Highly Transparent Steganography Scheme of Speech Signals into Color Images Using Quantization Index Modulation
详细信息    查看全文
  • 关键词:Steganography ; Discrete wavelet transform ; Quantization index modulation ; Imperceptibility
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2016
  • 出版时间:2016
  • 年:2016
  • 卷:9703
  • 期:1
  • 页码:241-250
  • 全文大小:3,220 KB
  • 参考文献:1.Ballesteros L, D.M., Renza, D., Rincon, R.: Gray-scale images within color images using similarity histogram-based selection and replacement algorithm. J. Inf. Hiding Multimed. Sig. Process. 6(6), 1156–1166 (2015)
    2.Benesty, J., Chen, J., Huang, Y., Cohen, I.: Pearson correlation coefficient. Noise Reduction in Speech Processing. Springer Topics in Signal Processing, vol. 2, pp. 1–4. Springer, Heidelberg (2009)
    3.Bhattacharyya, D., Dutta, P., Balitanas, M.O., Kim, T., Das, P.: Hiding data in audio signal. In: Chang, C.-C., Vasilakos, T., Das, P., Kim, T., Kang, B.-H., Khurram Khan, M. (eds.) ACN 2010. CCIS, vol. 77, pp. 23–29. Springer, Heidelberg (2010)CrossRef
    4.Chen, B., Wornell, G.W.: Quantization index modulation methods for digital watermarking and information embedding of multimedia. J. VLSI Signal Process. Syst. Signal Image video Technol. 27(1–2), 7–33 (2001)CrossRef MATH
    5.Delforouzi, A., Pooyan, M.: Adaptive digital audio steganography based on integer wavelet transform. Circuits Syst. Signal Process. 27(2), 247–259 (2008)MathSciNet CrossRef
    6.Hemalatha, S., Acharya, U.D., Renuka, A.: Wavelet transform based steganography technique to hide audio signals in image. Procedia Comput. Sci. 47, 272–281 (2015)CrossRef
    7.Hopper, N.J., Langford, J., von Ahn, L.: Provably secure steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 77–92. Springer, Heidelberg (2002)CrossRef
    8.Jero, S.E., Ramu, P., Ramakrishnan, S.: Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission. J. Med. Syst. 38(10), 1–11 (2014)
    9.Li, S.B., Tao, H.Z., Huang, Y.F.: Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. SCIENCE C 13(8), 624–634 (2012)CrossRef
    10.Mallat, S.G.: A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans. Pattern Anal. Mach. Intell. 11(7), 674–693 (1989)CrossRef MATH
    11.Marvel, L.M.: Information hiding: steganography and watermarking. In: Javidi, B. (ed.) Optical and Digital Techniques for Information Security. Advanced Sciences and Technologies for Security Applications, pp. 113–133. Springer, New York (2005)CrossRef
    12.Phadikar, A.: Multibit quantization index modulation: A high-rate robust data-hiding method. J. King Saud Univ. Comput. Inf. Sci. 25(2), 163–171 (2013)
    13.Rekik, S., Guerchi, D., Selouani, S.A., Hamam, H.: Speech steganography using wavelet and fourier transforms. EURASIP J. Audio Speech Music Process. 2012(1), 1–14 (2012)CrossRef
    14.Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)CrossRef
  • 作者单位:Diego Renza (18)
    Dora M. Ballesteros L. (18)
    Jeisson Sanchez (18)

    18. Universidad Militar Nueva Granada, Bogotá, Colombia
  • 丛书名:Pattern Recognition
  • ISBN:978-3-319-39393-3
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
  • 卷排序:9703
文摘
A highly transparent steganography scheme of speech signals into color images based on Quantization Index Modulation (QIM) is presented in this paper. The proposed method takes advantage of the low distortion in the host image introduced by the scalar quantization of its wavelet coefficients. The stego image is highly similar to the host image, and the secret content is imperceptible. The secret message is recovered at the receiver with high correlation to the original speech signal. For the purpose of increasing the security of the system, an external mask is used to encrypt the secret content before the embedding process. Several tests were carried out in order to quantify the influence of the size of the quantizer (delta) on the quality of the recovered secret content and the transparency of the stego image.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700