Skip to main content
Erschienen in: Soft Computing 3/2017

06.08.2015 | Methodologies and Application

Distributed steganalysis of compressed speech

verfasst von: Hui Tian, Yanpeng Wu, Yiqiao Cai, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Jing Lu

Erschienen in: Soft Computing | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we present a distributed steganalysis scheme for compressed speech in voice-over-IP scenarios to provide fast and precise detection results. In this scheme, each speech parameter available for concealing information is designed to be detected independently exploiting the corresponding optimal detection feature. To achieve this purpose, we introduce four detection features, including histogram distribution, differential histogram distribution, Markov transition matrix and differential Markov transition matrix. These features stem from both long-time distribution characteristics and short-time invariance characteristics of speech signals. We evaluate their performance for steganalysis based on support vector machines with a large number of steganographic G.729a speech samples at different embedding rates or with various sample lengths and compare them with some existing algorithms. The experimental results demonstrate that the presented algorithms can offer excellent steganalysis performance for all speech parameters in any case and outperform the previous ones. Moreover, it is proved that the four features have diverse performance for steganalysis of different speech parameters, which suggests that it is feasible to achieve the distributed steganalysis employing the optimal feature to detect the corresponding parameter in a faster and more efficient manner.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Bao C, Huang Y, Zhu C (2006) Steganalysis of compressed speech. In: Proceedings of the international multi-conference on computational engineering in systems applications, vol 1. IEEE, pp 5–10. doi:10.1109/CESA.2006.4281614 Bao C, Huang Y, Zhu C (2006) Steganalysis of compressed speech. In: Proceedings of the international multi-conference on computational engineering in systems applications, vol 1. IEEE, pp 5–10. doi:10.​1109/​CESA.​2006.​4281614
Zurück zum Zitat Bai LY, Huang Y, Hou G, Xiao B (2008) Covert channels based on jitter field of the rtcp header. In: Proceedings of the 4th international conference on intelligent information hiding and multimedia signal processing. IEEE, pp 1388–1391. doi:10.1109/IIH-MSP.2008.169 Bai LY, Huang Y, Hou G, Xiao B (2008) Covert channels based on jitter field of the rtcp header. In: Proceedings of the 4th international conference on intelligent information hiding and multimedia signal processing. IEEE, pp 1388–1391. doi:10.​1109/​IIH-MSP.​2008.​169
Zurück zum Zitat Cai Y, Wang J, Chen Y, Wang T, Tian H, Luo W (2014) Adaptive direction information in differential evolution for numerical optimization. Soft Comput 1–30. doi:10.1007/s00500-014-1517-0 Cai Y, Wang J, Chen Y, Wang T, Tian H, Luo W (2014) Adaptive direction information in differential evolution for numerical optimization. Soft Comput 1–30. doi:10.​1007/​s00500-014-1517-0
Zurück zum Zitat Castiglione A, Santis AD, Soriente C (2007) Taking advantages of a disadvantage: digital forensics and steganography using document metadata. J Syst Softw 80(5):50–764CrossRef Castiglione A, Santis AD, Soriente C (2007) Taking advantages of a disadvantage: digital forensics and steganography using document metadata. J Syst Softw 80(5):50–764CrossRef
Zurück zum Zitat Castiglione A, D’Alessio B, Santis AD (2011a) Steganography and secure communication on online social networks and online photo sharing. In: Proceedings of 2011 international conference on broadband and wireless computing, communication and applications (BWCCA), Barcelona, Spain, October 2011, pp 363–368. doi:10.1109/BWCCA.2011.60 Castiglione A, D’Alessio B, Santis AD (2011a) Steganography and secure communication on online social networks and online photo sharing. In: Proceedings of 2011 international conference on broadband and wireless computing, communication and applications (BWCCA), Barcelona, Spain, October 2011, pp 363–368. doi:10.​1109/​BWCCA.​2011.​60
Zurück zum Zitat Castiglione A, Santis AD, Fiore U, et al (2011b) E-mail-based covert channels for asynchronous message steganography. In: Proceedings of 2011 fifth international conference on innovative mobile and internet services in ubiquitous computing (IMIS), Seoul, Korea, 30 June–2 July 2011, pp 503-508. doi:10.1109/IMIS.2011.133 Castiglione A, Santis AD, Fiore U, et al (2011b) E-mail-based covert channels for asynchronous message steganography. In: Proceedings of 2011 fifth international conference on innovative mobile and internet services in ubiquitous computing (IMIS), Seoul, Korea, 30 June–2 July 2011, pp 503-508. doi:10.​1109/​IMIS.​2011.​133
Zurück zum Zitat Castiglione A, D’Alessio B, Santis AD et al (2011c) New steganographic techniques for the OOXML file format. In: Proceedings of 2011 IFIP WG 8.4/8.9 international cross domain conference and workshop, Vienna, Austria, August 2011, pp 344–358. doi:10.1007/978-3-642-23300-5_27 Castiglione A, D’Alessio B, Santis AD et al (2011c) New steganographic techniques for the OOXML file format. In: Proceedings of 2011 IFIP WG 8.4/8.9 international cross domain conference and workshop, Vienna, Austria, August 2011, pp 344–358. doi:10.​1007/​978-3-642-23300-5_​27
Zurück zum Zitat Castiglione A, D’Alessio B, Santis AD (2011d) Hiding information into OOXML documents: new steganographic perspectives. J Wirel Mobile Netw Ubiquitous Comput Dependable Appl 2(4):59–83 Castiglione A, D’Alessio B, Santis AD (2011d) Hiding information into OOXML documents: new steganographic perspectives. J Wirel Mobile Netw Ubiquitous Comput Dependable Appl 2(4):59–83
Zurück zum Zitat Dittmann J, Hesse D, Hillert R (2005) Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. In: Proceedings of the SPIE 2005, security, steganography, and watermarking of multimedia contents VII, SPIE, vol 5681, pp 607–618. doi:10.1117/12.586579 Dittmann J, Hesse D, Hillert R (2005) Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. In: Proceedings of the SPIE 2005, security, steganography, and watermarking of multimedia contents VII, SPIE, vol 5681, pp 607–618. doi:10.​1117/​12.​586579
Zurück zum Zitat Ding Q, Ping X (2010a) Steganalysis of compressed speech based on histogram features. In: Proceedings of the 2010 international conference on wireless communications, networking and mobile computing. IEEE, pp 1–4. doi:10.1109/WICOM.2010.5600125 Ding Q, Ping X (2010a) Steganalysis of compressed speech based on histogram features. In: Proceedings of the 2010 international conference on wireless communications, networking and mobile computing. IEEE, pp 1–4. doi:10.​1109/​WICOM.​2010.​5600125
Zurück zum Zitat Ding Q, Ping X (2010b) Steganalysis of analysis-by-synthesis compressed speech. In: Proceedings of the 2010 international conference on multimedia information networking and security, IEEE, pp 681–685. doi:10.1109/MINES.2010.148 Ding Q, Ping X (2010b) Steganalysis of analysis-by-synthesis compressed speech. In: Proceedings of the 2010 international conference on multimedia information networking and security, IEEE, pp 681–685. doi:10.​1109/​MINES.​2010.​148
Zurück zum Zitat ITU-T Recommendation P. 862 (2001) Perceptual evaluation of speech quality (PESQ): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. International Telecommunications Union, Geneva, Switzerland ITU-T Recommendation P. 862 (2001) Perceptual evaluation of speech quality (PESQ): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. International Telecommunications Union, Geneva, Switzerland
Zurück zum Zitat Kräetzer C, Dittmann J (2007) Mel-cepstrum-based steganalysis for VoIP steganography. In: Proceedings of international society for optics and photonics, electronic imaging, SPIE, 650 505-650505-12. doi:10.1117/12.704040 Kräetzer C, Dittmann J (2007) Mel-cepstrum-based steganalysis for VoIP steganography. In: Proceedings of international society for optics and photonics, electronic imaging, SPIE, 650 505-650505-12. doi:10.​1117/​12.​704040
Zurück zum Zitat Li S, Tao H, Huang Y (2012) Detection of quantization index modulation steganography in G. 723.1 bit stream based on quantization index sequence analysis. J Zhejiang Univ Sci C 13(8):624–634CrossRef Li S, Tao H, Huang Y (2012) Detection of quantization index modulation steganography in G. 723.1 bit stream based on quantization index sequence analysis. J Zhejiang Univ Sci C 13(8):624–634CrossRef
Zurück zum Zitat Miao R, Huang Y (2011) An approach of covert communication based on the adaptive steganography scheme on voice over IP. In: Proceedings of the 46th IEEE international conference on communications. IEEE, pp 1–5. doi:10.1109/icc.2011.5962657 Miao R, Huang Y (2011) An approach of covert communication based on the adaptive steganography scheme on voice over IP. In: Proceedings of the 46th IEEE international conference on communications. IEEE, pp 1–5. doi:10.​1109/​icc.​2011.​5962657
Zurück zum Zitat Su Y, Huang Y, Li X (2006) Steganography-oriented noisy resistance model of G.729a. In: Proceedings of the 2006 multi-conference on computational engineering in systems applications. IEEE, pp 11–15. doi:10.1109/CESA.2006.4281615 Su Y, Huang Y, Li X (2006) Steganography-oriented noisy resistance model of G.729a. In: Proceedings of the 2006 multi-conference on computational engineering in systems applications. IEEE, pp 11–15. doi:10.​1109/​CESA.​2006.​4281615
Zurück zum Zitat Tian H, Zhou K, Huang Y et al (2008) A covert communication model based on least significant bits steganography in voice over IP. In: Proceedings of the 9th international conference for young computer scientists. IEEE, pp 647–652. doi:10.1109/ICYCS.2008.394 Tian H, Zhou K, Huang Y et al (2008) A covert communication model based on least significant bits steganography in voice over IP. In: Proceedings of the 9th international conference for young computer scientists. IEEE, pp 647–652. doi:10.​1109/​ICYCS.​2008.​394
Zurück zum Zitat Tian H, Guo R, Lu J, Chen Y (2012) Implementing covert communication over voice conversations with windows live messenger. Adv Inf Sci Serv Sci 4(4):18–26 Tian H, Guo R, Lu J, Chen Y (2012) Implementing covert communication over voice conversations with windows live messenger. Adv Inf Sci Serv Sci 4(4):18–26
Zurück zum Zitat Wu Z, Cao H, Li D (2015) An approach of steganography in G.729 bitstream based on matrix coding and interleaving. Chin J Electron 24(1):157–165CrossRef Wu Z, Cao H, Li D (2015) An approach of steganography in G.729 bitstream based on matrix coding and interleaving. Chin J Electron 24(1):157–165CrossRef
Metadaten
Titel
Distributed steganalysis of compressed speech
verfasst von
Hui Tian
Yanpeng Wu
Yiqiao Cai
Yongfeng Huang
Jin Liu
Tian Wang
Yonghong Chen
Jing Lu
Publikationsdatum
06.08.2015
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 3/2017
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-015-1816-0

Weitere Artikel der Ausgabe 3/2017

Soft Computing 3/2017 Zur Ausgabe