Abstract
The current steganalysis researches have not specifically explored the compressed speech stream with 1%–9% embedding rates. In this paper, we propose a common steganalysis method of low embedding rate steganography based on hierarchy feature extraction and fusion. Firstly, codewords in each frame are converted to a multi-hot vector. And each multi-hot vector will be mapped into a fixed length embedding vector to get a more compact representation by utilizing the pre-trained dictionaries. Then, a hierarchy feature extraction and fusion framework is employed to perform the extraction and fusion of different levels of correlation features. Specifically, a 5-layer convolutional neural network is used to extract correlation feature information from local to global. The features of different local scales are restored to the same size by the transposed convolution. In addition, the attention mechanism is introduced in different layers of the network to assign different importance weights to the output feature within each layer. Finally, the prediction results can be generated by the fully connected layer. Experimental results show that our method performs better than the existing steganalysis methods for detecting multiple steganographies in the low bit-rate compressed speech streams. On the mixed dataset of multiple steganography methods, the proposed method can reach 73.56% on the speech stream under 5% embedding rate. And the accuracy can exceed 83% on the dataset under 9% embedding rate.
This work was supported in part by the Important Science and Technology Project of Hainan Province under Grant ZDKJ201807, in part by the Hainan Provincial Natural Science Foundation of China under Grant 618QN309, in part by the Scientific Research Foundation Project of Haikou Laboratory, Institute of Acoustics, Chinese Academy of Sciences, and in part by the IACAS Young Elite Researcher Project under GrantQNYC201829 and Grant QNYC201747.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Satir, E., Isik, H.: A Huffman compression based text steganography method. Multimed. Tools Appl. 70(3), 2085–2110 (2014)
Chang, C.-Y., Clark, S.: Practical linguistic steganography using contextual synonym substitution and vertex colour coding. In: Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing, ser. EMNLP 2010, pp. 1194–1203. Association for Computational Linguistics, USA (2010)
Pevny, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of the 12th International Conference on Information Hiding, ser. IH-10, pp. 161–177. Berlin (2010)
Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1–13 (2014). https://doi.org/10.1186/1687-417X-2014-1
Djebbar, F., Ayad, B., Meraim, K.A., Hamam, H.: Comparative study of digital audio steganography techniques. EURASIP J. Audio Speech Music Process. 2012, 1–16 (2012)
Hua, G., Huang, J., Shi, Y.Q., Goh, J., Thing, V.L.: Twenty years of digital audio watermarking-a comprehensive review. Signal Process. 128(C), 222–224 (2016)
Sadek, M.M., Khalifa, A.S., Mostafa, M.G.M.: Video steganography: a comprehensive review. Multimed. Tools Appl. 74(17), 7063–7094 (2014). https://doi.org/10.1007/s11042-014-1952-z
Yang, J., Li, S.: An efficient information hiding method based on motion vector space encoding for HEVC. Multimed. Tools Appl. 77(10), 11979–12001 (2017). https://doi.org/10.1007/s11042-017-4844-1
Li, S.B., Tao, H.Z., Huang, Y.F.: Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ.: Sci. C 13(8), 624–634 (2012)
Li, S., Jia, Y., Kuo, C.C.J.: Steganalysis of QIM steganography in low-bit-rate speech signals. IEEE/ACM Trans. Audio Speech Lang. Process. 25(5), 1011–1022 (2017)
Lin, Z., Huang, Y., Wang, J.: RNN-SM: fast steganalysis of VoIP streams using recurrent neural network. IEEE Trans. Inf. Forensics Secur. 13(7), 1854–1868 (2018)
Yan, S., Tang, G., Chen, Y.: Incorporating data hiding into G.729 speech codec. Multimed. Tools Appl. 75(18), 11493–11512 (2015). https://doi.org/10.1007/s11042-015-2865-1
Ren, Y., Wu, H., Wang, L.: An AMR adaptive steganography algorithm based on minimizing distortion. Multimed. Tools Appl. 77(10), 12095–12110 (2017). https://doi.org/10.1007/s11042-017-4860-1
Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)
Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: IEEE GLOBECOM 2008–2008 IEEE Global Telecommunications Conference, pp. 1–5 (2008)
Huang, Y.F., Tao, H.Z., Xiao, B., Chang, C.C.: Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys. Sci. China Technol. Sci. 60(10), 1585–1596 (2017). https://doi.org/10.1007/s11431-016-0707-3
Liu, P., Li, S., Wang, H.: Steganography integrated into linear predictive coding for low bit-rate speech codec. Multimed. Tools Appl 76(2), 2837–2859 (2016). https://doi.org/10.1007/s11042-016-3257-x
Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)
Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)
Liu, J., Zhou, K., Tian, H.: Least-significant-digit steganography in low bitrate speech. In: 2012 IEEE International Conference on Communications (ICC), pp. 1133–1137 (2012)
Lin, R.S.: An imperceptible information hiding in encoded bits of speech signal. In: 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), pp. 37–40 (2015)
Ding, Q., Ping, X.: Steganalysis of compressed speech based on histogram features. In: 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp. 1–4 (2010)
Ding, Q., Ping, X.: Steganalysis of analysis-by-synthesis compressed speech. In: 2010 International Conference on Multimedia Information Networking and Security, pp. 681–685 (2010)
Yang, J., Li, S.: Steganalysis of joint codeword quantization index modulation steganography based on codeword Bayesian network. Neurocomputing 313, 316–323 (2018)
Huang, Y., Tang, S., Bao, C., Yip, Y.J.: Steganalysis of compressed speech to detect covert voice over internet protocol channels. IET Inf. Secur. 5(1), 26–32 (2011)
Liu, Q., Sung, A.H., Qiao, M.: Temporal derivative based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forensics Secur. 4(3), 359–368 (2009)
Hu, Y., Huang, Y., Yang, Z., Huang, Y.: Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams. Neurocomputing 419, 70–79 (2021)
Nidadavolu, P.S., Iglesias, V., Villalba, J., Dehak, N.: Investigation on neural bandwidth extension of telephone speech for improved speaker recognition. In: ICASSP 2019–2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6111–6115 (2019)
Hu, J., Shen, L., Albanie, S., Sun, G., Wu, E.: Squeeze-and-excitation networks. IEEE Trans. Pattern Anal. Mach. Intell. 42(8), 2011–2023 (2020)
Kingma, D., Ba, J.: Adam: a method for stochastic optimization. In: International Conference on Learning Representations (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Li, S., Wang, J., Yan, Q., Liu, P., Wei, M. (2021). A Common Steganalysis Method of Low Embedding Rate Steganography in Compressed Speech Based on Hierarchy Feature Extraction and Fusion. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science, vol 1424. Springer, Cham. https://doi.org/10.1007/978-3-030-78621-2_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-78621-2_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78620-5
Online ISBN: 978-3-030-78621-2
eBook Packages: Computer ScienceComputer Science (R0)