IDEAS home Printed from https://ideas.repec.org/a/igg/jitwe0/v10y2015i3p46-63.html
   My bibliography  Save this article

A High-Capacity Covering Code for Voice-Over-IP Steganography

Author

Listed:
  • Hui Tian

    (National Huaqiao University, Xiamen, China)

  • Jie Qin

    (National Huaqiao University, Xiamen, China)

  • Yongfeng Huang

    (Tsinghua University, Beijing, China)

  • Xu An Wang

    (Engineering University of CAPF, Xian, China)

  • Jin Liu

    (National Huaqiao University, Xiamen, China)

  • Yonghong Chen

    (National Huaqiao University, Xiamen, China)

  • Tian Wang

    (National Huaqiao University, Xiamen, China)

  • Yiqiao Cai

    (National Huaqiao University, Xiamen, China)

Abstract

Although steganographic transparency and embedding capacity are considered to be two conflicting objectives in the design of steganographic systems, it is possible and necessary to strike a good balance between them in Voice-over-IP steganography. In this paper, to improve steganographic transparency while maintaining relatively large embedding capacity, the authors present a (2n-1, 2n) covering code, which can hide 2n-1 bits of secret messages into 2n bits of cover messages with not more than n-bit changed. Specifically, each (2n-1)-bit secret message is first transformed into two 2n-bit candidate codewords. In embedding process, the cover message is replaced with the optimal codeword more similar with it. In this way, the embedding distortion can be largely reduced. The proposed method is evaluated by comparing with existing ones with a large number of ITU-T G.729a encoded speech samples. The experimental results show that the authors' scheme can provide good performance on both steganographic transparency and embedding capacity, and achieve better balance between the two objectives than the existing ones.

Suggested Citation

  • Hui Tian & Jie Qin & Yongfeng Huang & Xu An Wang & Jin Liu & Yonghong Chen & Tian Wang & Yiqiao Cai, 2015. "A High-Capacity Covering Code for Voice-Over-IP Steganography," International Journal of Information Technology and Web Engineering (IJITWE), IGI Global, vol. 10(3), pages 46-63, July.
  • Handle: RePEc:igg:jitwe0:v:10:y:2015:i:3:p:46-63
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJITWE.2015070104
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jitwe0:v:10:y:2015:i:3:p:46-63. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.