skip to main content
10.1145/3573942.3574196acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaiprConference Proceedingsconference-collections
research-article

A Novel Global-Local Representations Network for Speech Steganalysis

Authors Info & Claims
Published:16 May 2023Publication History

ABSTRACT

With the popularity of the internet and the development of network services, Steganography based on speech stream has become a research hotspot in information hiding. To improve the detection performance of steganalysis of multiple steganography methods, in this paper, we proposed the Global-Local Representations Network (GLRN), which consists of a Global Correlation Extraction (GCE) module and a Local Correlation Enhancement (LCE) module. Firstly, considering the inter-class differences of different coding elements, the GCE module is used to capture the global correlation of different coding elements by using multi-channel modeling. Then, we realize that the process of global correlation extraction suffers from the loss of detailed information, so the LCE module is used to capture local correlations to complement the global features. The experiments show that the GLRN achieves the start-of-art detection performance.

References

  1. Aruna Malik, Geeta Sikka and Harsh K. Verma. 2017. A High Capacity Text Steganography Scheme Based on LZW Compression and Color Coding. Engineering Science and Technology, an International Journal 20, 1 (2017), 72-79.Google ScholarGoogle Scholar
  2. Inas Jawad Kadhim, Prashan Premaratne, Peter James Vial and Brendan Halloran. 2019. Comprehensive Survey of Image Steganography: Techniques, Evaluations, and trends in Future Research. Neurocomputing 335 (2019), 299-326.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Rachna Patel, Kalpesh Lad and Mukesh Patel. 2021. Study and Investigation of Video Steganography over Uncompressed and Compressed Domain: A Comprehensive Review. Multimedia Systems 27 (2021), 985–1024.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Theohary and Catherine. 2011. Terrorist Use of the Internet: Information Operations in Cyberspace. Diane Publishing, 2011.Google ScholarGoogle Scholar
  5. Wojciech Mazurczyk. 2013. VoIP Steganography and its Detection—A survey. ACM Computing Surveys 46, 2 (2013), 20.1-20.21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Goode, B. 2002. Voice over Internet Protocol (VoIP). Proceedings of the IEEE 90, 9 (2002), 1495-1517.Google ScholarGoogle ScholarCross RefCross Ref
  7. YongFeng Huang and ShanYu Tang. 2016. Covert voice over internet protocol communications based on spatial model. Science China Technological Sciences 59 (2016), 117-127.Google ScholarGoogle ScholarCross RefCross Ref
  8. Zhijun Wu, Junjun Guo, Chenlei Zhang, and Changliang Li. 2021. Steganography and Steganalysis in Voice over IP: A Review. Sensors 21, 4 (2021), 1032.Google ScholarGoogle ScholarCross RefCross Ref
  9. Bo Xiao, Yongfeng Huang, Shanyu Tang. 2008. An approach to information hiding in low bit-rate speech stream. In 2008 IEEE Global Telecommunications Conference. IEEE, New Orleans, LA, USA, 1-5.Google ScholarGoogle ScholarCross RefCross Ref
  10. Junhui He, Junxi Chen, Shichang Xiao, Xiaoyu Huang, and Shaohua Tang. 2018. A novel AMR-WB speech steganography based on diameter-neighbor codebook partition. Security and Communication Networks 2018, 1-11.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Yongfeng Huang, Chenghao Liu, Shanyu Tang and Sen Bai. 2012. Steganography integration into a Low-Bit rate speech codec. IEEE Transactions on Information Forensics and Security 7, 6 (2012), 1865-1875.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Shufan Yan, Guangming Tang and Yifeng Sun. 2015. A low-rate speech steganography based on pitch period prediction. Application Research of Computers, 06 (2015), 180-183.Google ScholarGoogle Scholar
  13. Geiser Bernd, and Peter Vary. 2008. High rate data hiding in ACELP speech codecs. In 2008 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, Las Vegas, NV, USA, 4005-4008.Google ScholarGoogle Scholar
  14. Haibo Miao, Liusheng Huang, Zhili Chen and Wei Yang and Ammar hawbani. 2012. A new scheme for covert communication via 3G encoded speech. Computers & Electrical Engineering 38, 6 (2012), 1490-1501.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Zinan Lin, Yongfeng Huang and Jilong Wang. 2018. RNN-SM: Fast steganalysis of VoIP streams using recurrent neural network. IEEE Transactions on Information Forensics and Security 13, 7 (2018), 1854-1868.Google ScholarGoogle ScholarCross RefCross Ref
  16. Hao Yang, ZhongLiang Yang, YongJian Bao, Sheng Liu and YongFeng Huang. 2019. Fast steganalysis method for VoIP streams. IEEE Signal Processing Letters 27, 286-290.Google ScholarGoogle ScholarCross RefCross Ref
  17. Chen Gong, Xiaowei Yi, Xianfeng Zhao, and Yi Ma. 2019. Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'19). Association for Computing Machinery, New York, NY, USA, 2–13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Songbin Li, Jingang Wang, Peng Liu, Miao Wei, and Qiandong Yan. 2021. Detection of Multiple Steganography Methods in Compressed Speech Based on Code Element Embedding, Bi-LSTM and CNN with Attention Mechanisms. IEEE/ACM Trans. Audio, Speech and Lang. Proc. 29 (2021), 1556–1569.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Yuting Hu, Yihua Huang, Zhongliang Yang and Yongfeng Huang. 2020. Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams. Neurocomputing 419 (2020), 70-79.Google ScholarGoogle ScholarCross RefCross Ref
  20. Huili Wang, Zhongliang Yang, Yuting Hu, Zhen Yang, and Yongfeng Huang. 2021. Fast Detection of Heterogeneous Parallel Steganography for Streaming Voice. In Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec '21). ACM, New York, NY, USA, 137–142.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Xinjie Lin, Gang Xiong, Gaopeng Gou, Zhen Li, Junzheng Shi, and Jing Yu. 2022. ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification. In Proceedings of the ACM Web Conference 2022 (WWW '22). ACM, New York, NY, USA, 633–642.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Jianing Li, Jingdong Wang, Qi Tian, Wen Gao and Shiliang Zhang. 2019. Global-local temporal representations for video person re-identification. Proceedings of the IEEE/CVF International Conference on Computer Vision. IEEE, 3958-3967.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A Novel Global-Local Representations Network for Speech Steganalysis

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      AIPR '22: Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition
      September 2022
      1221 pages
      ISBN:9781450396899
      DOI:10.1145/3573942

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 May 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)22
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format