| 128 | 0 | 112 |
| Downloads | Citas | Reads |
To address the problem of low detection accuracy of traditional Bayesian network methods in compressed speech quantization index modulation steganalysis with low embedding rates, a steganalysis method based on Bayesian network ensembles was proposed. Firstly, Bayesian network ensembles were constructed to describe the correlations among speech codewords themselves, within frames, and between frames, and a conditional probability table was built through overall sample learning. Then, the feature vector of individual samples was constructed using the inference results of each sub-network, and these features were used to train a support vector machine(SVM) model. Finally, the steganalysis classification of unknown samples was achieved. Experimental results showed that on a 10 s Chinese and English speech dataset, with an embedding rate of 20%, this method improved the detection accuracy by at least 18.01 percentage points and 2.32 percentage points compared with traditional Bayesian network methods and deep learning methods, respectively. Moreover, the average duration for detecting 1 s of speech using this method was 2.72 ms, meeting the requirements for real-time detection.
[1] KAUR S,SINGH S,KAUR M,et al.A systematic review of computational image steganography approaches[J].Archives of computational methods in engineering,2022,29(7):4775-4797.
[2] THABIT R,UDZIR N I,YASIN S M,et al.CSNTSteg:color spacing normalization text steganography model to improve capacity and invisibility of hidden data[J].IEEE access,2022,10:65439-65458.
[3] HE S H,XU D W,YANG L,et al.Adaptive HEVC video steganography with high performance based on attention-net and PU partition modes[J].IEEE transactions on multimedia,2023,26:687-700.
[4] ELSHOUSH H T,MAHMOUD M M.Ameliorating LSB using piecewise linear chaotic map and one-time pad for superlative capacity,imperceptibility and secure audio steganography[J].IEEE access,2023,11:33354-33380.
[5] BHARTI S S,GUPTA M,AGARWAL S.A novel approach for audio steganography by processing of amplitudes and signs of secret audio separately[J].Multimedia tools and applications,2019,78(16):23179-23201.
[6] MELMAN A,EVSUTIN O.Comparative study of metaheuristic optimization algorithms for image steganography based on discrete Fourier transform domain[J].Applied soft computing,2023,132:109847.
[7] CHEN B,WORNELL G W.Quantization index modulation:a class of provably good methods for digital watermarking and information embedding[J].IEEE transactions on information theory,2001,47(4):1423-1443.
[8] XIAO B,HUANG Y F,TANG S Y.An approach to information hiding in low bit-rate speech stream[C]//IEEE GLOBECOM 2008 IEEE Global Telecommunications Conference.Piscataway:IEEE,2008:1-5.
[9] LIU P,LI S B,WANG H Q.Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec[J].Multimedia systems,2017,23(4):485-497.
[10] TIAN H,LIU J,LI S B.Improving security of quantization-index-modulation steganography in low bit-rate speech streams[J].Multimedia systems,2014,20(2):143-154.
[11] LI S B,TAO H Z,HUANG Y F.Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis[J].Journal of Zhejiang university SCIENCE C,2012,13(8):624-634.
[12] YANG J,LIU P,LI S B.A common method for detecting multiple steganographies in low-bit-rate compressed speech based on Bayesian inference[J].IEEE access,2019,7:128313-128324.
[13] LIN Z N,HUANG Y F,WANG J L.RNN-SM:fast steganalysis of VoIP streams using recurrent neural network[J].IEEE transactions on information forensics and security,2018,13(7):1854-1868.
[14] HU Y T,HUANG Y H,YANG Z L,et al.Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams[J].Neurocomputing,2021,419:70-79.
[15] YANG Z L,YANG H,CHANG C C,et al.Real-time steganalysis for streaming media based on multi-channel convolutional sliding windows[J].Knowledge-based systems,2022,237:107561.
[16] ZHANG C,JIANG S J,CHEN Z.TENet:leveraging transformer encoders for steganalysis of QIM steganography in VoIP speech streams[J].Multimedia tools and applications,2024,83(19):57107-57138.
[17] 赵文彬,王佳琦,吴峰,等.基于图神经网络文档相似度的实体与关系层次匹配方法[J].郑州大学学报(理学版),2023,55(6):8-14.ZHAO W B,WANG J Q,WU F,et al.A Hierarchical Matching Method of Entity and Relation Based on Graph Neural Network for Document Similarity[J].Journal of Zhengzhou university(natural science edition),2023,55(6):8-14.
[18] 彭双,伍江江,陈浩,等.基于卷积注意力网络的卫星观测任务序贯决策方法[J].郑州大学学报(理学版),2023,55(5):47-52.PENG S,WU J J,CHEN H,et al.Satellite Observation Task Sequential Decision-making Method Based on Convolutional Attention Neural Network[J].Journal of Zhengzhou university(natural science edition),2023,55(5):47-52.
[19] KHEDDAR H,HEMIS M,HIMEUR Y,et al.Deep learning for steganalysis of diverse data types:a review of methods,taxonomy,challenges and future directions[J].Neurocomputing,2024,581:127528.
[20] ANOWAR F,SADAOUI S,SELIM B.Conceptual and empirical comparison of dimensionality reduction algorithms (PCA,KPCA,LDA,MDS,SVD,LLE,ISOMAP,LE,ICA,t-SNE)[J].Computer science review,2021,40:100378.
Basic Information:
DOI:10.13705/j.issn.1671-6841.2024113
China Classification Code:TP391.41
Citation Information:
[1]GAO Feipeng,YANG Jie.Steganalysis Based on Bayesian Network Ensembles for Compressed Speech Quantization Index Modulation[J].Journal of Zhengzhou University(Natural Science Edition),2025,57(06):34-41.DOI:10.13705/j.issn.1671-6841.2024113.
Fund Information:
浙江省自然科学基金项目(LQ20F020004)
2024-06-20
2024
2025-08-28
2025
2024-12-02
2
2024-11-13
2024-11-13
2024-11-13