Skip to main content

New Steganalytic Approach for AMR Steganography Based on Block-Wise of Pulse Position Distribution and Neighboring Joint Density

  • Conference paper
  • First Online:
Digital Forensics and Watermarking (IWDW 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12022))

Included in the following conference series:

  • 1320 Accesses

Abstract

Adaptive multi-rate (AMR) is a popular audio compression standard, various AMR FCB (Fixed Codebook) steganographic algorithms have been developed and more readily available for the popularity of AMR in mobile communication and mobile Internet, an effective steganalysis techniques are called for cyber security. In this paper, we propose a well-designed steganalytic scheme to effectively detect FCB steganography. For this purpose, we first elaborately to model the pulse position 2-D arrays formed on the pulses positions. Neighboring joint density features are constructed based on the intra-block and inter-block from multi scales and multi directions extracted. Experimental results show that, our method prominently outperforms the existing FCB based steganalysis, especially in detecting the STC-based steganographic systems at low embedding rate.

This work was supported by NSFC under 61972390, U1736214 and 61902391, and National Key Technology R&D Program under 2019QY0700 and 2016QY15Z2500.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bessette, B., et al.: The adaptive multirate wideband speech codec (AMR-WB). IEEE Trans. Speech Audio Process. 10(8), 620–636 (2002)

    Article  Google Scholar 

  2. Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 27 (2011)

    Google Scholar 

  3. Ding, Q., Ping, X.: Steganalysis of analysis-by-synthesis compressed speech. In: 2010 International Conference on Multimedia Information Networking and Security (MINES), pp. 681–685. IEEE (2010)

    Google Scholar 

  4. Ding, Q., Ping, X.: Steganalysis of compressed speech based on histogram features. In: 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp. 1–4. IEEE (2010)

    Google Scholar 

  5. Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)

    Article  Google Scholar 

  6. Geiser, B., Vary, P.: High rate data hiding in ACELP speech codecs. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2008, pp. 4005–4008. IEEE (2008)

    Google Scholar 

  7. Gong, C., Yi, X., Zhao, X.: Pitch delay based adaptive steganography for AMR speech stream. In: Yoo, C.D., Shi, Y.-Q., Kim, H.J., Piva, A., Kim, G. (eds.) IWDW 2018. LNCS, vol. 11378, pp. 275–289. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11389-6_21

    Chapter  Google Scholar 

  8. Gong, C., Yi, X., Zhao, X., Ma, Y.: Recurrent convolutional neural networks for AMR steganalysis based on pulse position. In: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 2–13. ACM (2019)

    Google Scholar 

  9. Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)

    Article  Google Scholar 

  10. Lin, Z., Huang, Y., Wang, J.: RNN-SM: fast steganalysis of VoIP streams using recurrent neural network. IEEE Trans. Inf. Forensics Secur. 13(7), 1854–1868 (2018)

    Article  Google Scholar 

  11. Liu, P., Li, S., Wang, H.: Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec. Multimedia Syst. 23(4), 485–497 (2017)

    Article  Google Scholar 

  12. Liu, P., Li, S., Wang, H.: Steganography integrated into linear predictive coding for low bit-rate speech codec. Multimedia Tools Appl. 76(2), 2837–2859 (2017)

    Article  Google Scholar 

  13. Miao, H., Huang, L., Chen, Z., Yang, W., Al-Hawbani, A.: A new scheme for covert communication via 3G encoded speech. Comput. Electr. Eng. 38(6), 1490–1501 (2012)

    Article  Google Scholar 

  14. Miao, H., Huang, L., Shen, Y., Lu, X., Chen, Z.: Steganalysis of compressed speech based on Markov and entropy. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 63–76. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-43886-2_5

    Chapter  Google Scholar 

  15. Nishimura, A.: Data hiding in pitch delay data of the adaptive multi-rate narrow-band speech codec. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2009, pp. 483–486. IEEE (2009)

    Google Scholar 

  16. Ren, Y., Cai, T., Tang, M., Wang, L.: AMR steganalysis based on the probability of same pulse position. IEEE Trans. Inf. Forensics Secur. 10(9), 1801–1811 (2015)

    Article  Google Scholar 

  17. Ren, Y., Wu, H., Wang, L.: An AMR adaptive steganography algorithm based on minimizing distortion. Multimedia Tools Appl. 77(10), 12095–12110 (2018)

    Article  Google Scholar 

  18. Wang, Y., Yang, K., Yi, X., Zhao, X., Xu, Z.: CNN-based steganalysis of MP3 steganography in the entropy code domain. In: Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp. 55–65. ACM (2018)

    Google Scholar 

  19. Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: Global Telecommunications Conference, IEEE GLOBECOM 2008, pp. 1–5. IEEE (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xianfeng Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gong, C., Zhao, X. (2020). New Steganalytic Approach for AMR Steganography Based on Block-Wise of Pulse Position Distribution and Neighboring Joint Density. In: Wang, H., Zhao, X., Shi, Y., Kim, H., Piva, A. (eds) Digital Forensics and Watermarking. IWDW 2019. Lecture Notes in Computer Science(), vol 12022. Springer, Cham. https://doi.org/10.1007/978-3-030-43575-2_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-43575-2_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-43574-5

  • Online ISBN: 978-3-030-43575-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics