Steganalysis of Compressed Speech Based on Global and Local Correlation Mining

被引:2
|
作者
Wang, Jiawei [1 ]
Yang, Jie [1 ]
Gao, Feipeng [1 ]
Xu, Peng [1 ]
机构
[1] Zhejiang A&F Univ, Jiyang Coll, Zhuji 311800, Peoples R China
来源
IEEE ACCESS | 2022年 / 10卷
关键词
Correlation; Steganography; Speech coding; Feature extraction; Indexes; Convolution; Bayes methods; Correlation mining; compressed speech; deep learning; steganography; steganalysis; INDEX MODULATION STEGANOGRAPHY;
D O I
10.1109/ACCESS.2022.3194051
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the existing steganalysis methods are designed for specific steganography methods in low-bit-rate compressed speech stream and lack of generalization ability. In practical applications, the steganography methods in compressed speech are various and cannot be predicted in advance. We can only employ numerous possible steganalysis method to detect, which is laborious and time-consuming, and cannot achieve real-time detection. Therefore, it is necessary to develop a general steganalysis method that can detect multiple steganography methods simultaneously for compressed speech. To this end, a steganalysis method based on global and local correlation mining is proposed in this paper. Firstly, a codeword distributed embedding module is introduced to transform the compressed codewords into a compact feature representation. Then, global-guided correlation mining module and local-guided correlation mining module are used to extract the correlation change before and after steganography in the view of global and local. Finally, the detection results can be obtained by the full connection layers. Experimental results show that the proposed method can reach a better detection performance than the existing steganalysis methods at different embedding rates and speech lengths.
引用
收藏
页码:78472 / 78483
页数:12
相关论文
共 50 条
  • [21] Frame-level steganalysis of QIM steganography in compressed speech based on multi-dimensional perspective of codeword correlations
    Wei, Miao
    Li, Songbin
    Liu, Peng
    Huang, Yongfeng
    Yan, Qiandong
    Wang, Jingang
    Zhang, Cheng
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (7) : 8421 - 8431
  • [22] Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography
    Fan, MingQuan
    Liu, PeiPei
    Wang, HongXia
    Sun, XingMing
    TELECOMMUNICATION SYSTEMS, 2016, 63 (04) : 523 - 529
  • [23] Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography
    MingQuan Fan
    PeiPei Liu
    HongXia Wang
    XingMing Sun
    Telecommunication Systems, 2016, 63 : 523 - 529
  • [24] Steganalysis of AMR Speech Based on Multiple Classifiers Combination
    Tian, Hui
    Liu, Jie
    Chang, Chin-Chen
    Chen, Chih-Cheng
    Huang, Yongfeng
    IEEE ACCESS, 2019, 7 : 140957 - 140968
  • [25] Speech steganalysis based on the delay vector variance method
    Kocal, Osman Hilmi
    Yuruklu, Emrah
    Dilaveroglu, Erdogan
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2016, 24 (05) : 4129 - 4141
  • [26] F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network
    Guo, Chuanpeng
    Yang, Wei
    Shuai, Mengxia
    Huang, Liusheng
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [27] Local Speech, Global Speech: The Languages of World Literature
    Lukaszyk, Ewa A.
    TEKSTY DRUGIE, 2021, (04): : 60 - 78
  • [28] LSBR Speech Steganalysis Based on Percent of Equal Adjacent Sample
    Yazdanpanah, Saeid
    Kheyrandish, Mohammad
    Mosleh, Mohammad
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2022, 31 (06)
  • [29] Compressed Sensing based Speech Enhancement
    Firouzeh, Fereshteh Fakhar
    Ghorshi, Seyed
    Salsabili, Sina
    2014 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2014,
  • [30] Blind image steganalysis based on wavelet coefficient correlation
    Zong, Han
    Liu, Fen-lin
    Luo, Xiang-yang
    DIGITAL INVESTIGATION, 2012, 9 (01) : 58 - 68