Detection of Multiple Steganography Methods in Compressed Speech Based on Code Element Embedding, Bi-LSTM and CNN With Attention Mechanisms

被引:20
作者
Li, Songbin [1 ]
Wang, Jingang [1 ,2 ]
Liu, Peng [1 ]
Wei, Miao [1 ]
Yan, Qiandong [1 ]
机构
[1] Chinese Acad Sci, Inst Acoust, Beijing 100190, Peoples R China
[2] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
基金
海南省自然科学基金;
关键词
Speech coding; Correlation; Feature extraction; Speech processing; Support vector machines; Dictionaries; Indexes; Compressed speech; steganalysis; Bi-LSTM; CNN; QUANTIZATION INDEX MODULATION; STEGANALYSIS; WATERMARKING;
D O I
10.1109/TASLP.2021.3074752
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
Steganographic algorithms in low-bit-rate compressed speech bring convenience to realize covert communication, meanwhile result in safety issues. The existing steganalysis methods are normally designed for one specific category of steganographic methods, thus lacking generalization capability. In this paper, we propose a general steganalysis method based on code element (CE) embedding, Bi-LSTM and CNN with attention mechanisms. Firstly, CEs in each frame are converted to a multi-hot vector. And each multi-hot vector will be mapped into a fixed-length embedding vector to get a more compact representation by utilizing dictionaries. Then, Bi-LSTM and CNN are applied to extract the contextual information and the local characteristics respectively of these embedding vectors. In addition, the attention mechanisms are introduced in different layers of the network to assign different weights to the output feature within each layer. Finally, the prediction results can be generated by the fully connected layer. Experimental results show that our method performs better than the existing steganalysis methods for detecting multiple steganography methods in the low-bit-rate compressed speech streams.
引用
收藏
页码:1556 / 1569
页数:14
相关论文
共 46 条
[1]  
[Anonymous], WIRELESS COMMUNICATI, DOI DOI 10.1109/WICOM.2010.5600125
[2]  
Baluja S, 2017, ADV NEUR IN, V30
[3]   An Approach to Information Hiding in Low Bit-rate Speech Stream [J].
Bo, Xiao ;
Yongfeng, Huang ;
Tang, Shanyu .
GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
[4]  
Chang CY, 2010, P 2010 C EMP METH NA, P1194
[5]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[6]   Comparative study of digital audio steganography techniques [J].
Djebbar, Fatiha ;
Ayad, Beghdad ;
Meraim, Karim Abed ;
Hamam, Habib .
EURASIP JOURNAL ON AUDIO SPEECH AND MUSIC PROCESSING, 2012,
[7]  
Hochreiter S., 1997, Neural Computation, V9, P1735
[8]  
Hong MY, 2020, CHIN CONT DECIS CONF, P3153, DOI 10.1109/CCDC49329.2020.9164437
[9]   Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams [J].
Hu, Yuting ;
Huang, Yihua ;
Yang, Zhongliang ;
Huang, Yongfeng .
NEUROCOMPUTING, 2021, 419 :70-79
[10]   Twenty years of digital audio watermarking-a comprehensive review [J].
Hua, Guang ;
Huang, Jiwu ;
Shi, Yun Q. ;
Goh, Jonathan ;
Thing, Vrizlynn L. L. .
SIGNAL PROCESSING, 2016, 128 :222-242