scispace - formally typeset
Open AccessJournal ArticleDOI

A Common Method for Detecting Multiple Steganographies in Low-Bit-Rate Compressed Speech Based on Bayesian Inference

Jie Yang, +2 more
- 05 Sep 2019 - 
- Vol. 7, pp 128313-128324
TLDR
Experimental results demonstrate that the proposed method performs better than the existing steganalysis methods for detecting multiple steganographies in the AbS-LPC low-bit-rate compressed speech.
Abstract
Analysis-by-synthesis linear predictive coding (AbS-LPC) is widely used in a variety of low-bit-rate speech codecs. The existing steganalysis methods for AbS-LPC low-bit-rate compressed speech steganography are specifically designed for one certain category of steganography methods, thus lacking generalization capability. In this paper, a common method for detecting multiple steganographies in low-bit-rate compressed speech based on a code element Bayesian network is proposed. In an AbS-LPC low-bit-rate compressed speech stream, spatiotemporal correlations exist between the code elements, and steganography will eventually change the values of these code elements. Thus, the method presented in this paper is developed from the code element perspective. It consists of constructing a code element Bayesian network based on the strong correlations between code elements, learning the network parameters by utilizing a Dirichlet distribution as the prior distribution, and finally implementing steganalysis based on Bayesian inference. Experimental results demonstrate that the proposed method performs better than the existing steganalysis methods for detecting multiple steganographies in the AbS-LPC low-bit-rate compressed speech.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Detection of Multiple Steganography Methods in Compressed Speech Based on Code Element Embedding, Bi-LSTM and CNN With Attention Mechanisms

TL;DR: Wang et al. as mentioned in this paper proposed a general steganalysis method based on code element embedding, Bi-LSTM and CNN with attention mechanisms for low-bit-rate compressed speech.
Journal ArticleDOI

Steganography and Steganalysis in Voice over IP: A Review

TL;DR: In this paper, the authors classified recent research results of steganography and steganalysis based on protocol and voice payload, and also summarized their characteristics, advantages, and disadvantages.
Journal ArticleDOI

Modeling the Progression of Speech Deficits in Cerebellar Ataxia Using a Mixture Mixed-Effect Machine Learning Framework

TL;DR: In this article, a machine learning framework with a robust three-step feature selection criterion and a Bayesian data-driven clustering technique based on the multivariate mixture extension of the generalized linear mixed model (GLMM) was used.
Journal ArticleDOI

Steganalysis of Compressed Speech Based on Association Rule Mining

- 01 Jan 2022 - 
TL;DR: Wang et al. as mentioned in this paper proposed a steganalysis method based on codeword association rule mining (CARM), which can detect whether an illegal secret message is embedded in a compressed speech.
Journal ArticleDOI

Steganalysis of Compressed Speech Based on Global and Local Correlation Mining

TL;DR: A steganalysis method based on global and local correlation mining that can detect multiple steganography methods simultaneously for compressed speech and can reach a better detection performance at different embedding rates and speech lengths is proposed.
References
More filters
Journal ArticleDOI

Quantization index modulation: a class of provably good methods for digital watermarking and information embedding

TL;DR: It is shown that QIM is "provably good" against arbitrary bounded and fully informed attacks, and achieves provably better rate distortion-robustness tradeoffs than currently popular spread-spectrum and low-bit(s) modulation methods.
Journal ArticleDOI

Hide and seek: an introduction to steganography

TL;DR: This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis and discusses the practical application of detection algorithms and the mechanisms for getting around them.
Journal ArticleDOI

Universal distortion function for steganography in an arbitrary domain

TL;DR: This paper proposes a universal distortion design called universal wavelet relative distortion (UNIWARD) that can be applied for embedding in an arbitrary domain and demonstrates experimentally using rich models as well as targeted attacks that steganographic methods built using UNIWARD match or outperform the current state of the art in the spatial domain, JPEG domain, and side-informed JPEG domain.
Book ChapterDOI

Using high-dimensional image models to perform highly undetectable steganography

TL;DR: A complete methodology for designing practical and highly-undetectable stegosystems for real digital media and explains why high-dimensional models might be problem in steganalysis, and introduces HUGO, a new embedding algorithm for spatial-domain digital images and its performance with LSB matching.
Proceedings ArticleDOI

Designing steganographic distortion using directional filters

TL;DR: A new approach to defining additive steganographic distortion in the spatial domain, where the change in the output of directional high-pass filters after changing one pixel is weighted and then aggregated using the reciprocal Hölder norm to define the individual pixel costs.
Related Papers (5)