Comparing the Effect of Steganography on the Content of Transmitted Data in LPC, CELP, and MELP Audio Encoder’s Standards

Document Type : Original Article

Authors

1 Electrical Engineering Department, IHU University, Tehran, Iran

2 PhD Candidate, Faculty of Electrical Engineering Department, Imam Hossein University,.

3 Faculty of Electrical Engineering Department, Imam Hossein University

Abstract

Steganography is one of the most important methods of safe transmission of sensitive information in electronic warfare and audio data hiding due to its higher capacity and complexity than other methods, making it similar to entropy. And the interest of researchers is in the field of information security. The most important part of conducting this research is the decoding of LPC, CELP, and MELP audio encoders, which is considered an important innovation in the field of national information security and electronic warfare because these encoders are among the most powerful audio coding methods used by NATO forces. They are used to transmit Speech. In this article the proposed method, the least significant bit method was used to hide the secret information in the carrier audio. The results of simulation and evaluation according to Table 1 show that this method has a large number of security due to its high resistance compared to other methods, and compared with this code, it shows that the MELP method has a higher security than others.

Keywords


1.    J. J. D. van Schalkwyk, D. J. Joubert and J. G. van der Linde, "Linear predictive speech coding at 2400 b/s," in Transactions of the South African Institute of Electrical Engineers, vol. 84, no. 3, pp. 146-152, June 1993.##2.    M. Schroeder and B. Atal, "Code-excited linear prediction (CELP): High-quality speech at very low bit rates," ICASSP '85. IEEE International Conference on Acoustics, Speech, and Signal Processing, 1985, pp. 937-940, doi: 10.1109/ICASSP.1985.1168147.##3.    A. V. McCree and T. P. Barnwell, "A mixed excitation LPC vocoder model for low bit rate speech coding," in IEEE Transactions on Speech and Audio Processing, vol. 3, no. 4, pp. 242-250, July 1995.##4.    Talati, S., Etezadifar, P. (2020). 'Providing an Optimal Way to Increase the Security of Data Transfer using Watermarking in Digital Audio Signals', Majlesi Journal of Telecommunication Devices, 9(1), pp. 35-46.##5.    Etezadifar, P., Talati, S., Hassani Ahangar, M. R., Molazade, M. (2023). 'Investigation of Steganography Methods in Audio Standard Coders: LPC, CELP, MELP', Majlesi Journal of Telecommunication Devices, doi: 10.30486/mjtd.2022.695928.##6.    Muhammad Asad; Junaid Gilani; Adnan Khalid, An enhanced least significant bit modification technique for audio steganography, International Conference on Computer Networks and Information Technology, July 2011.##7.    H. Liu, J. Liu, R. Hu, X. Yan and S. Wan, “Adaptive audio steganography scheme based on wavelet packet energy,” in IEEE International Conference on High Performance and Smart Computing (HPSC), 2017.##8.    Samir Kumar, Bandyopadhyay Barnali, Gupta Banik, LSB Modification and Phase Encoding Technique of Audio Steganography Revisited, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 4, June 2012.##9.    Bao, Ma, “Steganographic Techniques and their use in an Open Systems Environment”, Bret Dunbar, The information Security reading Room, SANS Institute 2002.##10.    N. Cvejic and T. Seppanen, "Increasing robustness of LSB audio steganography using a novel embedding method," International Conference on Information Technology: Coding and Computing. Proceedings. ITCC 2004, Las Vegas, NV, USA, 2004, pp. 533-537 Vol.2, doi: 10.1109/ITCC.2004.1286709.##11.    Cvejic, N. and Seppänen, T., 2005. Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB Coding. J. Univers. Comput. Sci, 11(1).##12.    Delforouzi, A., Pooyan, M. “Adaptive Digital Audio Steganography Based on Integer Wavelet Transform”. Circuits Syst Signal Process 27, 247–259 (2008). https://doi.org/10.1007/ s00034-008-9019-x.##13.    Mansour Sheikhan et al, High-Quality Audio steganography by Floating Substitution of LSBs in Wavelet Domain, world applied science Journal IDOSI publications, 2010.##14.    S. S. Divya and M. R. M. Reddy, “Hiding Text In Audio Using Multiple LSB Steganography And Provide Security Using Cryptography,” Int. J. Sci. Technol. Res., vol. 1, no. 6, pp. 68–70, 2012.##15.    Veselska, O.; Lavrynenko, O.; Odarchenko, R.; Zaliskyi, M.; Bakhtiiarov, D.; Karpinski, M.; Rajba, S. A “Wavelet-Based Steganographic Method for Text Hiding in an Audio Signal”. Sensors 2022.##16.    Mohsen Bazyar and Rubita Sudirma, “A Robust Data Embedding Method for MPEG Layer III Audio Steganography”, International Journal of Security and Its ApplicationsVol.9, No.12 (2015).##17.    M. Wakiyama, Y. Hidaka, and K. Nozaki, “An audio steganography by a low-bit coding method with wave files,” Proc. - 2010 6th Int. Conf. Intell. Inf. Hiding Multimed. Signal Process. IIHMSP 2010, pp. 530–533, 2010, doi: 10.1109/IIHMSP.2010.135.##18.    Hashemi, Seyed & Barati, Shahrokh & Talati, S. & Noori, H. (2016). “A genetic algorithm approach to optimal placement of switching and protective equipment on a distribution network”. Journal of Engineering and Applied Sciences. 11. 1395-1400.##19.    Hashemi, Seyed & Abyari, M. & Barati, Shahrokh & Tahmasebi, Sanaz & Talati, S. (2016). “A proposed method to controller parameter soft tuning as accommodation FTC after unknown input observer FDI”. Journal of Engineering and Applied Sciences. 11. 2818-2829.##20.    S. Talati, A. Rahmati, and H. Heidari. (2019) “Investigating the Effect of Voltage Controlled Oscillator Delay on the Stability of Phase Lock Loops”, MJTD, vol. 8, no. 2, pp. 57-61.##21.    Talati, S., & Alavi, S. M. (2020). “Radar Systems Deception using Cross-eye Technique”. Majlesi Journal of Mechatronic Systems, 9(3), 19-21.##22.    Saeed Talati, mohamadreza Hasani Ahangar   (2020) “Analysis, Simulation and Optimization of LVQ Neural Network Algorithm and Comparison with SOM”, MJTD, vol. 10, no. 1.##23.    Talati, S., & Hassani Ahangar. M. R. (2020) “Combining Principal Component Analysis Methods and Self-Organized and Vector Learning Neural Networks for Radar Data”, Majlesi Journal of Telecommunication Devices, 9(2), 65-69.##24.    Hassani Ahangar, M. R., Talati, S., Rahmati, A., & Heidari, H. (2020). “The Use of Electronic Warfare and Information Signaling in Network-based Warfare”. Majlesi Journal of Telecommunication Devices, 9(2), 93-97.##25.    Talati, S., & Amjadi, A. (2020). “Design and Simulation of a Novel Photonic Crystal Fiber with a Low Dispersion Coefficient in the Terahertz Band”. Majlesi Journal of Mechatronic Systems, 9(2), 23-28.##26.    Talati, Saeed, Hassani Ahangar, Mohammad Reza. (2021). “Radar Data Processing Using a Combination of Principal Component Analysis Methods and Self-Organized and Digitizing Learning Vector Neural Networks”, Electronic and Cyber Defense, 9 (2), pp. 1-7.##27.    Talati, S., Alavi, S. M., & Akbarzade, H. (2021). “Investigating the Ambiguity of Ghosts in Radar and Examining the Diagnosis and Ways to Deal with it”. Majlesi Journal of Mechatronic Systems, 10(2).##28.    Etezadifar, P., & Talati, S. (2021). “Analysis and Investigation of Disturbance in Radar Systems Using New Techniques of Electronic Attack”. Majlesi Journal of Telecommunication Devices, 10(2), 55-59.##29.    Saeed. Talati, Behzad. Ebadi, Houman. Akbarzade “Determining of the fault location in distribution systems in presence of distributed generation resources using the original post phasors”. QUID 2017, pp. 1806-1812, Special Issue No.1- ISSN: 1692-343X, Medellín-Colombia. April 2017.##30.    Talati, Saeed, Akbari Thani, Milad, Hassani Ahangar, Mohammad Reza. (2020). “Detection of Radar Targets Using GMDH Deep Neural Network”, Radar Journal, 8 (1), pp. 65-74.##31.    Talati, S., Abdollahi, R., Soltaninia, V., & Ayat, M. (2021). “A New Emitter Localization Technique Using Airborne Direction Finder Sensor”. Majlesi Journal of Mechatronic Systems, 10(4), 5-16.##32.    Ghazali, S. M., Baleghi, Y. “Pedestrian Detection in Infrared Outdoor Images Based on Atmospheric Situation Estimation” Journal of AI and Data Mining, 2019; 7(1): 1-16. doi: 10.22044/jadm.2018.5742.1696##33.    Talati, S., Ghazali, S. M., Hassani Ahangar, M., & Alavi, S. M. (2021). “Analysis and Evaluation of Increasing the Throughput of Processors by Eliminating the Lobe’s Disorder” Majlesi Journal of Telecommunication Devices, 10(3), 119-123. https://doi.org/10.52547/mjtd.10.3.119##34.    Talati, Saeed, Ghazali, Seyed Morteza, SoltaniNia, VahidReza, “Design and construct full invisible band metamaterial-based coating with layer-by-layer structure in the microwave range from 8 to 10 GHz” Journal of Physics D: Applied Physics. Volume 56, Number 17. 2023. DOI 10.1088/1361- 6463/acb8c7.##35.    EtezadiFar. P., Talati. S., Hassani Ahangar. M.R., Molazade. M., “Investigation of Steganography Methods in Audio Standard Coders: LPC, CELP, MELP” Majlesi Journal of Telecommunication Devices, 12(1), in press, 2023.##36.    Soltaninia, V., Talati, S., Hasani Ahangar, M., Samsami Khodadad, F., Baei, P. (2023). 'Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdroppشing UAV', Electronic and Cyber Defense, 11(2), pp. 45-56.##