ABSTRACT
With the popularity of the internet and the development of network services, Steganography based on speech stream has become a research hotspot in information hiding. To improve the detection performance of steganalysis of multiple steganography methods, in this paper, we proposed the Global-Local Representations Network (GLRN), which consists of a Global Correlation Extraction (GCE) module and a Local Correlation Enhancement (LCE) module. Firstly, considering the inter-class differences of different coding elements, the GCE module is used to capture the global correlation of different coding elements by using multi-channel modeling. Then, we realize that the process of global correlation extraction suffers from the loss of detailed information, so the LCE module is used to capture local correlations to complement the global features. The experiments show that the GLRN achieves the start-of-art detection performance.
- Aruna Malik, Geeta Sikka and Harsh K. Verma. 2017. A High Capacity Text Steganography Scheme Based on LZW Compression and Color Coding. Engineering Science and Technology, an International Journal 20, 1 (2017), 72-79.Google Scholar
- Inas Jawad Kadhim, Prashan Premaratne, Peter James Vial and Brendan Halloran. 2019. Comprehensive Survey of Image Steganography: Techniques, Evaluations, and trends in Future Research. Neurocomputing 335 (2019), 299-326.Google ScholarDigital Library
- Rachna Patel, Kalpesh Lad and Mukesh Patel. 2021. Study and Investigation of Video Steganography over Uncompressed and Compressed Domain: A Comprehensive Review. Multimedia Systems 27 (2021), 985–1024.Google ScholarDigital Library
- Theohary and Catherine. 2011. Terrorist Use of the Internet: Information Operations in Cyberspace. Diane Publishing, 2011.Google Scholar
- Wojciech Mazurczyk. 2013. VoIP Steganography and its Detection—A survey. ACM Computing Surveys 46, 2 (2013), 20.1-20.21.Google ScholarDigital Library
- Goode, B. 2002. Voice over Internet Protocol (VoIP). Proceedings of the IEEE 90, 9 (2002), 1495-1517.Google ScholarCross Ref
- YongFeng Huang and ShanYu Tang. 2016. Covert voice over internet protocol communications based on spatial model. Science China Technological Sciences 59 (2016), 117-127.Google ScholarCross Ref
- Zhijun Wu, Junjun Guo, Chenlei Zhang, and Changliang Li. 2021. Steganography and Steganalysis in Voice over IP: A Review. Sensors 21, 4 (2021), 1032.Google ScholarCross Ref
- Bo Xiao, Yongfeng Huang, Shanyu Tang. 2008. An approach to information hiding in low bit-rate speech stream. In 2008 IEEE Global Telecommunications Conference. IEEE, New Orleans, LA, USA, 1-5.Google ScholarCross Ref
- Junhui He, Junxi Chen, Shichang Xiao, Xiaoyu Huang, and Shaohua Tang. 2018. A novel AMR-WB speech steganography based on diameter-neighbor codebook partition. Security and Communication Networks 2018, 1-11.Google ScholarDigital Library
- Yongfeng Huang, Chenghao Liu, Shanyu Tang and Sen Bai. 2012. Steganography integration into a Low-Bit rate speech codec. IEEE Transactions on Information Forensics and Security 7, 6 (2012), 1865-1875.Google ScholarDigital Library
- Shufan Yan, Guangming Tang and Yifeng Sun. 2015. A low-rate speech steganography based on pitch period prediction. Application Research of Computers, 06 (2015), 180-183.Google Scholar
- Geiser Bernd, and Peter Vary. 2008. High rate data hiding in ACELP speech codecs. In 2008 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, Las Vegas, NV, USA, 4005-4008.Google Scholar
- Haibo Miao, Liusheng Huang, Zhili Chen and Wei Yang and Ammar hawbani. 2012. A new scheme for covert communication via 3G encoded speech. Computers & Electrical Engineering 38, 6 (2012), 1490-1501.Google ScholarDigital Library
- Zinan Lin, Yongfeng Huang and Jilong Wang. 2018. RNN-SM: Fast steganalysis of VoIP streams using recurrent neural network. IEEE Transactions on Information Forensics and Security 13, 7 (2018), 1854-1868.Google ScholarCross Ref
- Hao Yang, ZhongLiang Yang, YongJian Bao, Sheng Liu and YongFeng Huang. 2019. Fast steganalysis method for VoIP streams. IEEE Signal Processing Letters 27, 286-290.Google ScholarCross Ref
- Chen Gong, Xiaowei Yi, Xianfeng Zhao, and Yi Ma. 2019. Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'19). Association for Computing Machinery, New York, NY, USA, 2–13.Google ScholarDigital Library
- Songbin Li, Jingang Wang, Peng Liu, Miao Wei, and Qiandong Yan. 2021. Detection of Multiple Steganography Methods in Compressed Speech Based on Code Element Embedding, Bi-LSTM and CNN with Attention Mechanisms. IEEE/ACM Trans. Audio, Speech and Lang. Proc. 29 (2021), 1556–1569.Google ScholarDigital Library
- Yuting Hu, Yihua Huang, Zhongliang Yang and Yongfeng Huang. 2020. Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams. Neurocomputing 419 (2020), 70-79.Google ScholarCross Ref
- Huili Wang, Zhongliang Yang, Yuting Hu, Zhen Yang, and Yongfeng Huang. 2021. Fast Detection of Heterogeneous Parallel Steganography for Streaming Voice. In Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec '21). ACM, New York, NY, USA, 137–142.Google ScholarDigital Library
- Xinjie Lin, Gang Xiong, Gaopeng Gou, Zhen Li, Junzheng Shi, and Jing Yu. 2022. ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification. In Proceedings of the ACM Web Conference 2022 (WWW '22). ACM, New York, NY, USA, 633–642.Google ScholarDigital Library
- Jianing Li, Jingdong Wang, Qi Tian, Wen Gao and Shiliang Zhang. 2019. Global-local temporal representations for video person re-identification. Proceedings of the IEEE/CVF International Conference on Computer Vision. IEEE, 3958-3967.Google ScholarCross Ref
Index Terms
- A Novel Global-Local Representations Network for Speech Steganalysis
Recommendations
Steganalysis of YASS
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and securityIn this paper, we describe a method for attacking Yet Another Steganographic Scheme (YASS), which is designed to be a very secure JPEG steganographic algorithm. The success of YASS is attributed to its innovation in embedding, i.e., hiding data in ...
Steganalysis of YASS
A promising steganographic method--Yet Another Steganography Scheme (YASS)--was designed to resist blind steganalysis via embedding data in randomized locations. In addition to a concrete realization which is named the YASS algorithm in this paper, a ...
Implementation of Least Significant Bit Steganography and statistical steganalysis
CCSEIT '12: Proceedings of the Second International Conference on Computational Science, Engineering and Information TechnologyLeast Significant Bit (LSB) Steganography is a method for hidden information in such a way that can only be detected by its intended recipient. Steganography in Digital media becomes a challenging discipline, since the Human Auditory System (HAS) is ...
Comments