2017
DOI: 10.1049/cje.2017.09.026
|View full text |Cite
|
Sign up to set email alerts
|

Steganalysis of Low Embedding Rates LSB Speech Based on Histogram Moments in Frequency Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
16
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(18 citation statements)
references
References 8 publications
0
16
0
Order By: Relevance
“…According to the distribution of energy values, Wu and Yang used the Least Significant Bit (LSB) replacement algorithm to embed secret information in the G.711 encoded speech stream, which achieved better speech quality, and the hidden capacity reaches 20kbps [10]. Yang et al proposed a method for real-time embedding using LSB algorithm [11]. Ma et al used the ABS method to embed secret information in the G.721 encoded speech stream [12].…”
Section: Related Workmentioning
confidence: 99%
“…According to the distribution of energy values, Wu and Yang used the Least Significant Bit (LSB) replacement algorithm to embed secret information in the G.711 encoded speech stream, which achieved better speech quality, and the hidden capacity reaches 20kbps [10]. Yang et al proposed a method for real-time embedding using LSB algorithm [11]. Ma et al used the ABS method to embed secret information in the G.721 encoded speech stream [12].…”
Section: Related Workmentioning
confidence: 99%
“…In Ref. [19], a spatial rich model (SRM) is proposed which employs many linear and nonlinear high-pass filters to model noise components. Ensemble classifier (EC) [32] is used as the final steganalyzer to work with high-dimensional feature spaces.…”
Section: Introductionmentioning
confidence: 99%
“…When flipping a pixel to embed secret message, the modification on residual maps is more obvious than the modification on the image, so the variation of the frequencies of residual patterns is more apparent which is beneficial to distinguish the cover and stego compared with the original image model. Inspired by HSE [36] and rich model for grayscale image [19] , the symmetrical relationships of residual patterns is employed. In this way, SLRP with symmetrical relationships can be merged, making the features more compact while reducing the dimensionality of the feature set.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, Huang et al [28] improved the Voice Activity Detection (VAD) algorithm to keep the VAD result invariant after steganography and modified several types of parameter bits in inactive frames in G.723.1 with 6.3 kbit/s mode to embed the secret messages, whose steganographic bandwidth can reach up to 101 bits per frame. Lin [29] proposed another improved VAD algorithm to keep the VAD result unchanged after steganography and extended Huang's method to 5.3 kbit/s mode.As for VoIP steganalysis, there is no universal detection method currently, but some effective steganalysis methods [30][31][32][33][34][35][36][37] have been proposed to detect steganographic algorithms, which modify specific encoding parameters. For example, Li et al [30] pointed out that the codeword of LPC became asymmetrical after embedding secret messages and proposed a quantization codework correlation network model to detect LPC-based steganography, which has a good detection performance even in short sample length.…”
mentioning
confidence: 99%
“…As for VoIP steganalysis, there is no universal detection method currently, but some effective steganalysis methods [30][31][32][33][34][35][36][37] have been proposed to detect steganographic algorithms, which modify specific encoding parameters. For example, Li et al [30] pointed out that the codeword of LPC became asymmetrical after embedding secret messages and proposed a quantization codework correlation network model to detect LPC-based steganography, which has a good detection performance even in short sample length.…”
mentioning
confidence: 99%