Audio steganalysis using multi-scale feature fusion-based attention neural network

被引:0
作者
Peng, Jinghui [1 ,2 ]
Liao, Yi [1 ]
Tang, Shanyu [2 ]
机构
[1] Guangdong Polytech Normal Univ, Sch Cyber Secur, Guangzhou, Guangdong, Peoples R China
[2] Univ West London, Cybersecur & Criminol Ctr, St Marys Rd, London W5 5RF, England
关键词
computer network security; cryptography; multimedia communication; SCHEME;
D O I
10.1049/cmu2.12806
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Deep learning techniques have shown promise in audio steganalysis, which involves detecting the presence of hidden information (steganography) in audio files. However, deep learning models are prone to overfitting, particularly when there is limited data or when the model architecture is too complex relative to the available data for VoIP steganography. To address these issues, new deep-learning approaches need to be explored. In this study, a new convolutional neural network for audio steganalysis, incorporating a multi-scale feature fusion method and an attention mechanism, was devised to enhance the detection of steganographic content in audio signals encoded with G729a. To improve the network's adaptability, a multi-scale parallel multi-branch architecture was employed, allowing characteristic signals to be sampled with varying granularities and adjusting the receptive field effectively. The attention mechanism enables weight learning on the feature information after multi-scale processing, capturing the most relevant information for steganalysis. By combining multiple feature representations using a weighted combination, the deep learning model's performance was significantly enhanced. Through rigorous experimentation, an impressive accuracy rate of 94.55% was achieved in detecting malicious steganography. This outcome demonstrates the efficacy of the proposed neural network, leveraging both the multi-scale feature fusion method and the attention mechanism.
引用
收藏
页数:9
相关论文
共 30 条
[1]   A Sparse Representation-Based Wavelet Domain Speech Steganography Method [J].
Ahani, Soodeh ;
Ghaemmaghami, Shahrokh ;
Wang, Z. Jane .
IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2015, 23 (01) :80-91
[2]  
Bin Li, 2018, IEEE Signal Processing Letters, V25, P650, DOI [10.1109/lsp.2018.2816569, 10.1109/LSP.2018.2816569]
[3]   An Approach to Information Hiding in Low Bit-rate Speech Stream [J].
Bo, Xiao ;
Yongfeng, Huang ;
Tang, Shanyu .
GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
[4]   Deep Residual Network for Steganalysis of Digital Images [J].
Boroumand, Mehdi ;
Chen, Mo ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1181-1193
[5]   Audio Steganalysis With Convolutional Neural Network [J].
Chen, Bolin ;
Luo, Weiqi ;
Li, Haodong .
IH&MMSEC'17: PROCEEDINGS OF THE 2017 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2017, :85-90
[6]   Generative Adversarial Networks: A Literature Review [J].
Cheng, Jieren ;
Yang, Yue ;
Tang, Xiangyan ;
Xiong, Naixue ;
Zhang, Yuan ;
Lei, Feifei .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (12) :4625-4647
[7]  
Fridrich, 2014, STEGANOGRAPHY DIGITA, P107
[8]   ITCN: An Intelligent Trust Collaboration Network System in IoT [J].
Guo, Jialin ;
Liu, Anfeng ;
Ota, Kaoru ;
Dong, Mianxiong ;
Deng, Xiaoheng ;
Xiong, Naixue .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (01) :203-218
[9]  
Lee D., 2020, P 2020 ACM WORKSHOP, P11
[10]   Detection of Multiple Steganography Methods in Compressed Speech Based on Code Element Embedding, Bi-LSTM and CNN With Attention Mechanisms [J].
Li, Songbin ;
Wang, Jingang ;
Liu, Peng ;
Wei, Miao ;
Yan, Qiandong .
IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2021, 29 :1556-1569