A CNN Based Audio Steganalysis Algorithm by Manual Feature Extraction and Result Merging

被引:0
作者
Li J.-X. [1 ]
Hu R.-W. [1 ]
Ruan G.-Q. [1 ]
Xiang S.-J. [1 ]
机构
[1] College of Information Science and Technology/College of Cyber Security, Jinan University, Guangzhou
来源
Jisuanji Xuebao/Chinese Journal of Computers | 2021年 / 44卷 / 10期
基金
中国国家自然科学基金;
关键词
Convolutional neural network; G.729A; Manual feature extraction; Result merging; Steganalysis;
D O I
10.11897/SP.J.1016.2021.02061
中图分类号
学科分类号
摘要
With the rapid development of Internet technology, IP-based voice transmission technology has emerged. While bringing convenience to people, it also brings many security risks. The criminals using VoIP voice transmission protocol in compressed domains to transmit secret information has brought great challenges to social security. In this paper, for the pitch steganography algorithm and the quantized index modulation audio steganography algorithm of complementary neighbor vertex based on G.729A encoding, an audio steganalysis algorithm based on manual feature extraction and convolutional neural network is proposed. By combining manually extracted features with convolutional neural networks, it is possible to achieve effective detection of both the quantized index modulation audio steganography algorithm of complementary neighbor vertex and the pitch-based steganography algorithm in the VoIP compressed domain. Specifically, the algorithm proposed in this paper firstly extracts manual features from the G.729A speech segment (including two manual features extracted by the pitch steganography algorithm and three manual features extracted by the quantized index modulation audio steganography algorithm with complementary neighbor vertex). After using audio steganography algorithm to steganography audio samples, the five extracted manual features have been changed to vary degrees. Therefore, these five manual features can be used as one of the basis for judging whether the audio samples contain secret information. Then, after extracting the five manual features, this paper designs two different convolutional neural networks for the pitch steganography algorithm and the quantized index modulation audio steganography algorithm with complementary neighbor vertex. The two extracted manual features for the pitch steganography algorithm and the three manual features for the quantized index modulation audio steganography algorithm based on complementary neighbor vertex are input into the two different convolutional neural networks, respectively. Immediately afterwards, the two convolutional neural networks will further extract and discriminate the input manual features, and obtain the steganalysis results based on the pitch audio steganography algorithm and the quantized index modulation audio steganography algorithm with complementary neighbor vertex, respectively. Finally, according to a designed fusion rule, the network merges the two discriminant results to obtain the final discriminant result, that is, the network discriminates whether the input audio sample contains steganographic information. In summary, the algorithm proposed in this paper extracts features manually from the audio samples encoded by G.729A, and combines the manually extracted features with the convolutional neural network, which can effectively perform steganalysis and detection on the pitch audio steganography algorithm and the quantized index modulation audio steganography algorithm with complementary neighbor vertex in the VoIP compression domain. The experimental results show that in detecting both the pitch steganography algorithm and the quantized index modulation audio steganography algorithm with complementary neighbor vertex at the same time, the detection accuracy rate of the proposed audio steganalysis algorithm based on manual feature extraction and the convolutional neural network proposed in this paper can reach 86.2% (when the embedding rate is 100% and the audio sample duration is 0.1s). Compared with the existing excellent steganalysis algorithms, the algorithm proposed in this paper has achieved state-of-the-art detection results when the audio duration is shorter. © 2021, Science Press. All right reserved.
引用
收藏
页码:2061 / 2075
页数:14
相关论文
共 22 条
  • [1] Wei-Qi Luo, Yue Zhang, Hao-Dong Li, Adaptive audio steganography based on advanced audio coding and syndrome-trellis coding, International Workshop on Digital Watermarking, pp. 177-186, (2017)
  • [2] Wu Jun-Qi, Chen Bo-Lin, Luo Wei-Qi, Fang Yan-Mei, Audio steganography based on iterative adversarial attacks against convolutional neural networks, IEEE Transactions on Information Forensics and Security, 15, pp. 2282-2294, (2020)
  • [3] Hamza Kheddar, Merouane Bouzid, David Megias, Pitch and fourier magnitude based steganography for hiding 2.4 kbps melp bitstream, IET Signal Processing, 13, 3, pp. 396-407, (2019)
  • [4] Tian Hui, Sun Jun, Chang Chin-Chen, Qin Jie, Hiding information into voice-over-ip streams using adaptive bitrate modulation, IEEE Communications Letters, 21, 4, pp. 749-752, (2017)
  • [5] Ko Hung-Jui, Huang Cheng-Ta, Horng Gwoboa, Wang Shiuh-Jeng, Robust and blind image watermarking in DCT domain using inter-block coefficient correlation, Information Sciences, 517, pp. 128-147, (2020)
  • [6] Xiang Shi-Jun, He Jia-Yong, Database authentication watermarking algorithm in order preserving encrypted domain, Journal of Software, 29, 12, pp. 3837-3852, (2018)
  • [7] Xiang Shi-Jun, Yang Le, Robust and reversible image watermarking algorithm in homomorphic encrypted domain, Journal of Software, 29, pp. 957-972, (2018)
  • [8] Hamzeh Ghasemzadeh, H. H., Kayvanrad Mohammad, Comprehensive review of audio steganalysis methods, IET Signal Processing, 12, 6, pp. 673-687, (2018)
  • [9] Hamzeh Ghasemzadeh, Kayvanrad Mohammad H., Universal audio steganalysis based on calibration and reversed frequency resolution of human auditory system, IET Signal Processing, 11, 8, pp. 916-922, (2017)
  • [10] Yang Jie, Li Song-Bin, Steganalysis of joint codeword quantization index modulation steganography based on codeword bayesian network, Neurocomputing, 313, pp. 316-323, (2018)