A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Steganalysis of AMR Based on Statistical Features of Pitch Delay
2019
International Journal of Digital Crime and Forensics
The calibrated matrix of the second-order difference of the pitch delay (C-MSDPD) feature has been proven to be effective in detecting steganography based on pitch delay. ...
In this article, a new steganalysis scheme based on multiple statistical features of pitch delay is present. ...
Principle of Steganalysis Based on Pitch Delay Renetal. ...
doi:10.4018/ijdcf.2019100105
fatcat:rkucryvkyrcvvlcqm7fee6e2tm
Steganography and Steganalysis in Voice over IP: A Review
2021
Sensors
Steganography and steganalysis based on VoIP can be divided into two categories, depending on where the secret information is embedded: steganography and steganalysis based on voice payload or protocol ...
Recent research results of steganography and steganalysis based on protocol and voice payload are classified in this paper, and the paper also summarizes their characteristics, advantages, and disadvantages ...
Conflicts of Interest: The authors declare no conflict interest. ...
doi:10.3390/s21041032
pmid:33546240
pmcid:PMC7913304
fatcat:6b5ocz5rajhzzooh345couyjaq
A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition
2018
Security and Communication Networks
Moreover, both the quality of stego speech and the security regarding statistical steganalysis are better than the recent speech steganography based on neighbor-index-division codebook partition. ...
In this paper, a novel AMR-WB speech steganography is proposed based on diameter-neighbor codebook partition algorithm. ...
Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper. ...
doi:10.1155/2018/7080673
fatcat:ss4cqg5ulnglhetaqlbuqdlq4m
A Common Method for Detecting Multiple Steganographies in Low-bit-rate Compressed Speech Based on Bayesian Inference
2019
IEEE Access
, and finally implementing steganalysis based on Bayesian inference. ...
The existing steganalysis methods for AbS-LPC low-bit-rate compressed speech steganography are specifically designed for one certain category of steganography methods, thus lacking generalization capability ...
[41] propose a steganalysis method based on the matrix of the second-order differences in pitch delay (MSDPD) and obtain calibrated MSDPD features through recompression to further improve the detection ...
doi:10.1109/access.2019.2939629
fatcat:3jtfcsh7zjhabo76w4w2omg2ua
Fast Fourier Transform-Based Steganalysis of Covert Communications over Streaming Media
2019
Zenodo
This paper shows how a steganalysis algorithm based on Fast Fourier Transform (FFT) can be used to detect the existence of secret data embedded in streaming media. ...
The results indicate that the proposed FFT-based steganalysis algorithm is effective in detecting the secret data embedded in VoIP streaming media. ...
Ren et al. pointed out that data hiding in AMR codec would increase the probability of the same pulse position in the same track, and proposed a speech steganalysis algorithm based on SVM classifier [ ...
doi:10.5281/zenodo.3299971
fatcat:fq3m6d5l7fehngcomf3n3idnxi
Detecting Steganography in Inactive Voice-over-IP Frames Based on Statistic Characteristics of Fundamental Frequency
2019
IEEE Access
Thus, we present a new steganalysis method based on statistic characteristics of fundamental frequency. ...
To prevent the illegitimate use of this technique, the entropy-based and poker test-based steganalysis methods have been presented. ...
[34] presented an SVM-based steganalysis method, which uses the matrix of the secondorder difference of pitch delay (MSDPD) as the detection features. ...
doi:10.1109/access.2019.2962009
fatcat:43dudx575jfnbknb6k37tlfir4
VoIP Steganography and Its Detection - A Survey
[article]
2013
arXiv
pre-print
Due to the rise in popularity of IP telephony, together with the large volume of data and variety of protocols involved, it is currently attracting the attention of the research community as a perfect ...
Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to secret information into a carrier message. ...
Krzysztof Szczypiorski from Warsaw University of Technology (Poland) for helpful comments and remarks. ...
arXiv:1203.4374v4
fatcat:alz2kjbcszhvvgx6e7gmsqnx2i
VoIP steganography and its Detection—A survey
2013
ACM Computing Surveys
Due to the rise in popularity of IP telephony, together with the large volume of data and variety of protocols involved, it is currently attracting the attention of the research community as a perfect ...
Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to embed secret information into a carrier message. ...
ACKNOWLEDGMENTS The author would like to thank Professor Krzysztof Szczypiorski from Warsaw University of Technology (Poland) for helpful comments and remarks. ...
doi:10.1145/2543581.2543587
fatcat:wqp7bqe4v5bpvlphrjncqcjici
Identifying optimal message embedding location in audio steganography using generative adversarial networks
2022
Eastern-European Journal of Enterprise Technologies
The suggested method's detection accuracy is lower than that of the most current state-of-the-art deep learning-based steganalysis. ...
In recent studies, deep learning-based steganalysis has swiftly revealed AS by extracting high-dimensional stego acoustic features for categorization. ...
four fractional pitch delay variables). ...
doi:10.15587/1729-4061.2022.263695
fatcat:k25ppcbrrrbg7lx6fuw64wulgy
Securing IoT Data Using Steganography: A Practical Implementation Approach
2021
Electronics
To fully benefit from the Internet of Things "IoT" system's capabilities, the validity and accuracy of transmitted data should be ensured. ...
Due to the constrained environment of IoT devices, practical security implementation presents a great challenge. ...
In audio steganalysis, a second-order difference of pitch delay features was used in [38] . ...
doi:10.3390/electronics10212707
fatcat:nuasyz4fcneihijahuvfc76wbe
Comparative study of digital audio steganography techniques
2012
EURASIP Journal on Audio, Speech, and Music Processing
Another contribution of this paper is the provision of a robustness-based classification of steganographic models depending on their occurrence in the embedding process. ...
In this paper, we review current digital audio steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators. ...
Overall steganalysis study results for data in audio (Table S2a ), in speech signals only and in music only (Table S2b) depicted by each software tool appearing in [47][48][49]. ...
doi:10.1186/1687-4722-2012-25
fatcat:f7mi5jj6k5achavdjknamyed3u
LSB Data Hiding in Digital Media: A Survey
2022
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems
This survey will be helpful for researchers and practitioners to keep abreast about the potential of LSB data hiding in digital media and to develop novel applications based on suitable performance trade-offs ...
the different LSB data hiding methods are discussed. ...
, pixel difference histogram steganalysis, image histograms, visual attacks. • Statistical moments based steganalysis, secondorder derivative-based Mel-cepstrum (3D-Mel) steganalysis, higher order statistics ...
doi:10.4108/eai.5-4-2022.173783
fatcat:iupulvy6lrbwtglrvukb6gzrue