Aiming at the problem that the audio steganography has low utilization of carriers, poor imperceptibility and small embedding capacity, an adaptive audio steganography based on the wavelet packet decomposition and matrix code was proposed. Comparing the differences between the wavelet-packet decomposed coefficients before and after the audio's MP3 compression, the algorithm took the unchanged bits' position of wavelet-packet decomposed coefficients as embedding carriers, which effectively increased the embedding capability. And the algorithm improved the matrix code by using chaotic model to generate random triple-groups, which promoted the safety and efficiency. As for capacity, the proposed algorithm promoted about 30%, compared with the algorithm that directly uses the medium-frequency sub-bands as the carriers. On the aspect of Signal-to-Noise Ratio (SNR), the proposed algorithm promoted about 9%, compared with the matrix steganography that fixes the triple-groups. The experimental results show that the algorithm is correct and can basically satisfies large-capacity and secure communications.
[1] PETITCOLAS A P. MP3Stego 1.1.16[EB/OL].[2014-03-19]. http://www.cl.cam.ac.uk/-fapp2/steganography/mp3stego. [2] WAN W, ZHAO X, HUANG W,et al. Steganalysis of MP3Stego based on Huffman table distribution and recoding[J]. Journal of Graduate University of Chinese Academy of Sciences, 2012,29(1):118-124.(万威,赵险峰,黄炜,等. 基于码表分布特征和重编码的MP3Stego隐写分析[J].中国科学院研究生院学报,2012,29(1):118-124.) [3] FRIDRICH J. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes[C]//Proceedings of the 6th International Conference on Information Hiding. Berlin: Springer, 2004:67-81. [4] ASAD M, GILANI J, KHALID A. An enhanced least significant bit modification technique for audio steganography[C]//Proceedings of the 2011 International Conference on Computer Networks and Information Technology. Piscataway: IEEE, 2011:143-147. [5] LIU F, LIU J, LUO X. Digital image steganalysis[M]. Beijing: China Machine Press, 2010:32-38.(刘芬林,刘久芬,罗向阳.数字图像隐写分析[M].北京:机械工业出版社, 2010:32-38.) [6] BALLESTEROS L D M, MORENO A J M. Highly transparent steganography model of speech signals using efficient wavelet masking[J]. Expert Systems with Applications, 2012,39(10):9141-9149. [7] CVEJIC N, SEPPANEN T. A wavelet domain LSB insertion algorithm for high capacity audio steganography[C]//Proceedings of the IEEE Digital Signal Processing Workshop. Piscataway: IEEE, 2002:53-55. [8] LIU X, GUO L, QIU T. A modified multi-resolutional LSB insertion algorithm for high capacity audio steganography[J]. Computer Engineering and Applications, 2006,42(30):23-24.(刘秀娟,郭立,邱天.改进的大容量多分辨率LSB音频隐写算法[J].计算机工程与应用,2006,42(30):23-24.) [9] ZAMANI M, MANAF A, AHMAD R B, et al. A secure audio steganography approach[C]//Proceedings of the 2009 Internet Technology and Secured Transactions. Piscataway: IEEE, 2009:1-6. [10] WESTFELD A. F5-a steganographic algorithm[M]. MOSKOWITZ I S, edited. Information Hiding, LNCS 2137. Berlin: Springer, 2001:289-302. [11] HUYNH B D, NGUYER X H. An improved technique for hiding data in audio[C]//Proceedings of the 2014 4th International Conference on Digital Information and Communication Technology and it's Applications. Piscataway: IEEE, 2014:149-153. [12] ZHANG S. The research of MP3 self-embedding method[D]. Hefei: University of Science and Technology of China, 2009.(张嵩.音频MP3的自嵌入方法研究[D].合肥:中国科学技术大学,2009.) [13] LIAO X, XIAO D, CHEN Y, et al. Theory and applications of chaotic cryptography[M]. Beijing: Science Press, 2009:11.(廖晓峰,肖迪,陈勇,等.混沌密码学原理及其应用[M].北京:科学出版社,2009:11.) [14] DITTMANNA J, HESSE D. Network based intrusion detection to detect steganographic communication channels: on the example of audio data[C]//Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing. Piscataway: IEEE, 2004:343-346.