Professional Documents
Culture Documents
ABSTRACT
This paper presents the technique of embedding data in
an audio signal by inserting low power tones and its
robustness to noise and cropping of embedded speech
samples. Experiments on the embedding procedure applied
to cover audio utterances from noise-free TIMIT database
and a noisy database demonstrate the feasibility of the
technique in terms of imperceptible embedding, high data
rate and accurate data recovery. The low power levels
ensure that the tones are inaudible in the message-embedded
stego signal. Besides imperceptibility in hearing, the
spectrogram of the stego signal also conceals the existence
of embedded information. Both of these features render the
detection of embedding in the stego signal difficult to
accomplish. Oblivious detection of the stego signal, instead
of escrow detection, yields the embedded information
accurately. In addition, results of two cases of attacks on the
data-embedded stego audio, namely, additive noise and
random cropping, show the technique is robust for covert
communication and steganography.
Keywords: Audio Steganography, Imperceptible
insertion
tone
1. INTRODUCTION
Covert communication by embedding a message or data
file in a cover medium has been increasingly gaining
importance in the all-encompassing field of information
technology.
Audio steganography is concerned with
embedding information in an innocuous cover speech in a
secure and robust manner.
Communication and
transmission security and robustness are essential for
transmitting vital information to intended sources while
denying access to unauthorized persons. By hiding the
information using a cover or host audio as a wrapper, the
existence of the information is concealed during
transmission. This is critical in applications such as
battlefield communications and bank transactions, for
example. FRAME = CUADRO
Segment to 16 ms
frames
Compute frame
power, fe
Information
to embed
Embed 0
N
o
Power of f1 0.25% of fe
Power of f0 0.001 of f1
Y
Power of f0 0.25% of fe
Power of f1 0.001 of f0
Quantize
to 16 bits
3. EXPERIMENTAL RESULTS
Transmit
Frame
Figs. 2 and 3 show the host and the stego signals and
their spectrograms using the frequency-hopped four-tone
insertion for embedding the covert message. No perceptual
or otherwise detectible difference was noticed between the
host and the stego signals and all the embedded data were
correctly recovered from the stego signal.
4
4
2
0
-2
0.2
0.4
0.6
10
0.8
1.2
1.4
1.6
1.8
2
5
x 10
Stego - 2 bits/frame
x 10
5
0
-5
0.2
0.4
0.6
0.8
1
1.2
Sample index
Host - TIMIT
Frequency
8000
6000
4000
2000
0
10
10
Stego - 2 bits/frame
8000
Time
12
6000
4000
2000
0
Time
12
Host - TIMIT
x 10
Frequency
1.4
1.6
1.8
2
5
x 10
Host - GF
x 10
10
9
4
x 10
Stego - 2 bits/frame
x 10
5
0
-5
4
5
Sample index
Frequency
3000
2000
1000
0
4000
9
Time
Stego - 2 bits/frame
3000
2000
1000
0
8
9
Time
-2
Host - GF
4000
Frequency
9
4
x 10
REFERENCES
[1] W. Bender, D. Gruhl, N. Morimoto and A.Lu,
Techniques for data hiding, IBM Systems Journal, Vol.
35, Nos. 3 & 4, pp. 313-336, 1996.
[2] M.D. Swanson, M. Kobayashi, and A.H. Tewfik,
Multimedia data-embedding and watermarking
technologies, Proc. IEEE, Vol. 86, pp. 1064-1087, June
1998.
[3] K. Gopalan, S. Wenndt, A. Noga, D. Haddad, and S.
Adams, Covert Speech Communication Via Cover
Speech By Tone Insertion, Proc. of the 2003 IEEE
Aerospace Conference, Big Sky, MT, Mar. 2003 (on
CD).
[4] K. Gopalan, et al, Covert Speech Communication Via
Cover Speech By Tone Insertion, U.S. Patent applied
for, Oct. 2003.
[5] R.J. Anderson and F.A.P. Petitcolas, On the limits of
steganography, IEEE J. Selected Areas in
Communications, Vol. 16, No. 4, pp.474-481, May 1998.