Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals

被引:58
作者
Li, Songbin [1 ]
Jia, Yizhen [2 ]
Kuo, C. -C. Jay [3 ]
机构
[1] Chinese Acad Sci, Inst Acoust, Haikou Lab, Haikou 570105, Peoples R China
[2] Hainan Univ, Coll Informat Sci & Technol, Haikou 570228, Peoples R China
[3] Univ Southern Calif, Ming Hsieh Dept Elect Engn, Los Angeles, CA 90089 USA
基金
中国国家自然科学基金;
关键词
Low bit-rate speech codec; QIM steganography; steganalysis; quantization codeword correlation network; QUANTIZATION INDEX MODULATION; WATERMARKING;
D O I
10.1109/TASLP.2017.2676356
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
Steganalysis of the quantization index modulation (QIM) steganography in a low-bit-rate encoded speech stream is conducted in this research. According to the speech generation theory and the phoneme distribution properties in language, we first point out that the correlation characteristics of split vector quantization (VQ) codewords of linear predictive coding filter coefficients are changed after the QIM steganography. Based on this observation, we construct a model called the Quantization codeword correlation network (QCCN) based on split VQ codeword from adjacent speech frames. Furthermore, the QCCN model is pruned to yield a stronger correlation network. After quantifying the correlation characteristics of vertices in the pruned correlation network, we obtain feature vectors that are sensitive to steganalysis. Finally, we build a high-performance detector using the support vector machine (SVM) classifier. It is shown by experimental results that the proposed QCCN steganalysis method can effectively detect the QIM steganography in encoded speech stream when it is applied to low-bit-rate speech codec such as G.723.1 and G.729.
引用
收藏
页码:1011 / 1022
页数:12
相关论文
共 28 条
[1]  
[Anonymous], P IEEE INT S CIRC SY
[2]  
Chang C.-C., 2011, LIBSVM LIB SUPPORT V
[3]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[4]  
Chiang YK, 2008, FUND INFORM, V82, P15
[5]  
Christian K., 2007, P SOC PHOTO-OPT INS, V6505, P435
[6]   Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis [J].
Huang, Y. F. ;
Tang, S. ;
Zhang, Y. .
IET COMMUNICATIONS, 2011, 5 (07) :929-936
[7]   Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec [J].
Huang, Yong Feng ;
Tang, Shanyu ;
Yuan, Jian .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) :296-306
[8]   Implementation of covert communication based on steganography [J].
Huang Yongfeng ;
Xiao Bo ;
Xiao Honghua .
2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, :1512-1515
[9]   Steganography Integration Into a Low-Bit Rate Speech Codec [J].
Huang, Yongfeng ;
Liu, Chenghao ;
Tang, Shanyu ;
Bai, Sen .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) :1865-1875
[10]   Information Hiding for G.711 Speech Based on Substitution of Least Significant Bits and Estimation of Tolerable Distortion [J].
Ito, Akinori ;
Abe, Shun'ichiro ;
Suzuki, Yoiti .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (07) :1279-1286