Skip to main content

VStego800K: Large-Scale Steganalysis Dataset for Streaming Voice

  • Conference paper
  • First Online:
Digital Forensics and Watermarking (IWDW 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14511))

Included in the following conference series:

  • 32 Accesses

Abstract

In recent years, more and more steganographic methods based on streaming voice have appeared, which poses a great threat to the security of cyberspace. In this paper, in order to promote the development of streaming voice steganalysis technology, we construct and release a large-scale streaming voice steganalysis dataset called VStego800K. To truly reflect the needs of reality, we mainly follow three considerations when constructing the VStego800K dataset: large-scale, real-time, and diversity. The large-scale dataset allows researchers to fully explore the statistical distribution differences of streaming signals caused by steganography. Therefore, the proposed VStego800K dataset contains 814,592 streaming voice fragments. Among them, 764,592 samples (382,296 cover-stego pairs) are divided as the training set and the remaining 50,000 as testing set. The duration of all samples in the data set is uniformly cut to 1 s to encourage researchers to develop near real-time speech steganalysis algorithms. To ensure the diversity of the dataset, the collected voice signals are mixed with male and female as well as Chinese and English from different speakers. For each steganographic sample in VStego800K, we randomly use two typical streaming voice steganography algorithms, and randomly embed random bit with embedding rates of 10%–40%. We tested the performance of some latest steganalysis algorithms on VStego800K, with specific results and analysis details in the experimental part. We hope that the VStego800K dataset will further promote the development of universal voice steganalysis technology. The description of VStego800K and instructions will be released here: https://github.com/YangzlTHU/VStego800K.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Theohary, C.A.: Terrorist Use of the Internet: Information Operations in Cyberspace. DIANE Publishing (2011)

    Google Scholar 

  2. Yang, Z., Wang, Ke., Ma, S., Huang, Y., Kang, X., Zhao, X.: Istego100k: large-scale image steganalysis dataset. In: Wang, H., Zhao, X., Shi, Y., Kim, H.J., Piva, A. (eds.) IWDW 2019. LNCS, vol. 12022, pp. 352–364. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-43575-2_29

    Chapter  Google Scholar 

  3. Yang, Z., Peng, X., Huang, Y.: A sudoku matrix-based method of pitch period steganography in low-rate speech coding. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) SecureComm 2017. LNICSSITE, vol. 238, pp. 752–762. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78813-5_40

    Chapter  Google Scholar 

  4. Yang, Z., Du, X., Tan, Y., Huang, Y., Zhang, Y.J.: Aag-stega: automatic audio generation-based steganography. arXiv preprint arXiv:1809.03463 (2018)

    Google Scholar 

  5. Yang, Z.L., Guo, X.Q., Chen, Z.M., Huang, Y.F., Zhang, Y.J.: RNN-stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280–1295 (2018)

    Article  Google Scholar 

  6. Yang, Z.L., Zhang, S.Y., Hu, Y.T., Hu, Z.W., Huang, Y.F.: VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Trans. Inf. Forensics Secur. 16, 880–895 (2020)

    Article  Google Scholar 

  7. Yang, Z., Zhang, P., Jiang, M., Huang, Y., Zhang, Y.-J.: Rits: real-time interactive text steganography based on automatic dialogue model. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICCCS 2018. LNCS, vol. 11065, pp. 253–264. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00012-7_24

    Chapter  Google Scholar 

  8. Johnson, N.F., Sallee, P.A.: Detection of hidden information, covert channels and information flows. Wiley Handbook of Science and Technology for Homeland Security, pp. 1–37 (2008)

    Google Scholar 

  9. Goode, B.: Voice over internet protocol (VoIP). Proc. IEEE 90(9), 1495–1517 (2002)

    Article  Google Scholar 

  10. Hamdaqa, M., Tahvildari, L.: ReLACK: a reliable VoIP steganography approach. In: 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement, pp. 189–197. IEEE (2011)

    Google Scholar 

  11. Tian, H., Zhou, K., Jiang, H., Huang, Y., Liu, J., Feng, D.: An adaptive steganography scheme for voice over IP. In: 2009 IEEE International Symposium on Circuits and Systems, pp. 2922–2925. IEEE (2009)

    Google Scholar 

  12. Xu, E., Liu, B., Xu, L., Wei, Z., Zhao, B., Su, J.: Adaptive VoIP steganography for information hiding within network audio streams. In: 2011 14th International Conference on Network-Based Information Systems, pp. 612–617. IEEE (2011)

    Google Scholar 

  13. Ballesteros L.D.M., Moreno A.J.M.: Highly transparent steganography model of speech signals using efficient wavelet masking. Exp. Syst. Appl. 39(10), 9141-9149 (2012)

    Google Scholar 

  14. Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)

    Article  Google Scholar 

  15. Tian, H., Liu, J., Li, S.: Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimedia Syst. 20(2), 143–154 (2014)

    Article  Google Scholar 

  16. Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)

    Article  Google Scholar 

  17. Simmons, G.J.: The prisoners’ problem and the subliminal channel. In: Chaum, D. (eds) Advances in Cryptology, pp. 51–67. Springer, Boston (1984). https://doi.org/10.1007/978-1-4684-4730-9_5

  18. Liu, Q., Sung, A.H., Qiao, M.: Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forensics Secur. 4(3), 359–368 (2009)

    Article  Google Scholar 

  19. Paulin, C., Selouani, S.A., Hervet, E.: Audio steganalysis using deep belief networks. Int. J. Speech Technol. 19(3), 585–591 (2016)

    Article  Google Scholar 

  20. Kraetzer, C., Dittmann, J.: Mel-cepstrum based steganalysis for VoIP steganography. In: Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, p. 650505. International Society for Optics and Photonics (2007)

    Google Scholar 

  21. Wang, J., Huang, L., Zhang, Y., Zhu, Y., Ni, J., et al.: An effective steganalysis algorithm for histogram-shifting based reversible data hiding. Comput. Mater. Continua 64(1), 325–344 (2020)

    Article  Google Scholar 

  22. Yang, C., Wang, J., Lin, C., Chen, H., Wang, W.: Locating steganalysis of LSB matching based on spatial and wavelet filter fusion. Comput. Mater. Continua 60(2), 633–644 (2019)

    Article  Google Scholar 

  23. Huang, Y.F., Tang, S., Zhang, Y.: Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis. IET Commun. 5(7), 929–936 (2011)

    Article  Google Scholar 

  24. Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4), 22–28 (2001)

    Article  Google Scholar 

  25. Li, S.B., Tao, H.Z., Huang, Y.F.: Detection of quantization index modulation steganography in G. 723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. SCI. C, 13(8), 624–634 (2012)

    Google Scholar 

  26. Lin, Z., Huang, Y., Wang, J.: RNN-SM: fast steganalysis of VoIP streams using recurrent neural network. IEEE Trans. Inf. Forensics Secur. 13(7), 1854–1868 (2018)

    Article  Google Scholar 

  27. Yang, Z., Yang, H., Hu, Y., Huang, Y., Zhang, Y.J.: Real-time steganalysis for stream media based on multi-channel convolutional sliding windows. arXiv preprint arXiv:1902.01286 (2019)

    Google Scholar 

  28. Yang, H., Yang, Z., Huang, Y.: Steganalysis of voip streams with cnn-lstm network. In: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 204–209 (2019)

    Google Scholar 

  29. Yang, H., Yang, Z., Bao, Y., Huang, YongFeng: Hierarchical representation network for steganalysis of qim steganography in low-bit-rate speech signals. In: Zhou, J., Luo, X., Shen, Q., Xu, Z. (eds.) ICICS 2019. LNCS, vol. 11999, pp. 783–798. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-41579-2_45

    Chapter  Google Scholar 

  30. Yang, H., Yang, Z., Bao, Y., Liu, S., Huang, Y.: Fast steganalysis method for voip streams. IEEE Signal Process. Lett. 27, 286–290 (2019)

    Article  Google Scholar 

  31. Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)

    Article  MathSciNet  Google Scholar 

  32. Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: IEEE GLOBECOM 2008–2008 IEEE Global Telecommunications Conference, pp. 1–5. IEEE (2008)

    Google Scholar 

  33. Nishimura, A.: Data hiding in pitch delay data of the adaptive multi-rate narrow-band speech codec. In: 2009 fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 483–486. IEEE (2009)

    Google Scholar 

  34. Janicki, A.: Pitch-based steganography for Speex voice codec. Secur. Commun. Netw. 9(15), 2923–2933 (2016)

    Article  Google Scholar 

  35. Li, S.B., Jia, Y.Z., Fu, J.Y., Dai, Q.X.: Detection of pitch modulation information hiding based on codebook correlation network. Chinese J. Comput. 37(10), 2107–2117 (2014)

    Google Scholar 

  36. Hu, Y., Huang, Y., Yang, Z., Huang, Y.: Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams. Neurocomputing 419, 70–79 (2021)

    Article  Google Scholar 

  37. Wang, J., Yang, C., Wang, P., Song, X., Lu, J.: Payload location for JPEG image steganography based on co-frequency sub-image filtering. Int. J. Distrib. Sens. Netw. 16(1), 1550147719899569 (2020)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported in part by the National Key Research and Development Program of China under Grant 2018YFB2101501 and the National Natural Science Foundation of China (No.61862002, No.U1705261 and No.U1936208).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhongliang Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xu, X., Guo, S., Fang, Z., Zhou, P., Yang, Z., Zhou, L. (2024). VStego800K: Large-Scale Steganalysis Dataset for Streaming Voice. In: Ma, B., Li, J., Li, Q. (eds) Digital Forensics and Watermarking. IWDW 2023. Lecture Notes in Computer Science, vol 14511. Springer, Singapore. https://doi.org/10.1007/978-981-97-2585-4_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-2585-4_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-2584-7

  • Online ISBN: 978-981-97-2585-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics