About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in New Computing Environments. 6th International Conference, SPNCE 2023, Guangzhou, China, November 25–26, 2023, Proceedings

Research Article

VoIP Steganalysis Using Shallow Multiscale Convolution and Transformer

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-73699-5_23,
        author={Jinghui Peng and Yi Liao and Shanyu Tang},
        title={VoIP Steganalysis Using Shallow Multiscale Convolution and Transformer},
        proceedings={Security and Privacy in New Computing Environments. 6th International Conference, SPNCE 2023, Guangzhou, China, November 25--26, 2023, Proceedings},
        proceedings_a={SPNCE},
        year={2025},
        month={1},
        keywords={Steganography Steganalysis Neural Network Attention Mechanism Transformer},
        doi={10.1007/978-3-031-73699-5_23}
    }
    
  • Jinghui Peng
    Yi Liao
    Shanyu Tang
    Year: 2025
    VoIP Steganalysis Using Shallow Multiscale Convolution and Transformer
    SPNCE
    Springer
    DOI: 10.1007/978-3-031-73699-5_23
Jinghui Peng1,*, Yi Liao1, Shanyu Tang2
  • 1: School of Cyber Security, Guangdong Polytechnic Normal University, Guangzhou
  • 2: Cybersecurity and Criminology Centre, University of West London
*Contact email: jinghuipeng@gpnu.edu.cn

Abstract

Steganography is an effective method for transmitting secret information, but it can also be used for illegal activities such as terrorism, organized crime and data theft, etc. To solve the problem of steganography being used for malicious purposes, steganalysis technology has been developed. Steganalysis aims to detect whether the data has been steganography and identify whether it contains secret information, which is a kind of reverse process of steganography. VoIP data stream usually has high redundancy, which makes it an ideal carrier for steganography. In this paper, a Steganalysis Transformer (SAT) VoIP voice steganalysis method based on Transformer neural network is proposed with VoIP voice as the research object. The method first encodes the relative position of the features extracted from VoIP voice signals, combines the multi-scale convolution method to improve the local feature extraction to obtain more detailed feature information, transforms the high-dimensional sparse matrix into the low-dimensional dense features by mapping, and then realizes the steganalysis analysis through the feature extraction by the improved Transformer; the proposed SAT method is able to obtain the global features from the shallow layer and learn the high quality intermediate features. Experiments show that the SAT method proposed in this paper has superior performance, and the accuracy of VoIP steganalysis reaches 96.41%.

Keywords
Steganography Steganalysis Neural Network Attention Mechanism Transformer
Published
2025-01-01
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-73699-5_23
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL