Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








12 Hits in 5.6 sec

Steganalysis of AMR Based on Statistical Features of Pitch Delay

Yanpeng Wu, Huiji Zhang, Yi Sun, Minghui Chen
2019 International Journal of Digital Crime and Forensics  
The calibrated matrix of the second-order difference of the pitch delay (C-MSDPD) feature has been proven to be effective in detecting steganography based on pitch delay.  ...  In this article, a new steganalysis scheme based on multiple statistical features of pitch delay is present.  ...  Principle of Steganalysis Based on Pitch Delay Renetal.  ... 
doi:10.4018/ijdcf.2019100105 fatcat:rkucryvkyrcvvlcqm7fee6e2tm

Steganography and Steganalysis in Voice over IP: A Review

Zhijun Wu, Junjun Guo, Chenlei Zhang, Changliang Li
2021 Sensors  
Steganography and steganalysis based on VoIP can be divided into two categories, depending on where the secret information is embedded: steganography and steganalysis based on voice payload or protocol  ...  Recent research results of steganography and steganalysis based on protocol and voice payload are classified in this paper, and the paper also summarizes their characteristics, advantages, and disadvantages  ...  Conflicts of Interest: The authors declare no conflict interest.  ... 
doi:10.3390/s21041032 pmid:33546240 pmcid:PMC7913304 fatcat:6b5ocz5rajhzzooh345couyjaq

A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition

Junhui He, Junxi Chen, Shichang Xiao, Xiaoyu Huang, Shaohua Tang
2018 Security and Communication Networks  
Moreover, both the quality of stego speech and the security regarding statistical steganalysis are better than the recent speech steganography based on neighbor-index-division codebook partition.  ...  In this paper, a novel AMR-WB speech steganography is proposed based on diameter-neighbor codebook partition algorithm.  ...  Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper.  ... 
doi:10.1155/2018/7080673 fatcat:ss4cqg5ulnglhetaqlbuqdlq4m

A Common Method for Detecting Multiple Steganographies in Low-bit-rate Compressed Speech Based on Bayesian Inference

Jie Yang, Peng Liu, SongBin Li
2019 IEEE Access  
, and finally implementing steganalysis based on Bayesian inference.  ...  The existing steganalysis methods for AbS-LPC low-bit-rate compressed speech steganography are specifically designed for one certain category of steganography methods, thus lacking generalization capability  ...  [41] propose a steganalysis method based on the matrix of the second-order differences in pitch delay (MSDPD) and obtain calibrated MSDPD features through recompression to further improve the detection  ... 
doi:10.1109/access.2019.2939629 fatcat:3jtfcsh7zjhabo76w4w2omg2ua

Fast Fourier Transform-Based Steganalysis of Covert Communications over Streaming Media

Jinghui Peng, Shanyu Tang, Jia Li
2019 Zenodo  
This paper shows how a steganalysis algorithm based on Fast Fourier Transform (FFT) can be used to detect the existence of secret data embedded in streaming media.  ...  The results indicate that the proposed FFT-based steganalysis algorithm is effective in detecting the secret data embedded in VoIP streaming media.  ...  Ren et al. pointed out that data hiding in AMR codec would increase the probability of the same pulse position in the same track, and proposed a speech steganalysis algorithm based on SVM classifier [  ... 
doi:10.5281/zenodo.3299971 fatcat:fq3m6d5l7fehngcomf3n3idnxi

Detecting Steganography in Inactive Voice-over-IP Frames Based on Statistic Characteristics of Fundamental Frequency

Hui Tian, Jie Liu, Chin-Chen Chang, Yongfeng Huang, Yiqiao Cai
2019 IEEE Access  
Thus, we present a new steganalysis method based on statistic characteristics of fundamental frequency.  ...  To prevent the illegitimate use of this technique, the entropy-based and poker test-based steganalysis methods have been presented.  ...  [34] presented an SVM-based steganalysis method, which uses the matrix of the secondorder difference of pitch delay (MSDPD) as the detection features.  ... 
doi:10.1109/access.2019.2962009 fatcat:43dudx575jfnbknb6k37tlfir4

VoIP Steganography and Its Detection - A Survey [article]

Wojciech Mazurczyk
2013 arXiv   pre-print
Due to the rise in popularity of IP telephony, together with the large volume of data and variety of protocols involved, it is currently attracting the attention of the research community as a perfect  ...  Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to secret information into a carrier message.  ...  Krzysztof Szczypiorski from Warsaw University of Technology (Poland) for helpful comments and remarks.  ... 
arXiv:1203.4374v4 fatcat:alz2kjbcszhvvgx6e7gmsqnx2i

VoIP steganography and its Detection—A survey

Wojciech Mazurczyk
2013 ACM Computing Surveys  
Due to the rise in popularity of IP telephony, together with the large volume of data and variety of protocols involved, it is currently attracting the attention of the research community as a perfect  ...  Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to embed secret information into a carrier message.  ...  ACKNOWLEDGMENTS The author would like to thank Professor Krzysztof Szczypiorski from Warsaw University of Technology (Poland) for helpful comments and remarks.  ... 
doi:10.1145/2543581.2543587 fatcat:wqp7bqe4v5bpvlphrjncqcjici

Identifying optimal message embedding location in audio steganography using generative adversarial networks

Muatamed Hajer, Mohammed Anbar
2022 Eastern-European Journal of Enterprise Technologies  
The suggested method's detection accuracy is lower than that of the most current state-of-the-art deep learning-based steganalysis.  ...  In recent studies, deep learning-based steganalysis has swiftly revealed AS by extracting high-dimensional stego acoustic features for categorization.  ...  four fractional pitch delay variables).  ... 
doi:10.15587/1729-4061.2022.263695 fatcat:k25ppcbrrrbg7lx6fuw64wulgy

Securing IoT Data Using Steganography: A Practical Implementation Approach

Fatiha Djebbar
2021 Electronics  
To fully benefit from the Internet of Things "IoT" system's capabilities, the validity and accuracy of transmitted data should be ensured.  ...  Due to the constrained environment of IoT devices, practical security implementation presents a great challenge.  ...  In audio steganalysis, a second-order difference of pitch delay features was used in [38] .  ... 
doi:10.3390/electronics10212707 fatcat:nuasyz4fcneihijahuvfc76wbe

Comparative study of digital audio steganography techniques

Fatiha Djebbar, Beghdad Ayad, Karim Abed Meraim, Habib Hamam
2012 EURASIP Journal on Audio, Speech, and Music Processing  
Another contribution of this paper is the provision of a robustness-based classification of steganographic models depending on their occurrence in the embedding process.  ...  In this paper, we review current digital audio steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators.  ...  Overall steganalysis study results for data in audio (Table S2a ), in speech signals only and in music only (Table S2b) depicted by each software tool appearing in [47][48][49].  ... 
doi:10.1186/1687-4722-2012-25 fatcat:f7mi5jj6k5achavdjknamyed3u

LSB Data Hiding in Digital Media: A Survey

Dang Tran, Hans-Jürgen Zepernick, Thi Chu
2022 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems  
This survey will be helpful for researchers and practitioners to keep abreast about the potential of LSB data hiding in digital media and to develop novel applications based on suitable performance trade-offs  ...  the different LSB data hiding methods are discussed.  ...  , pixel difference histogram steganalysis, image histograms, visual attacks. • Statistical moments based steganalysis, secondorder derivative-based Mel-cepstrum (3D-Mel) steganalysis, higher order statistics  ... 
doi:10.4108/eai.5-4-2022.173783 fatcat:iupulvy6lrbwtglrvukb6gzrue