Int J Performability Eng ›› 2020, Vol. 16 ›› Issue (5): 784-791.doi: 10.23940/ijpe.20.05.p12.784791

• Orginal Article • Previous Articles     Next Articles

A Steganography Method for G.729a Speech Coding

Fufang Lia, Binbin Lia, Liangchen Liua, Yuanyong Fenga*,  and Lingxi Pengb   

  1. aSchool of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, 510006, China
    bSchool of Mechanical and Electrical Engineering, Guangzhou University, Guangzhou, 510006, China
  • Submitted on ; Revised on ; Accepted on
  • Contact: Yuanyong Feng
  • About author:Fufang Li is an associate professor in the School of Computer Science and Cyber Engineering at Guangzhou University. His research interests include computer networks, algebraic codebook, network and information security, information hiding, distributed systems, cloud computing, wireless sensor network, information processing, artificial intelligence, and machine learning.
    Binbin Li and Liangchen Liu are graduate students in the School of Computer Science and Cyber Engineering at Guangzhou University. Their research interests include network and information security, information hiding in audio and images, and applications of information technology.
    Yuanyong Feng is a lecturer in the School of Computer Science and Cyber Engineering at Guangzhou University. His research interests include machine learning and natural language processing (mainly on sentimental analysis), information hiding, information extraction, named entity recognition, and coreference resolution.
    Lingxi Peng is a professor in the School of Mechanical and Electrical Engineering at Guangzhou University. His research interests include database theory and applications, artificial intelligence, network security, artificial intelligence, information hiding, and distributed systems.
  • Supported by:
    This work has been financed in part by the Natural Science Foundation of China (No. 61472092, 11271097 and 61977018) and Guangdong Provincial Science and Technology Plan Fund (No. 2013B010401037). We would also like to thank our colleagues in the School of Computer Science & Cyber Engineering at Guangzhou University.

Abstract:

By analyzing and comparing the G.729a speech coding specifications, this paper proposes an effective information hiding method. The proposed method hides the transmitted confidential information bits according to the need of the hiding information to adjust the last bit value of the excitation pulse position coding in G.729a speech coding, thereby realizing the embedding of secret information. We discussed and introduced in detail the information embedding and extraction algorithm of the proposed information hiding method. In order to test the feasibility and efficiency of the method studied, we conducted simulation experiments. The experiment used six kinds of audio material clips that we recorded, cut and edited by ourselves, namely children's male voice, children's female voice, male singing voice, female singing voice, Chinese classical music, and western music. Experiments show that when the secret information transmission rate is 200 bit/s and the hiding rate is 2.5%, the percentage of PESQ value reduction of the voice carrier proposed by the information hiding method proposed in this paper is 5.31%. While the secret information transmission rate is 300 bit/s and the hiding rate is 3.75%, the percentage of PESQ value reduction is 7.95%. The experimental results showed that the algorithm discussed in this paper has a sound covert communication capacity and strong concealment, indicating that the proposed algorithm demonstrates good information hiding performance.

Key words: G.729A speech codec, information hiding, PESQ, algebraic codebook