Real-time and MPEG-1 layer III compression resistant steganography in speech

Real-time and MPEG-1 layer III compression resistant steganography in speech

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Embedding a secret message into a cover media without attracting any attention, known as steganography, is one of the methods used for hidden communication purposes. One of the cover media that can be used for steganography is speech. In this study, the authors propose a new steganography method in speech signals. In this method, the silence intervals of speech are found and the length (number of samples) of these intervals is changed to hide information. The main feature of our method is robustness to MPEG-1 layer III (MP3) compression. This method can hide information in a speech stream with very low processing time which makes it a real-time steganography method. The hiding capacity of our method is comparable with other MP3 resistance methods and the listening tests show that the degradation in speech quality is not annoying. Additionally, the effect of our method on chaotic features is negligible, so it is difficult to detect our method with chaotic-based steganalysis methods.


    1. 1)
      • J.C. Judge . Steganography: past, present, future.
    2. 2)
      • Bao, P., Ma, X.: `MP3-resistant music steganography based on dynamic range transform', Proc. 2004 Int. Symp. on Intelligent Signal Processing and Communication Systems (ISPACS 2004), 18–19 November 2004, p. 266–271.
    3. 3)
      • Cvejic, N., Seppanen, T.: `A wavelet domain LSB insertion algorithm for high capacity audio steganography', Proc. 10th IEEE Digital Signal Processing Workshop and 2nd Signal Processing Education Workshop, 13–16 October 2002, p. 53–55.
    4. 4)
      • Shirali-Shahreza, S., Manzuri-Shalmani, M.T.: `High capacity error free wavelet domain speech steganography', Proc. 33rd Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2008), 30 March —4 April 2008, p. 1729–1732.
    5. 5)
      • Gang, L., Akansu, A.N., Ramkumar, M.: `MP3 resistant oblivious steganography', Proc. of 2001 IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'01), 7–11 May 2001, 3, p. 1365–1368.
    6. 6)
      • A. Niknejad .
    7. 7)
      • Z.-J. Wu , W. Yang , Y.-X. Yang . ABS-based speech information hiding approach. Electron. Lett. , 22 , 1617 - 1619
    8. 8)
      • Shirali-Shahreza, S., Shirali-Shahreza, M.: `Steganography in silence intervals of speech', Proc. Fourth IEEE Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 15–17 August 2008, p. 605–607.
    9. 9)
      • M.D. Swanson , M. Kobayashi , A.H. Tewfik . Multimedia data-embedding and watermarking technologies. Proc. IEEE , 6 , 1064 - 1087
    10. 10)
      • L. Rabiner , B. Juang . (1993) Fundamentals of speech recognition.
    11. 11)
      • Bijankhan, M., Sheikhzadegan, J.: `FARSDAT – The Farsi Spoken Language Database', Proc. Fifth Australian Int. Conf. of Speech Science and Technology (SST-94), December 1994, 2, p. 826–831.
    12. 12)
      • LAME: The LAME MP3 Encoder/Decoder, 2008,, accessed August 2009.
    13. 13)
      • N. Cvejic , T. Seppänen . Increasing robustness of LSB audio steganography by reduced distortion LSB coding. J. Univers. Comput. Sci. , 1 , 56 - 65
    14. 14)
      • O.H. Koçal , E. Yürüklü , I. Avcıbas . Chaotic-type features for speech steganalysis. IEEE Trans. Inf. Forensics Sec. , 4 , 651 - 661
    15. 15)
      • R. Hegger , H. Kantz , T. Schreiber . Practical implementation of nonlinear time series methods: the TISEAN package. Chaos , 413 - 435

Related content

This is a required field
Please enter a valid email address