Abstract
Exploiting the fact that the pitch period parameter in speech parameter encoding is difficult to predict, a large number of steganographic strategies choose to embed secret information in the pitch period. Several detection methods for these steganography strategies based on the pitch period have also been proposed so far, but it is still a challenge to detect the steganography accurately. In this work, a new steganalysis scheme is proposed to detect pitch period based steganography, which has lower complexity and higher accuracy compared with the existing steganalysis schemes. Firstly, we regard a frame as a calculation unit within which the parity of four sub-frames can be obtained. Secondly, after filtering and merging into 14-dimensional PBP (parity Bayesian probability) features, these features are classified by the support vector machine (SVM). We evaluate the performance of the proposed strategy with numerous speech samples encoded by the adaptive multi-rate audio codec (AMR) and compare it with the state-of-the-art strategies. The experimental results illustrate that proposed method can effectively detect the pitch-delay based steganography. It is not only superior to the existing steganalysis methods in detection accuracy, but also has outstanding real-time detection performance and robustness because of its lower feature dimension and complexity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mazurczyk, W., Lubacz, J.: LACK - a VoIP steganographic method. arXiv:08114138 Cs, November 2008
Kar, D.C., Mulkey, C.J.: A multi-threshold based audio steganography scheme. J. Inf. Secur. Appl. 23(Supplement C), 54–67 (2015)
Djebbar, F., Ayad, B., Meraim, K.A., Hamam, H.: Comparative study of digital audio steganography techniques. EURASIP J. Audio Speech Music Process. 2012(1), 25 (2012)
Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010)
Zhang, Y., Qin, C., Zhang, W., Liu, F., Luo, X.: On the fault-tolerant performance for a class of robust image steganography. Signal Process. 146, 99–111 (2018)
Luo, X., et al.: Steganalysis of HUGO steganography based on parameter recognition of syndrome-Trellis-Codes. Multimed. Tools Appl. 75(21), 13557–13583 (2016)
Mazurczyk, W.: VoIP steganography and its detection—a survey. ACM Comput. Surv. 46(2), 20:1–20:21 (2013)
Tian, H., et al.: Optimal matrix embedding for voice-over-IP steganography. Signal Process. 117, 33–43 (2015)
Sadek, M.M., Khalifa, A.S., Mostafa, M.G.M.: Video steganography: a comprehensive review. Multimed. Tools Appl. 74(17), 7063–7094 (2015)
Neal, H., ElAarag, H.: A reliable covert communication scheme based on VoIP steganography. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security X. LNCS, vol. 8948, pp. 55–68. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46739-8_4
Tian, H., Liu, J., Li, S.: Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimed. Syst. 20(2), 143–154 (2014)
Tian, H., et al.: Improved adaptive partial-matching steganography for voice over IP. Comput. Commun. 70, 95–108 (2015)
Geiser, B., Vary, P.: High rate data hiding in ACELP speech codecs, pp. 4005–4008 (2008)
Ren, Y., Wu, H., Wang, L.: An AMR adaptive steganography algorithm based on minimizing distortion. Multimed. Tools Appl. 77(10), 12095–12110 (2018)
Miao, H., Huang, L., Chen, Z., Yang, W., Al-Hawbani, A.: A new scheme for covert communication via 3G encoded speech. Comput. Electr. Eng. 38(6), 1490–1501 (2012)
Luo, D., Yang, R., Huang, J.: Identification of AMR decompressed audio. Digit. Signal Process. 37, 85–91 (2015)
Ekudden, E., Hagen, R., Johansson, I., Svedberg, J.: The adaptive multi-rate speech coder. In: IEEE Workshop on Speech Coding Proceedings. Model, Coders, and Error Criteria (Cat. No. 99EX351), pp. 117–119 (1999)
Miao, H., Huang, L., Shen, Y., Lu, X., Chen, Z.: Steganalysis of compressed speech based on Markov and entropy. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 63–76. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-43886-2_5
Ren, Y., Cai, T., Tang, M., Wang, L.: AMR steganalysis based on the probability of same pulse position. IEEE Trans. Inf. Forensics Secur. 10(9), 1801–1811 (2015)
Ren, Y., Yang, J., Wang, J., Wang, L.: AMR steganalysis based on second-order difference of pitch delay. IEEE Trans. Inf. Forensics Secur. 12(6), 1345–1357 (2017)
Tian, H., et al.: Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs. Signal Process. 134(Supplement C), 9–22 (2017)
Liu, P., Li, S., Wang, H.: Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec. Multimed. Syst. 23(4), 485–497 (2017)
Liu, J., Tian, H., Lu, J., Chen, Y.: Neighbor-index-division steganography based on QIM method for G.723.1 speech streams. J. Ambient Intell. Humaniz. Comput. 7(1), 139–147 (2016)
Yan, S., Tang, G., Chen, Y.: Incorporating data hiding into G.729 speech codec. Multimed. Tools Appl. 75(18), 11493–11512 (2016)
Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)
Yan, S., Tang, G., Sun, Y.: Steganography for low bit-rate speech based on pitch period prediction. Appl. Res. Comput. 32(6), 1774–1777 (2015)
Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: IEEE Global Telecommunications Conference, IEEE GLOBECOM 2008, pp. 1–5 (2008)
Li, S., Jia, Y., Kuo, C.C.J.: Steganalysis of QIM steganography in low-bit-rate speech signals. IEEE/ACM Trans. Audio Speech Lang. Process. 25(5), 1011–1022 (2017)
Ghasemzadeh, H., Tajik Khass, M., Khalil Arjmandi, M.: Audio steganalysis based on reversed psychoacoustic model of human hearing. Digit. Signal Process. 51, 133–141 (2016)
Ma, Y., Luo, X., Li, X., Bao, Z., Zhang, Y.: Selection of rich model steganalysis features based on decision rough set α-positive region reduction. IEEE Trans. Circuits Syst. Video Technol. 29, 336–350 (2018)
Li, S., Tao, H., Huang, Y.: Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. Sci. C 13(8), 624–634 (2012)
Manjunath, S., Gardner, W.: Variable rate speech coding, US7496505B2, 24 February 2009
Kodovský, J., Fridrich, J.: Calibration revisited. In: Proceedings of the 11th ACM Workshop on Multimedia and Security, New York, NY, USA, pp. 63–74 (2009)
Tian, H., et al.: Distributed steganalysis of compressed speech. Soft Comput. 21(3), 795–804 (2017)
Tian, H., et al.: Steganalysis of low bit-rate speech based on statistic characteristics of pulse positions. In: 10th International Conference on Availability, Reliability and Security, pp. 455–460 (2015)
Tian, H., et al.: Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics. Secur. Commun. Netw. 15(9), 2934–2944 (2016)
Acknowledgements
This research is funded by the National Natural Science Foundation of China under Grant Nos. U1536115 and U1405254, the Natural Science Foundation of Fujian Province of China under Grant No. 2018J01093, the Program for New Century Excellent Talents in Fujian Province University under Grant No. MJK2016-23, the Program for Outstanding Youth Scientific and Technological Talents in Fujian Province University under Grant No. MJK2015-54, the Promotion Program for Young and Middle-aged Teachers in Science and Technology Research of Huaqiao University under Grant No. ZQN-PY115, Program for Science and Technology Innovation Teams and Leading Talents of Huaqiao University under Grant No. 2014KJTD13, the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security under Grant No. AGK201710 and the Subsidized Project for Postgraduates’ Innovative Fund in Scientific Research of Huaqiao University No. 17014083010.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Liu, X., Tian, H., Liu, J., Li, X., Lu, J. (2019). Steganalysis of Adaptive Multiple-Rate Speech Using Parity of Pitch-Delay Value. In: Li, J., Liu, Z., Peng, H. (eds) Security and Privacy in New Computing Environments. SPNCE 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-21373-2_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-21373-2_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-21372-5
Online ISBN: 978-3-030-21373-2
eBook Packages: Computer ScienceComputer Science (R0)Springer Nature Proceedings Computer Science