Your privacy, your choice

We use essential cookies to make sure the site can function. We also use optional cookies for advertising, personalisation of content, usage analysis, and social media, as well as to allow video information to be shared for both marketing, analytics and editorial purposes.

By accepting optional cookies, you consent to the processing of your personal data - including transfers to third parties. Some third parties are outside of the European Economic Area, with varying standards of data protection.

See our privacy policy for more information on the use of your personal data.

for further information and to change your choices.

Skip to main content

Steganalysis of Adaptive Multiple-Rate Speech Using Parity of Pitch-Delay Value

  • Conference paper
  • First Online:
Security and Privacy in New Computing Environments (SPNCE 2019)

Abstract

Exploiting the fact that the pitch period parameter in speech parameter encoding is difficult to predict, a large number of steganographic strategies choose to embed secret information in the pitch period. Several detection methods for these steganography strategies based on the pitch period have also been proposed so far, but it is still a challenge to detect the steganography accurately. In this work, a new steganalysis scheme is proposed to detect pitch period based steganography, which has lower complexity and higher accuracy compared with the existing steganalysis schemes. Firstly, we regard a frame as a calculation unit within which the parity of four sub-frames can be obtained. Secondly, after filtering and merging into 14-dimensional PBP (parity Bayesian probability) features, these features are classified by the support vector machine (SVM). We evaluate the performance of the proposed strategy with numerous speech samples encoded by the adaptive multi-rate audio codec (AMR) and compare it with the state-of-the-art strategies. The experimental results illustrate that proposed method can effectively detect the pitch-delay based steganography. It is not only superior to the existing steganalysis methods in detection accuracy, but also has outstanding real-time detection performance and robustness because of its lower feature dimension and complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+
from ¥17,985 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mazurczyk, W., Lubacz, J.: LACK - a VoIP steganographic method. arXiv:08114138 Cs, November 2008

  2. Kar, D.C., Mulkey, C.J.: A multi-threshold based audio steganography scheme. J. Inf. Secur. Appl. 23(Supplement C), 54–67 (2015)

    Google Scholar 

  3. Djebbar, F., Ayad, B., Meraim, K.A., Hamam, H.: Comparative study of digital audio steganography techniques. EURASIP J. Audio Speech Music Process. 2012(1), 25 (2012)

    Article  Google Scholar 

  4. Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010)

    Article  Google Scholar 

  5. Zhang, Y., Qin, C., Zhang, W., Liu, F., Luo, X.: On the fault-tolerant performance for a class of robust image steganography. Signal Process. 146, 99–111 (2018)

    Article  Google Scholar 

  6. Luo, X., et al.: Steganalysis of HUGO steganography based on parameter recognition of syndrome-Trellis-Codes. Multimed. Tools Appl. 75(21), 13557–13583 (2016)

    Article  Google Scholar 

  7. Mazurczyk, W.: VoIP steganography and its detection—a survey. ACM Comput. Surv. 46(2), 20:1–20:21 (2013)

    Article  Google Scholar 

  8. Tian, H., et al.: Optimal matrix embedding for voice-over-IP steganography. Signal Process. 117, 33–43 (2015)

    Article  Google Scholar 

  9. Sadek, M.M., Khalifa, A.S., Mostafa, M.G.M.: Video steganography: a comprehensive review. Multimed. Tools Appl. 74(17), 7063–7094 (2015)

    Article  Google Scholar 

  10. Neal, H., ElAarag, H.: A reliable covert communication scheme based on VoIP steganography. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security X. LNCS, vol. 8948, pp. 55–68. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46739-8_4

    Chapter  Google Scholar 

  11. Tian, H., Liu, J., Li, S.: Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimed. Syst. 20(2), 143–154 (2014)

    Article  Google Scholar 

  12. Tian, H., et al.: Improved adaptive partial-matching steganography for voice over IP. Comput. Commun. 70, 95–108 (2015)

    Article  Google Scholar 

  13. Geiser, B., Vary, P.: High rate data hiding in ACELP speech codecs, pp. 4005–4008 (2008)

    Google Scholar 

  14. Ren, Y., Wu, H., Wang, L.: An AMR adaptive steganography algorithm based on minimizing distortion. Multimed. Tools Appl. 77(10), 12095–12110 (2018)

    Article  Google Scholar 

  15. Miao, H., Huang, L., Chen, Z., Yang, W., Al-Hawbani, A.: A new scheme for covert communication via 3G encoded speech. Comput. Electr. Eng. 38(6), 1490–1501 (2012)

    Article  Google Scholar 

  16. Luo, D., Yang, R., Huang, J.: Identification of AMR decompressed audio. Digit. Signal Process. 37, 85–91 (2015)

    Article  Google Scholar 

  17. Ekudden, E., Hagen, R., Johansson, I., Svedberg, J.: The adaptive multi-rate speech coder. In: IEEE Workshop on Speech Coding Proceedings. Model, Coders, and Error Criteria (Cat. No. 99EX351), pp. 117–119 (1999)

    Google Scholar 

  18. Miao, H., Huang, L., Shen, Y., Lu, X., Chen, Z.: Steganalysis of compressed speech based on Markov and entropy. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 63–76. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-43886-2_5

    Chapter  Google Scholar 

  19. Ren, Y., Cai, T., Tang, M., Wang, L.: AMR steganalysis based on the probability of same pulse position. IEEE Trans. Inf. Forensics Secur. 10(9), 1801–1811 (2015)

    Article  Google Scholar 

  20. Ren, Y., Yang, J., Wang, J., Wang, L.: AMR steganalysis based on second-order difference of pitch delay. IEEE Trans. Inf. Forensics Secur. 12(6), 1345–1357 (2017)

    Article  Google Scholar 

  21. Tian, H., et al.: Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs. Signal Process. 134(Supplement C), 9–22 (2017)

    Article  Google Scholar 

  22. Liu, P., Li, S., Wang, H.: Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec. Multimed. Syst. 23(4), 485–497 (2017)

    Article  Google Scholar 

  23. Liu, J., Tian, H., Lu, J., Chen, Y.: Neighbor-index-division steganography based on QIM method for G.723.1 speech streams. J. Ambient Intell. Humaniz. Comput. 7(1), 139–147 (2016)

    Article  Google Scholar 

  24. Yan, S., Tang, G., Chen, Y.: Incorporating data hiding into G.729 speech codec. Multimed. Tools Appl. 75(18), 11493–11512 (2016)

    Article  Google Scholar 

  25. Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)

    Article  Google Scholar 

  26. Yan, S., Tang, G., Sun, Y.: Steganography for low bit-rate speech based on pitch period prediction. Appl. Res. Comput. 32(6), 1774–1777 (2015)

    Google Scholar 

  27. Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: IEEE Global Telecommunications Conference, IEEE GLOBECOM 2008, pp. 1–5 (2008)

    Google Scholar 

  28. Li, S., Jia, Y., Kuo, C.C.J.: Steganalysis of QIM steganography in low-bit-rate speech signals. IEEE/ACM Trans. Audio Speech Lang. Process. 25(5), 1011–1022 (2017)

    Article  Google Scholar 

  29. Ghasemzadeh, H., Tajik Khass, M., Khalil Arjmandi, M.: Audio steganalysis based on reversed psychoacoustic model of human hearing. Digit. Signal Process. 51, 133–141 (2016)

    Article  MathSciNet  Google Scholar 

  30. Ma, Y., Luo, X., Li, X., Bao, Z., Zhang, Y.: Selection of rich model steganalysis features based on decision rough set α-positive region reduction. IEEE Trans. Circuits Syst. Video Technol. 29, 336–350 (2018)

    Article  Google Scholar 

  31. Li, S., Tao, H., Huang, Y.: Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. Sci. C 13(8), 624–634 (2012)

    Article  Google Scholar 

  32. Manjunath, S., Gardner, W.: Variable rate speech coding, US7496505B2, 24 February 2009

    Google Scholar 

  33. Kodovský, J., Fridrich, J.: Calibration revisited. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, New York, NY, USA, pp. 63–74 (2009)

    Google Scholar 

  34. Tian, H., et al.: Distributed steganalysis of compressed speech. Soft Comput. 21(3), 795–804 (2017)

    Article  Google Scholar 

  35. Tian, H., et al.: Steganalysis of low bit-rate speech based on statistic characteristics of pulse positions. In: 10th International Conference on Availability, Reliability and Security, pp. 455–460 (2015)

    Google Scholar 

  36. Tian, H., et al.: Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics. Secur. Commun. Netw. 15(9), 2934–2944 (2016)

    Article  Google Scholar 

Download references

Acknowledgements

This research is funded by the National Natural Science Foundation of China under Grant Nos. U1536115 and U1405254, the Natural Science Foundation of Fujian Province of China under Grant No. 2018J01093, the Program for New Century Excellent Talents in Fujian Province University under Grant No. MJK2016-23, the Program for Outstanding Youth Scientific and Technological Talents in Fujian Province University under Grant No. MJK2015-54, the Promotion Program for Young and Middle-aged Teachers in Science and Technology Research of Huaqiao University under Grant No. ZQN-PY115, Program for Science and Technology Innovation Teams and Leading Talents of Huaqiao University under Grant No. 2014KJTD13, the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security under Grant No. AGK201710 and the Subsidized Project for Postgraduates’ Innovative Fund in Scientific Research of Huaqiao University No. 17014083010.

Author information

Authors and Affiliations

Corresponding author

Correspondence to Hui Tian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, X., Tian, H., Liu, J., Li, X., Lu, J. (2019). Steganalysis of Adaptive Multiple-Rate Speech Using Parity of Pitch-Delay Value. In: Li, J., Liu, Z., Peng, H. (eds) Security and Privacy in New Computing Environments. SPNCE 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-21373-2_21

Download citation

Keywords

Publish with us

Policies and ethics