Skip to main content

A Common Steganalysis Method of Low Embedding Rate Steganography in Compressed Speech Based on Hierarchy Feature Extraction and Fusion

  • Conference paper
  • First Online:
Advances in Artificial Intelligence and Security (ICAIS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1424))

Included in the following conference series:

  • 1739 Accesses

Abstract

The current steganalysis researches have not specifically explored the compressed speech stream with 1%–9% embedding rates. In this paper, we propose a common steganalysis method of low embedding rate steganography based on hierarchy feature extraction and fusion. Firstly, codewords in each frame are converted to a multi-hot vector. And each multi-hot vector will be mapped into a fixed length embedding vector to get a more compact representation by utilizing the pre-trained dictionaries. Then, a hierarchy feature extraction and fusion framework is employed to perform the extraction and fusion of different levels of correlation features. Specifically, a 5-layer convolutional neural network is used to extract correlation feature information from local to global. The features of different local scales are restored to the same size by the transposed convolution. In addition, the attention mechanism is introduced in different layers of the network to assign different importance weights to the output feature within each layer. Finally, the prediction results can be generated by the fully connected layer. Experimental results show that our method performs better than the existing steganalysis methods for detecting multiple steganographies in the low bit-rate compressed speech streams. On the mixed dataset of multiple steganography methods, the proposed method can reach 73.56% on the speech stream under 5% embedding rate. And the accuracy can exceed 83% on the dataset under 9% embedding rate.

This work was supported in part by the Important Science and Technology Project of Hainan Province under Grant ZDKJ201807, in part by the Hainan Provincial Natural Science Foundation of China under Grant 618QN309, in part by the Scientific Research Foundation Project of Haikou Laboratory, Institute of Acoustics, Chinese Academy of Sciences, and in part by the IACAS Young Elite Researcher Project under GrantQNYC201829 and Grant QNYC201747.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Satir, E., Isik, H.: A Huffman compression based text steganography method. Multimed. Tools Appl. 70(3), 2085–2110 (2014)

    Article  Google Scholar 

  2. Chang, C.-Y., Clark, S.: Practical linguistic steganography using contextual synonym substitution and vertex colour coding. In: Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing, ser. EMNLP 2010, pp. 1194–1203. Association for Computational Linguistics, USA (2010)

    Google Scholar 

  3. Pevny, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of the 12th International Conference on Information Hiding, ser. IH-10, pp. 161–177. Berlin (2010)

    Google Scholar 

  4. Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1–13 (2014). https://doi.org/10.1186/1687-417X-2014-1

    Article  Google Scholar 

  5. Djebbar, F., Ayad, B., Meraim, K.A., Hamam, H.: Comparative study of digital audio steganography techniques. EURASIP J. Audio Speech Music Process. 2012, 1–16 (2012)

    Article  Google Scholar 

  6. Hua, G., Huang, J., Shi, Y.Q., Goh, J., Thing, V.L.: Twenty years of digital audio watermarking-a comprehensive review. Signal Process. 128(C), 222–224 (2016)

    Google Scholar 

  7. Sadek, M.M., Khalifa, A.S., Mostafa, M.G.M.: Video steganography: a comprehensive review. Multimed. Tools Appl. 74(17), 7063–7094 (2014). https://doi.org/10.1007/s11042-014-1952-z

    Article  Google Scholar 

  8. Yang, J., Li, S.: An efficient information hiding method based on motion vector space encoding for HEVC. Multimed. Tools Appl. 77(10), 11979–12001 (2017). https://doi.org/10.1007/s11042-017-4844-1

    Article  Google Scholar 

  9. Li, S.B., Tao, H.Z., Huang, Y.F.: Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ.: Sci. C 13(8), 624–634 (2012)

    Google Scholar 

  10. Li, S., Jia, Y., Kuo, C.C.J.: Steganalysis of QIM steganography in low-bit-rate speech signals. IEEE/ACM Trans. Audio Speech Lang. Process. 25(5), 1011–1022 (2017)

    Google Scholar 

  11. Lin, Z., Huang, Y., Wang, J.: RNN-SM: fast steganalysis of VoIP streams using recurrent neural network. IEEE Trans. Inf. Forensics Secur. 13(7), 1854–1868 (2018)

    Article  Google Scholar 

  12. Yan, S., Tang, G., Chen, Y.: Incorporating data hiding into G.729 speech codec. Multimed. Tools Appl. 75(18), 11493–11512 (2015). https://doi.org/10.1007/s11042-015-2865-1

    Article  Google Scholar 

  13. Ren, Y., Wu, H., Wang, L.: An AMR adaptive steganography algorithm based on minimizing distortion. Multimed. Tools Appl. 77(10), 12095–12110 (2017). https://doi.org/10.1007/s11042-017-4860-1

    Article  Google Scholar 

  14. Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)

    Article  Google Scholar 

  15. Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: IEEE GLOBECOM 2008–2008 IEEE Global Telecommunications Conference, pp. 1–5 (2008)

    Google Scholar 

  16. Huang, Y.F., Tao, H.Z., Xiao, B., Chang, C.C.: Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys. Sci. China Technol. Sci. 60(10), 1585–1596 (2017). https://doi.org/10.1007/s11431-016-0707-3

    Article  Google Scholar 

  17. Liu, P., Li, S., Wang, H.: Steganography integrated into linear predictive coding for low bit-rate speech codec. Multimed. Tools Appl 76(2), 2837–2859 (2016). https://doi.org/10.1007/s11042-016-3257-x

    Article  Google Scholar 

  18. Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)

    Article  MathSciNet  Google Scholar 

  19. Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)

    Article  Google Scholar 

  20. Liu, J., Zhou, K., Tian, H.: Least-significant-digit steganography in low bitrate speech. In: 2012 IEEE International Conference on Communications (ICC), pp. 1133–1137 (2012)

    Google Scholar 

  21. Lin, R.S.: An imperceptible information hiding in encoded bits of speech signal. In: 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), pp. 37–40 (2015)

    Google Scholar 

  22. Ding, Q., Ping, X.: Steganalysis of compressed speech based on histogram features. In: 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp. 1–4 (2010)

    Google Scholar 

  23. Ding, Q., Ping, X.: Steganalysis of analysis-by-synthesis compressed speech. In: 2010 International Conference on Multimedia Information Networking and Security, pp. 681–685 (2010)

    Google Scholar 

  24. Yang, J., Li, S.: Steganalysis of joint codeword quantization index modulation steganography based on codeword Bayesian network. Neurocomputing 313, 316–323 (2018)

    Article  Google Scholar 

  25. Huang, Y., Tang, S., Bao, C., Yip, Y.J.: Steganalysis of compressed speech to detect covert voice over internet protocol channels. IET Inf. Secur. 5(1), 26–32 (2011)

    Article  Google Scholar 

  26. Liu, Q., Sung, A.H., Qiao, M.: Temporal derivative based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forensics Secur. 4(3), 359–368 (2009)

    Article  Google Scholar 

  27. Hu, Y., Huang, Y., Yang, Z., Huang, Y.: Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams. Neurocomputing 419, 70–79 (2021)

    Article  Google Scholar 

  28. Nidadavolu, P.S., Iglesias, V., Villalba, J., Dehak, N.: Investigation on neural bandwidth extension of telephone speech for improved speaker recognition. In: ICASSP 2019–2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6111–6115 (2019)

    Google Scholar 

  29. Hu, J., Shen, L., Albanie, S., Sun, G., Wu, E.: Squeeze-and-excitation networks. IEEE Trans. Pattern Anal. Mach. Intell. 42(8), 2011–2023 (2020)

    Article  Google Scholar 

  30. Kingma, D., Ba, J.: Adam: a method for stochastic optimization. In: International Conference on Learning Representations (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Songbin Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, S., Wang, J., Yan, Q., Liu, P., Wei, M. (2021). A Common Steganalysis Method of Low Embedding Rate Steganography in Compressed Speech Based on Hierarchy Feature Extraction and Fusion. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science, vol 1424. Springer, Cham. https://doi.org/10.1007/978-3-030-78621-2_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78621-2_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78620-5

  • Online ISBN: 978-3-030-78621-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics