interrelation between these attributes. This is while
inaudibility is always guaranteed, if no statistical
restrictions are imposed on the pseudo-random
sequences employed to generate unvoiced bands.
6 CONCLUSIONS
In this paper, we have introduced a novel method for
hiding data in a cover voice file that can yield a high
data embedding rate. In this method, an encrypted
covert message is embedded in the unvoiced bands
of speech signal, encoded by an MBE-based coding
system, which leads to a high data hiding capacity of
tens of kbps in a typical digital voice file
transmission scheme. By using this method, it is
possible to embed even a larger than the host covert
message within the cover signal. The method also
provides an unsuspicious environment for data
hiding strategies, e.g. steganography, due to keeping
the statistical properties of the cover speech almost
unchanged. However, the ultimate chance for an
attack to the system to detect the message will
remain the same as that in a cipher system used to
encrypt a secret message.
REFERENCES
Agaian, S.S., Akopian, D., Caglayan, O., D'Souza, S.A.,
2005. Lossless Adaptive Digital Audio
Steganography. Thirty-Ninth Asilomar Conference on
Signals, Systems and Computers, October 28 -
November 1, On page(s): 903- 906.
Ansari, R., Malik, H., Khokhar, A., 2004. Data-hiding in
audio using frequency-selective phase alteration.
International Conference on Acoustics, Speech, and
Signal Processing (ICASSP '04), 17-21 May, vol.5 on
page(s): V- 389-92.
Beker, H., and Piper, F., 1982. Cipher Systems: The
Protection of Communications, John Wiley & Sons.
Bender, W., Gruhl, D., Morimoto, N., Lu, A., 1996.
Techniques for data hiding. IBM system Journal,
vol.35,nr. 3/4.
Chang, P.C., Yu, H.M., 2002. Dither-like data hiding in
multistage vector quantization of MELP and G.729
speech coding. Thirty-Sixth Asilomar Conference on
Signals, Systems and Computers, 3-6 November,
Volume 2, Page(s):1199 – 1203.
Chiu, K.M., Ching, P.C., 1994. A dual-band excitation
LSP codec for very low bit rate transmission.
International Symposium on Speech, Image
Processing and Neural Networks, 13-16 April, vol.2
on page(s): 479-482.
Chu, W. C., 2003. Speech Coding Algorithms: Foundation
and Evolution of Standardized Coders, John Wiley &
Sons.
Gopalan, K., 2005. Audio steganography by cepstrum
modification. (ICASSP ‘05) Volume 5, 18-23 March,
v/484 Vol. Page(s):v/481.
Gopalan, K., Wenndt, S., 2006. Audio Steganography for
Covert Data Transmission by Imperceptible Tone
Insertion. IASTED Con.f. Comm. Systems and
Applications Banff, Alberta, Canada July 3-5.
Griffin, D.W., Lim, J.S., 1988. Multi-band excitation
vocoder. IEEE Trans. ASSP, 36(8); August, 664-678.
Heys, H.M., 2001. An Analysis of the Statistical Self-
Synchronization of Stream Ciphers. Proceedings of
INFOCOM, Anchorage, Alaska, Apri,, pp. 897-904.
ITU 1996. Coding of Speech at 8 kbit/s Using Conjugate-
Structure Algebraic-Code-Excited Linear-Prediction
(CS-ACELP)—ITU-T Recommendation G.729.
Kharrazi, M., Sencar, H.T., Memon, N., 2004. Image
Steganography: Concepts and Practice. April 22,
WSPC/Lecture Note Series.
http://www.ims.nus.edu.sg/preprints/2004-25.pdf.
Kondoz, A.M., 1994. Digital Speech: coding for Low Bit
Rate Communications Systems, John Wiley & Sons.
Mansour, M.F., Tewfik, A.H., 2001. time-scale invariant
audio data embedding. IEEE International conference
on Multimedia and Expo, ICME, Japan, August.
Matsuoka H., 2006. Spread Spectrum Audio
Steganography Using Sub-band Phase Shifting.
Intelligent Information Hiding and Multimedia Signal
Processing, IIH-MSP '06. on Dec, Page(s):3 – 6.
McCree, A.V., Supplee, L.M., Cohn, R.P., Collura, J.S.,
1997. MELP: The New Federal Standard at 2400 bps.
IEEE ICASSP, pp. 1591–1594.
Sencar, H., Ramkumar, M., Akansu, A., 2004. Data
Hiding Fundamentals and Applications: Content
Security in Digital Multimedia, ELSIVIER
ACADEMIC PRESS.
SIGMAP 2007 - International Conference on Signal Processing and Multimedia Applications
296