Skip to main content
Top
Published in: Soft Computing 3/2017

06-08-2015 | Methodologies and Application

Distributed steganalysis of compressed speech

Authors: Hui Tian, Yanpeng Wu, Yiqiao Cai, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Jing Lu

Published in: Soft Computing | Issue 3/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we present a distributed steganalysis scheme for compressed speech in voice-over-IP scenarios to provide fast and precise detection results. In this scheme, each speech parameter available for concealing information is designed to be detected independently exploiting the corresponding optimal detection feature. To achieve this purpose, we introduce four detection features, including histogram distribution, differential histogram distribution, Markov transition matrix and differential Markov transition matrix. These features stem from both long-time distribution characteristics and short-time invariance characteristics of speech signals. We evaluate their performance for steganalysis based on support vector machines with a large number of steganographic G.729a speech samples at different embedding rates or with various sample lengths and compare them with some existing algorithms. The experimental results demonstrate that the presented algorithms can offer excellent steganalysis performance for all speech parameters in any case and outperform the previous ones. Moreover, it is proved that the four features have diverse performance for steganalysis of different speech parameters, which suggests that it is feasible to achieve the distributed steganalysis employing the optimal feature to detect the corresponding parameter in a faster and more efficient manner.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Bao C, Huang Y, Zhu C (2006) Steganalysis of compressed speech. In: Proceedings of the international multi-conference on computational engineering in systems applications, vol 1. IEEE, pp 5–10. doi:10.1109/CESA.2006.4281614 Bao C, Huang Y, Zhu C (2006) Steganalysis of compressed speech. In: Proceedings of the international multi-conference on computational engineering in systems applications, vol 1. IEEE, pp 5–10. doi:10.​1109/​CESA.​2006.​4281614
go back to reference Bai LY, Huang Y, Hou G, Xiao B (2008) Covert channels based on jitter field of the rtcp header. In: Proceedings of the 4th international conference on intelligent information hiding and multimedia signal processing. IEEE, pp 1388–1391. doi:10.1109/IIH-MSP.2008.169 Bai LY, Huang Y, Hou G, Xiao B (2008) Covert channels based on jitter field of the rtcp header. In: Proceedings of the 4th international conference on intelligent information hiding and multimedia signal processing. IEEE, pp 1388–1391. doi:10.​1109/​IIH-MSP.​2008.​169
go back to reference Cai Y, Wang J, Chen Y, Wang T, Tian H, Luo W (2014) Adaptive direction information in differential evolution for numerical optimization. Soft Comput 1–30. doi:10.1007/s00500-014-1517-0 Cai Y, Wang J, Chen Y, Wang T, Tian H, Luo W (2014) Adaptive direction information in differential evolution for numerical optimization. Soft Comput 1–30. doi:10.​1007/​s00500-014-1517-0
go back to reference Castiglione A, Santis AD, Soriente C (2007) Taking advantages of a disadvantage: digital forensics and steganography using document metadata. J Syst Softw 80(5):50–764CrossRef Castiglione A, Santis AD, Soriente C (2007) Taking advantages of a disadvantage: digital forensics and steganography using document metadata. J Syst Softw 80(5):50–764CrossRef
go back to reference Castiglione A, D’Alessio B, Santis AD (2011a) Steganography and secure communication on online social networks and online photo sharing. In: Proceedings of 2011 international conference on broadband and wireless computing, communication and applications (BWCCA), Barcelona, Spain, October 2011, pp 363–368. doi:10.1109/BWCCA.2011.60 Castiglione A, D’Alessio B, Santis AD (2011a) Steganography and secure communication on online social networks and online photo sharing. In: Proceedings of 2011 international conference on broadband and wireless computing, communication and applications (BWCCA), Barcelona, Spain, October 2011, pp 363–368. doi:10.​1109/​BWCCA.​2011.​60
go back to reference Castiglione A, Santis AD, Fiore U, et al (2011b) E-mail-based covert channels for asynchronous message steganography. In: Proceedings of 2011 fifth international conference on innovative mobile and internet services in ubiquitous computing (IMIS), Seoul, Korea, 30 June–2 July 2011, pp 503-508. doi:10.1109/IMIS.2011.133 Castiglione A, Santis AD, Fiore U, et al (2011b) E-mail-based covert channels for asynchronous message steganography. In: Proceedings of 2011 fifth international conference on innovative mobile and internet services in ubiquitous computing (IMIS), Seoul, Korea, 30 June–2 July 2011, pp 503-508. doi:10.​1109/​IMIS.​2011.​133
go back to reference Castiglione A, D’Alessio B, Santis AD et al (2011c) New steganographic techniques for the OOXML file format. In: Proceedings of 2011 IFIP WG 8.4/8.9 international cross domain conference and workshop, Vienna, Austria, August 2011, pp 344–358. doi:10.1007/978-3-642-23300-5_27 Castiglione A, D’Alessio B, Santis AD et al (2011c) New steganographic techniques for the OOXML file format. In: Proceedings of 2011 IFIP WG 8.4/8.9 international cross domain conference and workshop, Vienna, Austria, August 2011, pp 344–358. doi:10.​1007/​978-3-642-23300-5_​27
go back to reference Castiglione A, D’Alessio B, Santis AD (2011d) Hiding information into OOXML documents: new steganographic perspectives. J Wirel Mobile Netw Ubiquitous Comput Dependable Appl 2(4):59–83 Castiglione A, D’Alessio B, Santis AD (2011d) Hiding information into OOXML documents: new steganographic perspectives. J Wirel Mobile Netw Ubiquitous Comput Dependable Appl 2(4):59–83
go back to reference Dittmann J, Hesse D, Hillert R (2005) Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. In: Proceedings of the SPIE 2005, security, steganography, and watermarking of multimedia contents VII, SPIE, vol 5681, pp 607–618. doi:10.1117/12.586579 Dittmann J, Hesse D, Hillert R (2005) Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. In: Proceedings of the SPIE 2005, security, steganography, and watermarking of multimedia contents VII, SPIE, vol 5681, pp 607–618. doi:10.​1117/​12.​586579
go back to reference Ding Q, Ping X (2010a) Steganalysis of compressed speech based on histogram features. In: Proceedings of the 2010 international conference on wireless communications, networking and mobile computing. IEEE, pp 1–4. doi:10.1109/WICOM.2010.5600125 Ding Q, Ping X (2010a) Steganalysis of compressed speech based on histogram features. In: Proceedings of the 2010 international conference on wireless communications, networking and mobile computing. IEEE, pp 1–4. doi:10.​1109/​WICOM.​2010.​5600125
go back to reference Ding Q, Ping X (2010b) Steganalysis of analysis-by-synthesis compressed speech. In: Proceedings of the 2010 international conference on multimedia information networking and security, IEEE, pp 681–685. doi:10.1109/MINES.2010.148 Ding Q, Ping X (2010b) Steganalysis of analysis-by-synthesis compressed speech. In: Proceedings of the 2010 international conference on multimedia information networking and security, IEEE, pp 681–685. doi:10.​1109/​MINES.​2010.​148
go back to reference ITU-T Recommendation P. 862 (2001) Perceptual evaluation of speech quality (PESQ): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. International Telecommunications Union, Geneva, Switzerland ITU-T Recommendation P. 862 (2001) Perceptual evaluation of speech quality (PESQ): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. International Telecommunications Union, Geneva, Switzerland
go back to reference Kräetzer C, Dittmann J (2007) Mel-cepstrum-based steganalysis for VoIP steganography. In: Proceedings of international society for optics and photonics, electronic imaging, SPIE, 650 505-650505-12. doi:10.1117/12.704040 Kräetzer C, Dittmann J (2007) Mel-cepstrum-based steganalysis for VoIP steganography. In: Proceedings of international society for optics and photonics, electronic imaging, SPIE, 650 505-650505-12. doi:10.​1117/​12.​704040
go back to reference Li S, Tao H, Huang Y (2012) Detection of quantization index modulation steganography in G. 723.1 bit stream based on quantization index sequence analysis. J Zhejiang Univ Sci C 13(8):624–634CrossRef Li S, Tao H, Huang Y (2012) Detection of quantization index modulation steganography in G. 723.1 bit stream based on quantization index sequence analysis. J Zhejiang Univ Sci C 13(8):624–634CrossRef
go back to reference Miao R, Huang Y (2011) An approach of covert communication based on the adaptive steganography scheme on voice over IP. In: Proceedings of the 46th IEEE international conference on communications. IEEE, pp 1–5. doi:10.1109/icc.2011.5962657 Miao R, Huang Y (2011) An approach of covert communication based on the adaptive steganography scheme on voice over IP. In: Proceedings of the 46th IEEE international conference on communications. IEEE, pp 1–5. doi:10.​1109/​icc.​2011.​5962657
go back to reference Su Y, Huang Y, Li X (2006) Steganography-oriented noisy resistance model of G.729a. In: Proceedings of the 2006 multi-conference on computational engineering in systems applications. IEEE, pp 11–15. doi:10.1109/CESA.2006.4281615 Su Y, Huang Y, Li X (2006) Steganography-oriented noisy resistance model of G.729a. In: Proceedings of the 2006 multi-conference on computational engineering in systems applications. IEEE, pp 11–15. doi:10.​1109/​CESA.​2006.​4281615
go back to reference Tian H, Zhou K, Huang Y et al (2008) A covert communication model based on least significant bits steganography in voice over IP. In: Proceedings of the 9th international conference for young computer scientists. IEEE, pp 647–652. doi:10.1109/ICYCS.2008.394 Tian H, Zhou K, Huang Y et al (2008) A covert communication model based on least significant bits steganography in voice over IP. In: Proceedings of the 9th international conference for young computer scientists. IEEE, pp 647–652. doi:10.​1109/​ICYCS.​2008.​394
go back to reference Tian H, Guo R, Lu J, Chen Y (2012) Implementing covert communication over voice conversations with windows live messenger. Adv Inf Sci Serv Sci 4(4):18–26 Tian H, Guo R, Lu J, Chen Y (2012) Implementing covert communication over voice conversations with windows live messenger. Adv Inf Sci Serv Sci 4(4):18–26
go back to reference Wu Z, Cao H, Li D (2015) An approach of steganography in G.729 bitstream based on matrix coding and interleaving. Chin J Electron 24(1):157–165CrossRef Wu Z, Cao H, Li D (2015) An approach of steganography in G.729 bitstream based on matrix coding and interleaving. Chin J Electron 24(1):157–165CrossRef
Metadata
Title
Distributed steganalysis of compressed speech
Authors
Hui Tian
Yanpeng Wu
Yiqiao Cai
Yongfeng Huang
Jin Liu
Tian Wang
Yonghong Chen
Jing Lu
Publication date
06-08-2015
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 3/2017
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-015-1816-0

Other articles of this Issue 3/2017

Soft Computing 3/2017 Go to the issue

Premium Partner