Jie Qin, H. Tian, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai, Xu An Wang
{"title":"基于随机二值矩阵的高效VoIP隐写","authors":"Jie Qin, H. Tian, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai, Xu An Wang","doi":"10.1109/3PGCIC.2015.65","DOIUrl":null,"url":null,"abstract":"To reduce the distortion while maintaining relatively large embedding capacity, a steganographic scheme based on random binary matrix is presented in this paper. We first design a 3×4 covering code, which can hide 3 bits of secret messages into 4 bits of cover messages with not more than 2-bit changed. Further, we construct a random binary matrix with cover bits at diagonal lines for steganography, and conceal secret messages into each four cover bits encrypted with the other binary bits of their rows or columns using the above 3×4 covering code. The proposed scheme is evaluated with a large number of G.711 encode speech samples. The experimental results show that our scheme can provide good performance on both steganographic transparency and embedding capacity.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"An Efficient VoIP Steganography Based on Random Binary Matrix\",\"authors\":\"Jie Qin, H. Tian, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai, Xu An Wang\",\"doi\":\"10.1109/3PGCIC.2015.65\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To reduce the distortion while maintaining relatively large embedding capacity, a steganographic scheme based on random binary matrix is presented in this paper. We first design a 3×4 covering code, which can hide 3 bits of secret messages into 4 bits of cover messages with not more than 2-bit changed. Further, we construct a random binary matrix with cover bits at diagonal lines for steganography, and conceal secret messages into each four cover bits encrypted with the other binary bits of their rows or columns using the above 3×4 covering code. The proposed scheme is evaluated with a large number of G.711 encode speech samples. The experimental results show that our scheme can provide good performance on both steganographic transparency and embedding capacity.\",\"PeriodicalId\":395401,\"journal\":{\"name\":\"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)\",\"volume\":\"144 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/3PGCIC.2015.65\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/3PGCIC.2015.65","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Efficient VoIP Steganography Based on Random Binary Matrix
To reduce the distortion while maintaining relatively large embedding capacity, a steganographic scheme based on random binary matrix is presented in this paper. We first design a 3×4 covering code, which can hide 3 bits of secret messages into 4 bits of cover messages with not more than 2-bit changed. Further, we construct a random binary matrix with cover bits at diagonal lines for steganography, and conceal secret messages into each four cover bits encrypted with the other binary bits of their rows or columns using the above 3×4 covering code. The proposed scheme is evaluated with a large number of G.711 encode speech samples. The experimental results show that our scheme can provide good performance on both steganographic transparency and embedding capacity.