Skip to main content

2024 | OriginalPaper | Buchkapitel

VStego800K: Large-Scale Steganalysis Dataset for Streaming Voice

verfasst von : Xuan Xu, Shengnan Guo, Zhengyang Fang, Pengcheng Zhou, Zhongliang Yang, Linna Zhou

Erschienen in: Digital Forensics and Watermarking

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, more and more steganographic methods based on streaming voice have appeared, which poses a great threat to the security of cyberspace. In this paper, in order to promote the development of streaming voice steganalysis technology, we construct and release a large-scale streaming voice steganalysis dataset called VStego800K. To truly reflect the needs of reality, we mainly follow three considerations when constructing the VStego800K dataset: large-scale, real-time, and diversity. The large-scale dataset allows researchers to fully explore the statistical distribution differences of streaming signals caused by steganography. Therefore, the proposed VStego800K dataset contains 814,592 streaming voice fragments. Among them, 764,592 samples (382,296 cover-stego pairs) are divided as the training set and the remaining 50,000 as testing set. The duration of all samples in the data set is uniformly cut to 1 s to encourage researchers to develop near real-time speech steganalysis algorithms. To ensure the diversity of the dataset, the collected voice signals are mixed with male and female as well as Chinese and English from different speakers. For each steganographic sample in VStego800K, we randomly use two typical streaming voice steganography algorithms, and randomly embed random bit with embedding rates of 10%–40%. We tested the performance of some latest steganalysis algorithms on VStego800K, with specific results and analysis details in the experimental part. We hope that the VStego800K dataset will further promote the development of universal voice steganalysis technology. The description of VStego800K and instructions will be released here: https://​github.​com/​YangzlTHU/​VStego800K.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Theohary, C.A.: Terrorist Use of the Internet: Information Operations in Cyberspace. DIANE Publishing (2011) Theohary, C.A.: Terrorist Use of the Internet: Information Operations in Cyberspace. DIANE Publishing (2011)
4.
Zurück zum Zitat Yang, Z., Du, X., Tan, Y., Huang, Y., Zhang, Y.J.: Aag-stega: automatic audio generation-based steganography. arXiv preprint arXiv:1809.03463 (2018) Yang, Z., Du, X., Tan, Y., Huang, Y., Zhang, Y.J.: Aag-stega: automatic audio generation-based steganography. arXiv preprint arXiv:1809.03463 (2018)
5.
Zurück zum Zitat Yang, Z.L., Guo, X.Q., Chen, Z.M., Huang, Y.F., Zhang, Y.J.: RNN-stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280–1295 (2018)CrossRef Yang, Z.L., Guo, X.Q., Chen, Z.M., Huang, Y.F., Zhang, Y.J.: RNN-stega: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. 14(5), 1280–1295 (2018)CrossRef
6.
Zurück zum Zitat Yang, Z.L., Zhang, S.Y., Hu, Y.T., Hu, Z.W., Huang, Y.F.: VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Trans. Inf. Forensics Secur. 16, 880–895 (2020)CrossRef Yang, Z.L., Zhang, S.Y., Hu, Y.T., Hu, Z.W., Huang, Y.F.: VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Trans. Inf. Forensics Secur. 16, 880–895 (2020)CrossRef
8.
Zurück zum Zitat Johnson, N.F., Sallee, P.A.: Detection of hidden information, covert channels and information flows. Wiley Handbook of Science and Technology for Homeland Security, pp. 1–37 (2008) Johnson, N.F., Sallee, P.A.: Detection of hidden information, covert channels and information flows. Wiley Handbook of Science and Technology for Homeland Security, pp. 1–37 (2008)
9.
Zurück zum Zitat Goode, B.: Voice over internet protocol (VoIP). Proc. IEEE 90(9), 1495–1517 (2002)CrossRef Goode, B.: Voice over internet protocol (VoIP). Proc. IEEE 90(9), 1495–1517 (2002)CrossRef
10.
Zurück zum Zitat Hamdaqa, M., Tahvildari, L.: ReLACK: a reliable VoIP steganography approach. In: 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement, pp. 189–197. IEEE (2011) Hamdaqa, M., Tahvildari, L.: ReLACK: a reliable VoIP steganography approach. In: 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement, pp. 189–197. IEEE (2011)
11.
Zurück zum Zitat Tian, H., Zhou, K., Jiang, H., Huang, Y., Liu, J., Feng, D.: An adaptive steganography scheme for voice over IP. In: 2009 IEEE International Symposium on Circuits and Systems, pp. 2922–2925. IEEE (2009) Tian, H., Zhou, K., Jiang, H., Huang, Y., Liu, J., Feng, D.: An adaptive steganography scheme for voice over IP. In: 2009 IEEE International Symposium on Circuits and Systems, pp. 2922–2925. IEEE (2009)
12.
Zurück zum Zitat Xu, E., Liu, B., Xu, L., Wei, Z., Zhao, B., Su, J.: Adaptive VoIP steganography for information hiding within network audio streams. In: 2011 14th International Conference on Network-Based Information Systems, pp. 612–617. IEEE (2011) Xu, E., Liu, B., Xu, L., Wei, Z., Zhao, B., Su, J.: Adaptive VoIP steganography for information hiding within network audio streams. In: 2011 14th International Conference on Network-Based Information Systems, pp. 612–617. IEEE (2011)
13.
Zurück zum Zitat Ballesteros L.D.M., Moreno A.J.M.: Highly transparent steganography model of speech signals using efficient wavelet masking. Exp. Syst. Appl. 39(10), 9141-9149 (2012) Ballesteros L.D.M., Moreno A.J.M.: Highly transparent steganography model of speech signals using efficient wavelet masking. Exp. Syst. Appl. 39(10), 9141-9149 (2012)
14.
Zurück zum Zitat Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)CrossRef Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)CrossRef
15.
Zurück zum Zitat Tian, H., Liu, J., Li, S.: Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimedia Syst. 20(2), 143–154 (2014)CrossRef Tian, H., Liu, J., Li, S.: Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multimedia Syst. 20(2), 143–154 (2014)CrossRef
16.
Zurück zum Zitat Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)CrossRef Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)CrossRef
18.
Zurück zum Zitat Liu, Q., Sung, A.H., Qiao, M.: Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forensics Secur. 4(3), 359–368 (2009)CrossRef Liu, Q., Sung, A.H., Qiao, M.: Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forensics Secur. 4(3), 359–368 (2009)CrossRef
19.
Zurück zum Zitat Paulin, C., Selouani, S.A., Hervet, E.: Audio steganalysis using deep belief networks. Int. J. Speech Technol. 19(3), 585–591 (2016)CrossRef Paulin, C., Selouani, S.A., Hervet, E.: Audio steganalysis using deep belief networks. Int. J. Speech Technol. 19(3), 585–591 (2016)CrossRef
20.
Zurück zum Zitat Kraetzer, C., Dittmann, J.: Mel-cepstrum based steganalysis for VoIP steganography. In: Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, p. 650505. International Society for Optics and Photonics (2007) Kraetzer, C., Dittmann, J.: Mel-cepstrum based steganalysis for VoIP steganography. In: Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, p. 650505. International Society for Optics and Photonics (2007)
21.
Zurück zum Zitat Wang, J., Huang, L., Zhang, Y., Zhu, Y., Ni, J., et al.: An effective steganalysis algorithm for histogram-shifting based reversible data hiding. Comput. Mater. Continua 64(1), 325–344 (2020)CrossRef Wang, J., Huang, L., Zhang, Y., Zhu, Y., Ni, J., et al.: An effective steganalysis algorithm for histogram-shifting based reversible data hiding. Comput. Mater. Continua 64(1), 325–344 (2020)CrossRef
22.
Zurück zum Zitat Yang, C., Wang, J., Lin, C., Chen, H., Wang, W.: Locating steganalysis of LSB matching based on spatial and wavelet filter fusion. Comput. Mater. Continua 60(2), 633–644 (2019)CrossRef Yang, C., Wang, J., Lin, C., Chen, H., Wang, W.: Locating steganalysis of LSB matching based on spatial and wavelet filter fusion. Comput. Mater. Continua 60(2), 633–644 (2019)CrossRef
23.
Zurück zum Zitat Huang, Y.F., Tang, S., Zhang, Y.: Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis. IET Commun. 5(7), 929–936 (2011)CrossRef Huang, Y.F., Tang, S., Zhang, Y.: Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis. IET Commun. 5(7), 929–936 (2011)CrossRef
24.
Zurück zum Zitat Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4), 22–28 (2001)CrossRef Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4), 22–28 (2001)CrossRef
25.
Zurück zum Zitat Li, S.B., Tao, H.Z., Huang, Y.F.: Detection of quantization index modulation steganography in G. 723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. SCI. C, 13(8), 624–634 (2012) Li, S.B., Tao, H.Z., Huang, Y.F.: Detection of quantization index modulation steganography in G. 723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. SCI. C, 13(8), 624–634 (2012)
26.
Zurück zum Zitat Lin, Z., Huang, Y., Wang, J.: RNN-SM: fast steganalysis of VoIP streams using recurrent neural network. IEEE Trans. Inf. Forensics Secur. 13(7), 1854–1868 (2018)CrossRef Lin, Z., Huang, Y., Wang, J.: RNN-SM: fast steganalysis of VoIP streams using recurrent neural network. IEEE Trans. Inf. Forensics Secur. 13(7), 1854–1868 (2018)CrossRef
27.
Zurück zum Zitat Yang, Z., Yang, H., Hu, Y., Huang, Y., Zhang, Y.J.: Real-time steganalysis for stream media based on multi-channel convolutional sliding windows. arXiv preprint arXiv:1902.01286 (2019) Yang, Z., Yang, H., Hu, Y., Huang, Y., Zhang, Y.J.: Real-time steganalysis for stream media based on multi-channel convolutional sliding windows. arXiv preprint arXiv:1902.01286 (2019)
28.
Zurück zum Zitat Yang, H., Yang, Z., Huang, Y.: Steganalysis of voip streams with cnn-lstm network. In: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 204–209 (2019) Yang, H., Yang, Z., Huang, Y.: Steganalysis of voip streams with cnn-lstm network. In: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 204–209 (2019)
30.
Zurück zum Zitat Yang, H., Yang, Z., Bao, Y., Liu, S., Huang, Y.: Fast steganalysis method for voip streams. IEEE Signal Process. Lett. 27, 286–290 (2019)CrossRef Yang, H., Yang, Z., Bao, Y., Liu, S., Huang, Y.: Fast steganalysis method for voip streams. IEEE Signal Process. Lett. 27, 286–290 (2019)CrossRef
31.
Zurück zum Zitat Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)MathSciNetCrossRef Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)MathSciNetCrossRef
32.
Zurück zum Zitat Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: IEEE GLOBECOM 2008–2008 IEEE Global Telecommunications Conference, pp. 1–5. IEEE (2008) Xiao, B., Huang, Y., Tang, S.: An approach to information hiding in low bit-rate speech stream. In: IEEE GLOBECOM 2008–2008 IEEE Global Telecommunications Conference, pp. 1–5. IEEE (2008)
33.
Zurück zum Zitat Nishimura, A.: Data hiding in pitch delay data of the adaptive multi-rate narrow-band speech codec. In: 2009 fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 483–486. IEEE (2009) Nishimura, A.: Data hiding in pitch delay data of the adaptive multi-rate narrow-band speech codec. In: 2009 fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 483–486. IEEE (2009)
34.
Zurück zum Zitat Janicki, A.: Pitch-based steganography for Speex voice codec. Secur. Commun. Netw. 9(15), 2923–2933 (2016)CrossRef Janicki, A.: Pitch-based steganography for Speex voice codec. Secur. Commun. Netw. 9(15), 2923–2933 (2016)CrossRef
35.
Zurück zum Zitat Li, S.B., Jia, Y.Z., Fu, J.Y., Dai, Q.X.: Detection of pitch modulation information hiding based on codebook correlation network. Chinese J. Comput. 37(10), 2107–2117 (2014) Li, S.B., Jia, Y.Z., Fu, J.Y., Dai, Q.X.: Detection of pitch modulation information hiding based on codebook correlation network. Chinese J. Comput. 37(10), 2107–2117 (2014)
36.
Zurück zum Zitat Hu, Y., Huang, Y., Yang, Z., Huang, Y.: Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams. Neurocomputing 419, 70–79 (2021)CrossRef Hu, Y., Huang, Y., Yang, Z., Huang, Y.: Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams. Neurocomputing 419, 70–79 (2021)CrossRef
37.
Zurück zum Zitat Wang, J., Yang, C., Wang, P., Song, X., Lu, J.: Payload location for JPEG image steganography based on co-frequency sub-image filtering. Int. J. Distrib. Sens. Netw. 16(1), 1550147719899569 (2020)CrossRef Wang, J., Yang, C., Wang, P., Song, X., Lu, J.: Payload location for JPEG image steganography based on co-frequency sub-image filtering. Int. J. Distrib. Sens. Netw. 16(1), 1550147719899569 (2020)CrossRef
Metadaten
Titel
VStego800K: Large-Scale Steganalysis Dataset for Streaming Voice
verfasst von
Xuan Xu
Shengnan Guo
Zhengyang Fang
Pengcheng Zhou
Zhongliang Yang
Linna Zhou
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-2585-4_21

Premium Partner