Covert channel detection: machine learning approaches

MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …

Separable convolution network with dual-stream pyramid enhanced strategy for speech steganalysis

Y Qiu, H Tian, H Li, CC Chang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Steganography based on fixed codebook has become one of the most important branches
of speech steganography due to its high imperceptibility and having the largest available …

A Walk-through towards network steganography techniques

U Pilania, M Kumar, T Rohit, N Nandal - Информатика и …, 2023 - ia.spcras.ru
2D and 3D digital multimedia files offer numerous benefits like excellent quality,
compression, editing, reliable copying, etc. These qualities of the multimedia files, on the …

STFF-SM: Steganalysis model based on spatial and temporal feature fusion for speech streams

H Tian, Y Qiu, W Mazurczyk, H Li… - IEEE/ACM Transactions …, 2022 - ieeexplore.ieee.org
The real-time detection of speech steganography in Voice-over-Internet-Protocol (VoIP)
scenarios remains an open problem, as it requires steganalysis methods to perform for low …

MFPD-LSTM: A steganalysis method based on multiple features of pitch delay using RNN-LSTM

Z Wu, J Guo - Journal of Information Security and Applications, 2023 - Elsevier
In recent years, adaptive multi-rate (AMR) steganalysis based on pitch delay has become a
hot research area for researchers. The main reason is that the steganalysis algorithm based …

General frame-wise steganalysis of compressed speech based on dual-domain representation and intra-frame correlation leaching

S Li, J Wang, P Liu - IEEE/ACM Transactions on Audio, Speech …, 2022 - ieeexplore.ieee.org
Frame-wise steganalysis is of significance for active steganography defense. By frame-wise
detection, we can accurately find the embedding position of secret information and destroy …

Steganalysis of compressed speech based on global and local correlation mining

J Wang, J Yang, F Gao, P Xu - IEEE Access, 2022 - ieeexplore.ieee.org
Most of the existing steganalysis methods are designed for specific steganography methods
in low-bit-rate compressed speech stream and lack of generalization ability. In practical …

Detecting VoIP data streams: approaches using hidden representation learning

M Kapoor, M Napolitano, J Quance, T Moyer… - Proceedings of the …, 2023 - ojs.aaai.org
The use of voice-over-IP technology has rapidly expanded over the past several years, and
has thus become a significant portion of traffic in the real, complex network environment …

AMR Steganalysis based on Adversarial Bi-GRU and Data Distillation

Z Wu, J Guo - Proceedings of the 2022 ACM Workshop on …, 2022 - dl.acm.org
Existing AMR (Adaptive Multi-Rate) steganalysis algorithms based on pitch delay have low
detection accuracy on samples with short time or low embedding rate, and the model shows …

Covert voip communication based on audio steganography

BQA Ali, HI Shahadi, MS Kod… - International Journal of …, 2022 - journal.uob.edu.bh
Voice over Internet Protocol (VoIP) is a popular and important internet protocol for real-time
voice calling. It is used in several software applications such as Skype, WhatsApp, and …