Abstract
Adaptive multi-rate (AMR) is a popular audio compression standard, various AMR FCB (Fixed Codebook) steganographic algorithms have been developed and more readily available for the popularity of AMR in mobile communication and mobile Internet, an effective steganalysis techniques are called for cyber security. In this paper, we propose a well-designed steganalytic scheme to effectively detect FCB steganography. For this purpose, we first elaborately to model the pulse position 2-D arrays formed on the pulses positions. Neighboring joint density features are constructed based on the intra-block and inter-block from multi scales and multi directions extracted. Experimental results show that, our method prominently outperforms the existing FCB based steganalysis, especially in detecting the STC-based steganographic systems at low embedding rate.
This work was supported by NSFC under 61972390, U1736214 and 61902391, and National Key Technology R&D Program under 2019QY0700 and 2016QY15Z2500.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bessette, B., et al.: The adaptive multirate wideband speech codec (AMR-WB). IEEE Trans. Speech Audio Process. 10(8), 620–636 (2002)
Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 27 (2011)
Ding, Q., Ping, X.: Steganalysis of analysis-by-synthesis compressed speech. In: 2010 International Conference on Multimedia Information Networking and Security (MINES), pp. 681–685. IEEE (2010)
Ding, Q., Ping, X.: Steganalysis of compressed speech based on histogram features. In: 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp. 1–4. IEEE (2010)
Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)
Geiser, B., Vary, P.: High rate data hiding in ACELP speech codecs. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2008, pp. 4005–4008. IEEE (2008)
Gong, C., Yi, X., Zhao, X.: Pitch delay based adaptive steganography for AMR speech stream. In: Yoo, C.D., Shi, Y.-Q., Kim, H.J., Piva, A., Kim, G. (eds.) IWDW 2018. LNCS, vol. 11378, pp. 275–289. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11389-6_21
Gong, C., Yi, X., Zhao, X., Ma, Y.: Recurrent convolutional neural networks for AMR steganalysis based on pulse position. In: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 2–13. ACM (2019)
Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)
Lin, Z., Huang, Y., Wang, J.: RNN-SM: fast steganalysis of VoIP streams using recurrent neural network. IEEE Trans. Inf. Forensics Secur. 13(7), 1854–1868 (2018)
Liu, P., Li, S., Wang, H.: Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec. Multimedia Syst. 23(4), 485–497 (2017)
Liu, P., Li, S., Wang, H.: Steganography integrated into linear predictive coding for low bit-rate speech codec. Multimedia Tools Appl. 76(2), 2837–2859 (2017)
Miao, H., Huang, L., Chen, Z., Yang, W., Al-Hawbani, A.: A new scheme for covert communication via 3G encoded speech. Comput. Electr. Eng. 38(6), 1490–1501 (2012)
Miao, H., Huang, L., Shen, Y., Lu, X., Chen, Z.: Steganalysis of compressed speech based on Markov and entropy. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 63–76. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-43886-2_5
Nishimura, A.: Data hiding in pitch delay data of the adaptive multi-rate narrow-band speech codec. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2009, pp. 483–486. IEEE (2009)
Ren, Y., Cai, T., Tang, M., Wang, L.: AMR steganalysis based on the probability of same pulse position. IEEE Trans. Inf. Forensics Secur. 10(9), 1801–1811 (2015)
Ren, Y., Wu, H., Wang, L.: An AMR adaptive steganography algorithm based on minimizing distortion. Multimedia Tools Appl. 77(10), 12095–12110 (2018)
Wang, Y., Yang, K., Yi, X., Zhao, X., Xu, Z.: CNN-based steganalysis of MP3 steganography in the entropy code domain. In: Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp. 55–65. ACM (2018)
Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: Global Telecommunications Conference, IEEE GLOBECOM 2008, pp. 1–5. IEEE (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Gong, C., Zhao, X. (2020). New Steganalytic Approach for AMR Steganography Based on Block-Wise of Pulse Position Distribution and Neighboring Joint Density. In: Wang, H., Zhao, X., Shi, Y., Kim, H., Piva, A. (eds) Digital Forensics and Watermarking. IWDW 2019. Lecture Notes in Computer Science(), vol 12022. Springer, Cham. https://doi.org/10.1007/978-3-030-43575-2_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-43575-2_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43574-5
Online ISBN: 978-3-030-43575-2
eBook Packages: Computer ScienceComputer Science (R0)