGANALYSIS; MODULATION;
D O I
10.1109/ACCESS.2019.2945050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to protect the data security and privacy of Voice over Internet Protocol (VoIP), a new algorithm for speech information hiding is proposed based on complete binary tree dynamic codebook grouping (CBTDCG). The algorithm uses the quantization index modulation (QIM) method to divide the dynamic codebook into two parts (corresponding to the embedded secret information bits '0' and '1' respectively), and adopts the complete binary tree to achieve the optimal grouping. The utility of complete binary tree makes the algorithm have the characteristics of fast search and high accuracy. The sender selects the corresponding code word according to the secret information bits for embedding the secret information into carrier speech. At the receiving end, the secret information bits are extracted according to the features of the code word vectors by the receiver. The experimental results show that the hidden capacity of the algorithm is larger than 450bps and the loss of the PESQ is less than 4%. Verification shows that the algorithm possesses a good robustness with a low bit error rate after being interfered by noise and the speech stream carrying secret information has better imperceptibility.
引用
收藏
页码:147513 / 147522
页数:10
相关论文
共 50 条
  • [1] An algorithm of binary text image authentication based on information hiding
    Gao, Baojian
    Huang, Meiru
    Wang, Jun
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 894 - 899
  • [2] A Novel Information Hiding Algorithm for Binary Images
    Jiang, Bin
    Ping, Xijan
    Zhang, Tao
    [J]. SEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III: UNLOCKING THE FULL POTENTIAL OF GLOBAL TECHNOLOGY, 2008, : 1107 - 1112
  • [3] A CELP-Speech Information Hiding Algorithm Based on Vector Quantization
    Liu, Ji-Xin
    Lu, Zhe-Ming
    Luo, Hao
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 75 - +
  • [4] Association Rule Tree Algorithm Based On Binary Information Granules
    Xu, JianFeng
    Huang, Chuanhua
    Zhao, Zhibing
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON CYBERWORLDS, 2008, : 701 - 704
  • [5] Detection of pitch modulation information hiding based on codebook correlation network
    Li, Song-Bin
    Jia, Yi-Zhen
    Fu, Jiang-Yun
    Dai, Qiong-Xing
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2014, 37 (10): : 2107 - 2117
  • [6] A Tree Based Recursive Information Hiding Scheme
    Parakh, Abhishek
    Kak, Subhash
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - ICC 2010, 2010,
  • [7] HIDING INFORMATION IN BINARY IMAGES WITH COMPLETE REVERSIBILITY AND HIGH EMBEDDING CAPACITY
    Wang, Chung-Chuan
    Hwang, Yin-Tung
    Chang, Chin-Chen
    Jan, Jinn-Ke
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (11): : 5143 - 5161
  • [8] An Hiding Algorithm of Nonzero Pulses Position Information Based on G.729 Speech Coding
    Wu Zhijun
    Guo Anxin
    Shen Dandan
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (06) : 1438 - 1445
  • [9] ABS-based speech information hiding approach
    Wu, ZJ
    Yang, W
    Yang, YX
    [J]. ELECTRONICS LETTERS, 2003, 39 (22) : 1617 - 1619
  • [10] Text information hiding based on Part of Speech grammar
    Dai Zuxu
    Hong Fan
    Yang Muxiang
    Cui Guohua
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 632 - +