VoIP Steganalysis Using Shallow Multiscale Convolution and Transformer

Peng, J., Liao, Y. and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2025) VoIP Steganalysis Using Shallow Multiscale Convolution and Transformer. In: SPNCE 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 25-26 Nov 2023, Guangzhou, China.

Full text not available from this repository.

Abstract

Steganography is an effective method for transmitting secret information, but it can also be used for illegal activities such as terrorism, organized crime and data theft, etc. To solve the problem of steganography being used for malicious purposes, steganalysis technology has been developed. Steganalysis aims to detect whether the data has been steganography and identify whether it contains secret information, which is a kind of reverse process of steganography. VoIP data stream usually has high redundancy, which makes it an ideal carrier for steganography. In this paper, a Steganalysis Transformer (SAT) VoIP voice steganalysis method based on Transformer neural network is proposed with VoIP voice as the research object. The method first encodes the relative position of the features extracted from VoIP voice signals, combines the multi-scale convolution method to improve the local feature extraction to obtain more detailed feature information, transforms the high-dimensional sparse matrix into the low-dimensional dense features by mapping, and then realizes the steganalysis analysis through the feature extraction by the improved Transformer; the proposed SAT method is able to obtain the global features from the shallow layer and learn the high quality intermediate features. Experiments show that the SAT method proposed in this paper has superior performance, and the accuracy of VoIP steganalysis reaches 96.41%.

Item Type: Conference or Workshop Item (Paper)
ISSN: 1867-8211
ISBN: 9783031736988
Identifier: 10.1007/978-3-031-73699-5_23
Identifier: 10.1007/978-3-031-73699-5_23
Subjects: Computing > Information security
Related URLs:
Depositing User: Marc Forster
Date Deposited: 03 Feb 2025 10:30
Last Modified: 03 Feb 2025 10:30
URI: https://repository.uwl.ac.uk/id/eprint/13216

Actions (login required)

View Item View Item

Menu