Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3335203.3335736acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
short-paper

Audio Steganalysis with Improved Convolutional Neural Network

Published: 02 July 2019 Publication History

Abstract

Deep learning, especially the convolutional neural network (CNN), has enjoyed significant success in many fields, e.g., image recognition. Recently, CNN has successfully applied to multimedia steganalysis. However, the detection performance is still unsatisfactory. In this work, we propose an improved CNN-based method for audio steganalysis. Specifically, a special convolutional layer is first carefully designed, which could capture the minor steganographic noise. Then, a truncated linear unit is adapted to activate the output of shallow convolutional layer. In addition, we employ the average pooling to minimize the over-fitting risk. Finally, a parameter transfer strategy is adopted, aiming to boost the detection performance for the low embedding-rate cases. The experimental results evaluated on 30,000 audio clips verify the effectiveness of our method for a variety of embedding rates. Compared with the existing CNN-based steganalysis methods, our proposed method could achieve superior performance. To facilitate the reproducible research, the source code will be released at GitHub.

References

[1]
Yoshua Bengio, Jérôme Louradour, Ronan Collobert, and Jason Weston. 2009. Curriculum learning. In Proceedings of the 26th annual international conference on machine learning. ACM, 41--48.
[2]
Bolin Chen, Weiqi Luo, and Haodong Li. 2017. Audio steganalysis with convolutional neural network. In Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. ACM, 85--90.
[3]
Tomávs Filler, Jan Judas, and Jessica Fridrich. 2011. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security, Vol. 6, 3 (2011), 920--935.
[4]
William M Fisher. 1986. Ther DARPA speech recognition research database: specifications and status. In Proc. DARPA Workshop on Speech Recognition, Feb. 1986. 93--99.
[5]
Jessica Fridrich and Jan Kodovsky. 2012. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, Vol. 7, 3 (2012), 868--882.
[6]
Vojtve ch Holub and Jessica Fridrich. 2012. Designing steganographic distortion using directional filters. In 2012 IEEE International workshop on information forensics and security (WIFS). IEEE, 234--239.
[7]
Vojtve ch Holub and Jessica Fridrich. 2013. Digital image steganography using universal distortion. In Proceedings of the first ACM workshop on Information hiding and multimedia security. ACM, 59--68.
[8]
Andrew D Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomávs Filler, Jessica Fridrich, and Tomávs Pevnỳ. 2013. Moving steganography and steganalysis from the laboratory into the real world. In Proceedings of the first ACM workshop on Information hiding and multimedia security. ACM, 45--58.
[9]
Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014).
[10]
Jan Kodovskỳ, Jessica J Fridrich, and Vojtech Holub. 2012. Ensemble classifiers for steganalysis of digital media. IEEE Trans. Information Forensics and Security, Vol. 7, 2 (2012), 432--444.
[11]
Christian Kraetzer and Jana Dittmann. 2007. Mel-cepstrum-based steganalysis for VoIP steganography. In Security, steganography, and watermarking of multimedia contents IX, Vol. 6505. International Society for Optics and Photonics, 650505.
[12]
Zinan Lin, Yongfeng Huang, and Jilong Wang. 2018. RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network. IEEE Transactions on Information Forensics and Security, Vol. 13, 7 (2018), 1854--1868.
[13]
Qingzhong Liu, Andrew H Sung, and Mengyu Qiao. 2009. Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Transactions on Information Forensics and Security, Vol. 4, 3 (2009), 359--368.
[14]
Qingzhong Liu, Andrew H Sung, and Mengyu Qiao. 2011. Derivative-based audio steganalysis. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Vol. 7, 3 (2011), 18.
[15]
Weiqi Luo, Haodong Li, Qi Yan, Rui Yang, and Jiwu Huang. 2018. Improved Audio Steganalytic Feature and Its Applications in Audio Forensics. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Vol. 14, 2 (2018), 43.
[16]
Jarno Mielikainen. 2006. LSB matching revisited. IEEE signal processing letters, Vol. 13, 5 (2006), 285--287.
[17]
Catherine Paulin, Sid-Ahmed Selouani, and Eric Hervet. 2016. Audio steganalysis using deep belief networks. International Journal of Speech Technology, Vol. 19, 3 (2016), 585--591.
[18]
Yinlong Qian, Jing Dong, Wei Wang, and Tieniu Tan. 2015. Deep learning for steganalysis via convolutional neural networks. In Media Watermarking, Security, and Forensics 2015, Vol. 9409. International Society for Optics and Photonics, 94090J.
[19]
Yinlong Qian, Jing Dong, Wei Wang, and Tieniu Tan. 2016. Learning and transferring representations for image steganalysis using convolutional neural network. In Image Processing (ICIP), 2016 IEEE International Conference on. IEEE, 2752--2756.
[20]
Yuntao Wang, Kun Yang, Xiaowei Yi, Xianfeng Zhao, and Zhoujun Xu. 2018. CNN-based Steganalysis of MP3 Steganography in the Entropy Code Domain. In Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security. ACM, 55--65.
[21]
Bo Xiao, Yongfeng Huang, and Shanyu Tang. 2008. An approach to information hiding in low bit-rate speech stream. In Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE. IEEE, 1--5.
[22]
Kun Yang, Xiaowei Yi, Xianfeng Zhao, and Linna Zhou. 2017. Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution. In International Workshop on Digital Watermarking. Springer, 202--216.
[23]
Jian Ye, Jiangqun Ni, and Yang Yi. 2017. Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security, Vol. 12, 11 (2017), 2545--2557.

Cited By

View all
  • (2024)Audio Steganalysis Using Fractal Dimension and Convolutional Neural Network (CNN) ModelEmerging Technologies and Security in Cloud Computing10.4018/979-8-3693-2081-5.ch015(339-362)Online publication date: 14-Feb-2024
  • (2024)Provably Secure Public-Key Steganography Based on Elliptic Curve CryptographyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.336121919(3148-3163)Online publication date: 2024
  • (2024)SANet: A Compressed Speech Encoder and Steganography Algorithm Independent Steganalysis Deep Neural NetworkIEEE/ACM Transactions on Audio, Speech and Language Processing10.1109/TASLP.2023.333766732(680-690)Online publication date: 1-Jan-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IH&MMSec'19: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security
July 2019
249 pages
ISBN:9781450368216
DOI:10.1145/3335203
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 July 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. audio steganalysis
  2. convolutional neural network
  3. deep learning

Qualifiers

  • Short-paper

Funding Sources

  • National Natural Science Foundation of China
  • Ningbo Natural Science Foundation
  • Zhejiang Natural Science Foundation

Conference

IH&MMSec '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)39
  • Downloads (Last 6 weeks)6
Reflects downloads up to 18 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Audio Steganalysis Using Fractal Dimension and Convolutional Neural Network (CNN) ModelEmerging Technologies and Security in Cloud Computing10.4018/979-8-3693-2081-5.ch015(339-362)Online publication date: 14-Feb-2024
  • (2024)Provably Secure Public-Key Steganography Based on Elliptic Curve CryptographyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.336121919(3148-3163)Online publication date: 2024
  • (2024)SANet: A Compressed Speech Encoder and Steganography Algorithm Independent Steganalysis Deep Neural NetworkIEEE/ACM Transactions on Audio, Speech and Language Processing10.1109/TASLP.2023.333766732(680-690)Online publication date: 1-Jan-2024
  • (2024)Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directionsNeurocomputing10.1016/j.neucom.2024.127528581(127528)Online publication date: May-2024
  • (2023)A Coverless Audio Steganography Based on Generative Adversarial NetworksElectronics10.3390/electronics1205125312:5(1253)Online publication date: 5-Mar-2023
  • (2023)A Universal Audio Steganalysis Scheme Based on Multiscale Spectrograms and DeepResNetIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.314112120:1(665-679)Online publication date: 1-Jan-2023
  • (2023)Audio steganography cover enhancement via reinforcement learningSignal, Image and Video Processing10.1007/s11760-023-02819-118:2(1007-1013)Online publication date: 25-Oct-2023
  • (2023)Imperceptible adversarial audio steganography based on psychoacoustic modelMultimedia Tools and Applications10.1007/s11042-023-14772-982:17(26451-26463)Online publication date: 2-Mar-2023
  • (2022)Comprehensive Survey of Multimedia Steganalysis: Techniques, Evaluations, and Trends in Future ResearchSymmetry10.3390/sym1401011714:1(117)Online publication date: 10-Jan-2022
  • (2022)A Novel High-Capacity Behavioral Steganographic Method Combining Timestamp Modulation and Carrier Selection Based on Social NetworksSymmetry10.3390/sym1401011114:1(111)Online publication date: 8-Jan-2022
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media