Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3664647.3685646acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
short-paper

Practical Deep Learning Models for QIM-based VoIP Steganalysis

Published: 28 October 2024 Publication History

Abstract

Quantization index modulation (QIM) based VoIP steganography can conceal secret information in VoIP streams. Malicious users could use this technology to conduct illegal activities, threatening network and public security. Hence, practical steganalysis models that could detect QIM-based VoIP steganography are urged to be developed. In recent years, deep learning (DL) models have been investigated for this task, and exciting outcomes have been achieved. However, existing models are far from practical. Two major challenges are required to be addressed. First, there is still significant room for improvement in detection accuracy. Second, studies that balance the detection accuracy and response time are still insufficient. In this context, our main research topic fits in the QIM-based VoIP steganalysis theme, which aims to detect QIM-based steganography in VoIP streams in a fast and accurate manner.

References

[1]
B. Chen and G.W. Wornell. 2001. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, Vol. 47, 4 (2001), 1423--1443.
[2]
Songbin Li, Yizhen Jia, and C.-C. Jay Kuo. 2017. Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals. IEEE/ACM Transactions on Audio, Speech, and Language Processing, Vol. 25, 5 (2017), 1011--1022.
[3]
Songbin Li, HuaiZhou Tao, and YongFeng Huang. 2012. Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis. Journal of Zhejiang University SCIENCE C, Vol. 13 (2012), 624--634.
[4]
Songbin Li, Jingang Wang, Peng Liu, Miao Wei, and Qiandong Yan. 2021. Detection of Multiple Steganography Methods in Compressed Speech Based on Code Element Embedding, Bi-LSTM and CNN With Attention Mechanisms. IEEE/ACM Transactions on Audio, Speech, and Language Processing, Vol. 29 (2021), 1556--1569.
[5]
Zinan Lin, Yongfeng Huang, and Jilong Wang. 2018. RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network. IEEE Transactions on Information Forensics and Security, Vol. 13, 7 (2018), 1854--1868.
[6]
Sachin Mehta and Mohammad Rastegari. 2022. MobileViT: Light-weight, General-purpose, and Mobile-friendly Vision Transformer. arxiv: 2110.02178 [cs.CV]
[7]
International Telecommunication Union. 2007. G.729: Coding of speech at 8 kbit/s using conjugate structure algebraic-code-excited linear-prediction (CS-ACELP). https://www.itu.int/rec/T-REC-G.729
[8]
Miao Wei, SongBin Li, Peng Liu, YongFeng Huang, QianDong Yan, JinGang Wang, and Cheng Zhang. 2023. Frame-level steganalysis of QIM steganography in compressed speech based on multi-dimensional perspective of codeword correlations. Journal of Ambient Intelligence and Humanized Computing, Vol. 14 (2023), 8421--8431.
[9]
Bo Xiao, Yongfeng Huang, and Shanyu Tang. 2008. An Approach to Information Hiding in Low Bit-Rate Speech Stream. In IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. IEEE, New Orleans, LA, USA, 1--5.
[10]
Hao Yang, Zhongliang Yang, Yongjian Bao, and YongFeng Huang. 2020. Hierarchical Representation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals. In Information and Communications Security. Springer International Publishing, Cham, 783--798.
[11]
Hao Yang, ZhongLiang Yang, YongJian Bao, Sheng Liu, and YongFeng Huang. 2020. Fast Steganalysis Method for VoIP Streams. IEEE Signal Processing Letters, Vol. 27 (2020), 286--290.
[12]
Hao Yang, ZhongLiang Yang, YongJian Bao, Sheng Liu, and YongFeng Huang. 2020. FCEM: A Novel Fast Correlation Extract Model For Real Time Steganalysis Of VoIP Stream Via Multi-Head Attention. In ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, Barcelona, Spain, 2822--2826.
[13]
Hu Yuting, Huang Yihua, Yang Zhongliang, and Huang Yongfeng. 2021. Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams. Neurocomputing, Vol. 419 (2021), 70--79.
[14]
Cheng Zhang and Shujuan Jiang. 2024. Detection of QIM-Based Steganography in VoIP Streams: A MobileViT-Inspired Model. IEEE Signal Processing Letters, Vol. 31 (2024), 1735--1739.
[15]
Cheng Zhang, Shujuan Jiang, and Zhong Chen. 2023. TENet: leveraging transformer encoders for steganalysis of QIM steganography in VoIP speech streams. Multimedia Tools and Applications, Vol. 83 (2023), 57107--57138.

Index Terms

  1. Practical Deep Learning Models for QIM-based VoIP Steganalysis

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM '24: Proceedings of the 32nd ACM International Conference on Multimedia
    October 2024
    11719 pages
    ISBN:9798400706868
    DOI:10.1145/3664647
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 October 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. covert channel
    2. information hiding
    3. steganalysis
    4. steganography
    5. voip

    Qualifiers

    • Short-paper

    Funding Sources

    • the National Natural Science Foundation of China

    Conference

    MM '24
    Sponsor:
    MM '24: The 32nd ACM International Conference on Multimedia
    October 28 - November 1, 2024
    Melbourne VIC, Australia

    Acceptance Rates

    MM '24 Paper Acceptance Rate 1,150 of 4,385 submissions, 26%;
    Overall Acceptance Rate 2,145 of 8,556 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 54
      Total Downloads
    • Downloads (Last 12 months)54
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 02 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media