Abstract
In recent years, more and more steganographic methods based on streaming voice have appeared, which poses a great threat to the security of cyberspace. In this paper, in order to promote the development of streaming voice steganalysis technology, we construct and release a large-scale streaming voice steganalysis dataset called VStego800K. To truly reflect the needs of reality, we mainly follow three considerations when constructing the VStego800K dataset: large-scale, real-time, and diversity. The large-scale dataset allows researchers to fully explore the statistical distribution differences of streaming signals caused by steganography. Therefore, the proposed VStego800K dataset contains 814,592 streaming voice fragments. Among them, 764,592 samples (382,296 cover-stego pairs) are divided as the training set and the remaining 50,000 as testing set. The duration of all samples in the data set is uniformly cut to 1 s to encourage researchers to develop near real-time speech steganalysis algorithms. To ensure the diversity of the dataset, the collected voice signals are mixed with male and female as well as Chinese and English from different speakers. For each steganographic sample in VStego800K, we randomly use two typical streaming voice steganography algorithms, and randomly embed random bit with embedding rates of 10%–40%. We tested the performance of some latest steganalysis algorithms on VStego800K, with specific results and analysis details in the experimental part. We hope that the VStego800K dataset will further promote the development of universal voice steganalysis technology. The description of VStego800K and instructions will be released here: https://github.com/YangzlTHU/VStego800K.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Theohary, C.A.: Terrorist Use of the Internet: Information Operations in Cyberspace. DIANE Publishing (2011)
Yang, Z., Wang, Ke., Ma, S., Huang, Y., Kang, X., Zhao, X.: Istego100k: large-scale image steganalysis dataset. In: Wang, H., Zhao, X., Shi, Y., Kim, H.J., Piva, A. (eds.) IWDW 2019. LNCS, vol. 12022, pp. 352–364. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-43575-2_29
Yang, Z., Peng, X., Huang, Y.: A sudoku matrix-based method of pitch period steganography in low-rate speech coding. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) SecureComm 2017. LNICSSITE, vol. 238, pp. 752–762. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78813-5_40
Yang, Z., Du, X., Tan, Y., Huang, Y., Zhang, Y.J.: Aag-stega: automatic audio generation-based steganography. arXiv preprint arXiv:1809.03463 (2018)
Yang, Z.L., Guo, X.Q., Chen, Z.M., Huang, Y.F., Zhang, Y.J.: RNN-stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280–1295 (2018)
Yang, Z.L., Zhang, S.Y., Hu, Y.T., Hu, Z.W., Huang, Y.F.: VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Trans. Inf. Forensics Secur. 16, 880–895 (2020)
Yang, Z., Zhang, P., Jiang, M., Huang, Y., Zhang, Y.-J.: Rits: real-time interactive text steganography based on automatic dialogue model. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICCCS 2018. LNCS, vol. 11065, pp. 253–264. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00012-7_24
Johnson, N.F., Sallee, P.A.: Detection of hidden information, covert channels and information flows. Wiley Handbook of Science and Technology for Homeland Security, pp. 1–37 (2008)
Goode, B.: Voice over internet protocol (VoIP). Proc. IEEE 90(9), 1495–1517 (2002)
Hamdaqa, M., Tahvildari, L.: ReLACK: a reliable VoIP steganography approach. In: 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement, pp. 189–197. IEEE (2011)
Tian, H., Zhou, K., Jiang, H., Huang, Y., Liu, J., Feng, D.: An adaptive steganography scheme for voice over IP. In: 2009 IEEE International Symposium on Circuits and Systems, pp. 2922–2925. IEEE (2009)
Xu, E., Liu, B., Xu, L., Wei, Z., Zhao, B., Su, J.: Adaptive VoIP steganography for information hiding within network audio streams. In: 2011 14th International Conference on Network-Based Information Systems, pp. 612–617. IEEE (2011)
Ballesteros L.D.M., Moreno A.J.M.: Highly transparent steganography model of speech signals using efficient wavelet masking. Exp. Syst. Appl. 39(10), 9141-9149 (2012)
Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)
Tian, H., Liu, J., Li, S.: Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimedia Syst. 20(2), 143–154 (2014)
Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)
Simmons, G.J.: The prisoners’ problem and the subliminal channel. In: Chaum, D. (eds) Advances in Cryptology, pp. 51–67. Springer, Boston (1984). https://doi.org/10.1007/978-1-4684-4730-9_5
Liu, Q., Sung, A.H., Qiao, M.: Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forensics Secur. 4(3), 359–368 (2009)
Paulin, C., Selouani, S.A., Hervet, E.: Audio steganalysis using deep belief networks. Int. J. Speech Technol. 19(3), 585–591 (2016)
Kraetzer, C., Dittmann, J.: Mel-cepstrum based steganalysis for VoIP steganography. In: Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, p. 650505. International Society for Optics and Photonics (2007)
Wang, J., Huang, L., Zhang, Y., Zhu, Y., Ni, J., et al.: An effective steganalysis algorithm for histogram-shifting based reversible data hiding. Comput. Mater. Continua 64(1), 325–344 (2020)
Yang, C., Wang, J., Lin, C., Chen, H., Wang, W.: Locating steganalysis of LSB matching based on spatial and wavelet filter fusion. Comput. Mater. Continua 60(2), 633–644 (2019)
Huang, Y.F., Tang, S., Zhang, Y.: Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis. IET Commun. 5(7), 929–936 (2011)
Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4), 22–28 (2001)
Li, S.B., Tao, H.Z., Huang, Y.F.: Detection of quantization index modulation steganography in G. 723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. SCI. C, 13(8), 624–634 (2012)
Lin, Z., Huang, Y., Wang, J.: RNN-SM: fast steganalysis of VoIP streams using recurrent neural network. IEEE Trans. Inf. Forensics Secur. 13(7), 1854–1868 (2018)
Yang, Z., Yang, H., Hu, Y., Huang, Y., Zhang, Y.J.: Real-time steganalysis for stream media based on multi-channel convolutional sliding windows. arXiv preprint arXiv:1902.01286 (2019)
Yang, H., Yang, Z., Huang, Y.: Steganalysis of voip streams with cnn-lstm network. In: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 204–209 (2019)
Yang, H., Yang, Z., Bao, Y., Huang, YongFeng: Hierarchical representation network for steganalysis of qim steganography in low-bit-rate speech signals. In: Zhou, J., Luo, X., Shen, Q., Xu, Z. (eds.) ICICS 2019. LNCS, vol. 11999, pp. 783–798. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-41579-2_45
Yang, H., Yang, Z., Bao, Y., Liu, S., Huang, Y.: Fast steganalysis method for voip streams. IEEE Signal Process. Lett. 27, 286–290 (2019)
Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)
Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: IEEE GLOBECOM 2008–2008 IEEE Global Telecommunications Conference, pp. 1–5. IEEE (2008)
Nishimura, A.: Data hiding in pitch delay data of the adaptive multi-rate narrow-band speech codec. In: 2009 fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 483–486. IEEE (2009)
Janicki, A.: Pitch-based steganography for Speex voice codec. Secur. Commun. Netw. 9(15), 2923–2933 (2016)
Li, S.B., Jia, Y.Z., Fu, J.Y., Dai, Q.X.: Detection of pitch modulation information hiding based on codebook correlation network. Chinese J. Comput. 37(10), 2107–2117 (2014)
Hu, Y., Huang, Y., Yang, Z., Huang, Y.: Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams. Neurocomputing 419, 70–79 (2021)
Wang, J., Yang, C., Wang, P., Song, X., Lu, J.: Payload location for JPEG image steganography based on co-frequency sub-image filtering. Int. J. Distrib. Sens. Netw. 16(1), 1550147719899569 (2020)
Acknowledgement
This work was supported in part by the National Key Research and Development Program of China under Grant 2018YFB2101501 and the National Natural Science Foundation of China (No.61862002, No.U1705261 and No.U1936208).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xu, X., Guo, S., Fang, Z., Zhou, P., Yang, Z., Zhou, L. (2024). VStego800K: Large-Scale Steganalysis Dataset for Streaming Voice. In: Ma, B., Li, J., Li, Q. (eds) Digital Forensics and Watermarking. IWDW 2023. Lecture Notes in Computer Science, vol 14511. Springer, Singapore. https://doi.org/10.1007/978-981-97-2585-4_21
Download citation
DOI: https://doi.org/10.1007/978-981-97-2585-4_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-2584-7
Online ISBN: 978-981-97-2585-4
eBook Packages: Computer ScienceComputer Science (R0)