2018
DOI: 10.1109/tifs.2018.2806741
|View full text |Cite
|
Sign up to set email alerts
|

RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
73
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 70 publications
(73 citation statements)
references
References 35 publications
0
73
0
Order By: Relevance
“…There are also several attempts to apply deep learning method to steganalysis of VoIP. Lin et al [30] found there are four strong codeword correlation patterns in VoIP streams, which will be distorted after embedding with hidden data. Thus, to extract those correlation features, they propose the codeword correlation model, which is based on recurrent neural network (RNN).…”
Section: B Deep Learning Based Steganalysis Methods In Voipmentioning
confidence: 99%
“…There are also several attempts to apply deep learning method to steganalysis of VoIP. Lin et al [30] found there are four strong codeword correlation patterns in VoIP streams, which will be distorted after embedding with hidden data. Thus, to extract those correlation features, they propose the codeword correlation model, which is based on recurrent neural network (RNN).…”
Section: B Deep Learning Based Steganalysis Methods In Voipmentioning
confidence: 99%
“…Correlations between different frames are crucial in speech steganalysis [7]. Here, we adopt Multi-head self attention [9] which has recently achieved remarkable performance in modeling complicated relations between different codewords.…”
Section: Correlation Extraction Layermentioning
confidence: 99%
“…In order to validate the performance of our model, we compare with other state-of-the-art methods: QCCN [16], RNN-SM [7], R-CNN [8], and HRN [17]. Metrics used in experiments are detection accuracy and inference time.…”
Section: Experimental Settingsmentioning
confidence: 99%
“…Recently, Huang et al [28] improved the Voice Activity Detection (VAD) algorithm to keep the VAD result invariant after steganography and modified several types of parameter bits in inactive frames in G.723.1 with 6.3 kbit/s mode to embed the secret messages, whose steganographic bandwidth can reach up to 101 bits per frame. Lin [29] proposed another improved VAD algorithm to keep the VAD result unchanged after steganography and extended Huang's method to 5.3 kbit/s mode.As for VoIP steganalysis, there is no universal detection method currently, but some effective steganalysis methods [30][31][32][33][34][35][36][37] have been proposed to detect steganographic algorithms, which modify specific encoding parameters. For example, Li et al [30] pointed out that the codeword of LPC became asymmetrical after embedding secret messages and proposed a quantization codework correlation network model to detect LPC-based steganography, which has a good detection performance even in short sample length.…”
mentioning
confidence: 99%
“…For example, Li et al [30] pointed out that the codeword of LPC became asymmetrical after embedding secret messages and proposed a quantization codework correlation network model to detect LPC-based steganography, which has a good detection performance even in short sample length. Lin et al [31] first introduced the recurrent neural network (RNN) into steganalysis and designed a two-layer network to detect the LPC-based steganography. The experimental results show that Lin's method [31] has better detection performance than Li's method [30] and can achieve a good detection accuracy when the sample length is only 0.1 s at the embedding rate of 100%.…”
mentioning
confidence: 99%