4.7 Article

Separable Convolution Network With Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

High capacity speech steganography for the G723.1 coder based on quantised line spectral pairs interpolation and CNN auto-encoding

Hamza Kheddar et al.

Summary: This paper proposes a novel steganographic method, SIAE, for Voice over IP applications, which can securely transmit a secret speech hidden within another speech. The proposed method has a high performance, a large steganographic capacity, and can evade steganalysis specifically targeted at speech steganography.

APPLIED INTELLIGENCE (2022)

Article Computer Science, Artificial Intelligence

Real-time steganalysis for streaming media based on multi-channel convolutional sliding windows

Zhongliang Yang et al.

Summary: This paper proposes a real-time VoIP steganalysis model to improve the accuracy and efficiency of detecting covert communications. The model utilizes multi-channel convolutional sliding windows and statistical feature analysis to achieve high detection performance, especially for low embedding rates.

KNOWLEDGE-BASED SYSTEMS (2022)

Article Engineering, Electrical & Electronic

A SILK Adaptive Steganographic Scheme Based on Minimizing Distortion in Pitch Domain

Ren Yanzhen et al.

Summary: This paper introduces a secure steganographic scheme in the SILK pitch domain, which is capable of maintaining good voice quality while resisting detection by steganalysis schemes.

IETE TECHNICAL REVIEW (2021)

Review Chemistry, Analytical

Steganography and Steganalysis in Voice over IP: A Review

Zhijun Wu et al.

Summary: The paper discusses the research hotspots of steganography and steganalysis based on VoIP, divided into two categories: based on voice payload and protocol. It summarizes their characteristics and development directions.

SENSORS (2021)

Review Mathematics

A Review on Text Steganography Techniques

Mohammed Abdul Majeed et al.

Summary: There is a persistent need for safeguarding documents and data due to the prevalence of fabrication and faking globally, leading to significant losses. Different techniques like steganography, cryptography, and coding have been used to protect valuable information, with steganography allowing users to conceal messages within cover media. Text steganography faces challenges due to difficulties in identifying redundant bits, requiring changes to document attributes while ensuring the changes are not detectable visually. This paper provides an overview of existing research on text steganography, covering various classes and techniques used for hiding secret data.

MATHEMATICS (2021)

Article Computer Science, Information Systems

Audio steganography with less modification to the optimal matching CNV-QIM path with the minimal hamming distance expected value to a secret

Xinhao Sun et al.

Summary: This paper proposes an optimal matching path algorithm to improve the imperceptibility of audio steganography, without compromising the steganographic capacity. By calculating Hamming distance and selecting traversal paths with minimal Hamming distance, the proposed algorithm demonstrates good performance and real-time processing capability.

MULTIMEDIA SYSTEMS (2021)

Article Computer Science, Artificial Intelligence

Squeeze-and-Excitation Networks

Jie Hu et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2020)

Review Computer Science, Information Systems

Digital audio steganography: Systematic review, classification, and analysis of the current state of the art

Ahmed A. AlSabhany et al.

COMPUTER SCIENCE REVIEW (2020)

Article Computer Science, Theory & Methods

Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis

Ru Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

Multi-Layer Architecture for Efficient Steganalysis of UnderMp3Cover in Multi-Encoder Scenario

Hamzeh Ghasemzadeh

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

An AMR adaptive steganographic scheme based on the pitch delay of unvoiced speech

Yanzhen Ren et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Calibrated steganalysis of mp3stego in multi-encoder scenario

Hamzeh Ghasemzadeh

INFORMATION SCIENCES (2019)

Article Computer Science, Theory & Methods

A Secure AMR Fixed Codebook Steganographic Scheme Based on Pulse Distribution Model

Yanzhen Ren et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

A novel steganographic method for algebraic-code-excited-linear-prediction speech streams based on fractional pitch delay search

Xiaokang Liu et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Review Computer Science, Artificial Intelligence

Video steganography: A review

Yunxia Liu et al.

NEUROCOMPUTING (2019)

Proceedings Paper Computer Science, Theory & Methods

Steganalysis of VoIP Streams with CNN-LSTM Network

Hao Yang et al.

IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (2019)

Proceedings Paper Computer Science, Theory & Methods

Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position

Chen Gong et al.

IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (2019)

Proceedings Paper Computer Science, Theory & Methods

Detection of Classifier Inconsistencies in Image Steganalysis

Daniel Lerch-Hostalot et al.

IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (2019)

Article Computer Science, Information Systems

Steganalysis of AMR Speech Based on Multiple Classifiers Combination

Hui Tian et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

An AMR adaptive steganography algorithm based on minimizing distortion

Yanzhen Ren et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Theory & Methods

RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network

Zinan Lin et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition

Junhui He et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Engineering, Electrical & Electronic

Image steganography in spatial domain: A survey

Mehdi Hussain et al.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2018)

Article Computer Science, Information Systems

Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec

Peng Liu et al.

MULTIMEDIA SYSTEMS (2017)

Article Computer Science, Theory & Methods

AMR Steganalysis Based on Second-Order Difference of Pitch Delay

Yanzhen Ren et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Engineering, Electrical & Electronic

Universal audio steganalysis based on calibration and reversed frequency resolution of human auditory system

Hamzeh Ghasemzadeh et al.

IET SIGNAL PROCESSING (2017)

Article Engineering, Electrical & Electronic

Steganalysis Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs

Hui Tian et al.

SIGNAL PROCESSING (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Xception: Deep Learning with Depthwise Separable Convolutions

Francois Chollet

30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) (2017)

Article Computer Science, Theory & Methods

AMR Steganalysis Based on the Probability of Same Pulse Position

Yanzhen Ren et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Artificial Intelligence

Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images

Qingzhong Liu et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2015)

Article Computer Science, Information Systems

Improving security of quantization-index-modulation steganography in low bit-rate speech streams

Hui Tian et al.

MULTIMEDIA SYSTEMS (2014)

Article Computer Science, Information Systems

Detection of MP3Stego exploiting recompression calibration-based feature

Diqun Yan et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2014)

Article Computer Science, Hardware & Architecture

A new scheme for covert communication via 3G encoded speech

Haibo Miao et al.

COMPUTERS & ELECTRICAL ENGINEERING (2012)

Article Engineering, Electrical & Electronic

Video Steganalysis Exploiting Motion Vector Reversion-Based Features

Yun Cao et al.

IEEE SIGNAL PROCESSING LETTERS (2012)

Article Computer Science, Theory & Methods

Steganography Integration Into a Low-Bit Rate Speech Codec

Yongfeng Huang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Engineering, Electrical & Electronic

Voice over Internet protocol (VoIP)

B Goode

PROCEEDINGS OF THE IEEE (2002)