General Steganalysis Method of Compressed Speech Under Different Standards

被引:1
作者
Liu, Peng [1 ]
Li, Songbin [1 ]
Yan, Qiandong [1 ]
Wang, Jingang [1 ]
Zhang, Cheng [2 ]
机构
[1] Chinese Acad Sci, Inst Acoust, Beijing 100190, Peoples R China
[2] Univ Melbourne, Melbourne, Vic 3010, Australia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 68卷 / 02期
基金
海南省自然科学基金;
关键词
Cross-standard; compressed speech; steganalysis; attention;
D O I
10.32604/cmc.2021.016635
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Analysis-by-synthesis linear predictive coding (AbS-LPC) is widely used in a variety of low-bit-rate speech codecs. Most of the current steganalysis methods for AbS-LPC low-bit-rate compressed speech steganography are specifically designed for a specific coding standard or category of steganography methods, and thus lack generalization capability. In this paper, a general steganalysis method for detecting steganographies in low-bit-rate compressed speech under different standards is proposed. First, the code-element matrices corresponding to different coding standards are concatenated to obtain a synthetic code-element matrix, which will be mapped into an intermediate feature representation by utilizing the pre-trained dictionaries. Then, bidirectional long short-term memory is employed to capture long-term contextual correlations. Finally, a code-element affinity attention mechanism is used to capture the global inter-frame context, and a full connection structure is used to generate the prediction result. Experimental results show that the proposed method is effective and better than the comparison methods for detecting steganographies in cross-standard low-bit-rate compressed speech.
引用
收藏
页码:1565 / 1574
页数:10
相关论文
共 34 条
[1]   An Approach to Information Hiding in Low Bit-rate Speech Stream [J].
Bo, Xiao ;
Yongfeng, Huang ;
Tang, Shanyu .
GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
[2]  
Das R, 2019, COMPUT SYST SCI ENG, V34, P23
[3]   High rate data hiding in ACELP speech codecs [J].
Geiser, Bernd ;
Vary, Peter .
2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, :4005-4008
[4]   Voice over Internet protocol (VoIP) [J].
Goode, B .
PROCEEDINGS OF THE IEEE, 2002, 90 (09) :1495-1517
[5]   Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams [J].
Hu, Yuting ;
Huang, Yihua ;
Yang, Zhongliang ;
Huang, Yongfeng .
NEUROCOMPUTING, 2021, 419 :70-79
[6]   Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec [J].
Huang, Yong Feng ;
Tang, Shanyu ;
Yuan, Jian .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) :296-306
[7]   Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys [J].
Huang YongFeng ;
Tao HuaiZhou ;
Xiao Bo ;
Chang ChinChen .
SCIENCE CHINA-TECHNOLOGICAL SCIENCES, 2017, 60 (10) :1585-1596
[8]   Steganography Integration Into a Low-Bit Rate Speech Codec [J].
Huang, Yongfeng ;
Liu, Chenghao ;
Tang, Shanyu ;
Bai, Sen .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) :1865-1875
[9]   An efficient and secure VoIP communication system with chaotic mapping and message digest [J].
Jiang, Yijing ;
Tang, Shanyu .
MULTIMEDIA SYSTEMS, 2018, 24 (03) :355-363
[10]  
Jin Liu, 2012, IEEE International Conference on Communications (ICC 2012), P1133, DOI 10.1109/ICC.2012.6363997